Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Non Disclosure Agreement For Product Development
1. Parties: Identification of the disclosing and receiving parties, including full legal names, registration numbers, and addresses
2. Background: Context of the product development relationship and purpose of sharing confidential information
3. Definitions: Clear definitions of 'Confidential Information', 'Product', 'Development Activities', and other key terms
4. Scope of Confidential Information: Detailed description of what constitutes confidential information in the product development context
5. Obligations of Confidentiality: Core confidentiality obligations, including handling, storage, and protection of confidential information
6. Permitted Use: Specific permitted uses of confidential information for product development purposes
7. Term and Survival: Duration of the agreement and survival of confidentiality obligations
8. Return or Destruction of Confidential Information: Requirements for handling confidential information upon termination
9. Breach and Remedies: Consequences of breach and available remedies under Danish law
10. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. Intellectual Property Rights: Section addressing ownership and rights in any IP created during product development - include when new IP creation is likely
2. Employee and Contractor Obligations: Additional provisions for ensuring confidentiality obligations extend to employees and contractors - include when receiving party will need to share with internal team
3. Data Protection Compliance: GDPR compliance provisions - include when personal data will be shared
4. Export Control: Provisions regarding export control regulations - include for products with international implications
5. Third Party Disclosure: Provisions for allowing disclosure to specific third parties - include when external consultants or suppliers need access
6. Non-Competition: Restrictions on competing activities - include when product development involves unique market opportunities
7. Residual Knowledge: Provisions addressing use of general knowledge and experience gained - include for complex technical developments
8. Security Requirements: Specific security measures for protecting digital information - include for software or digital product development
1. Schedule 1 - Description of Product: Detailed description of the product under development
2. Schedule 2 - Specific Confidential Information: Itemized list of specific confidential information covered
3. Schedule 3 - Authorized Representatives: List of authorized personnel who may access confidential information
4. Schedule 4 - Security Protocols: Detailed security measures and protocols for handling confidential information
5. Schedule 5 - Approved Third Party Recipients: List of pre-approved third parties who may receive confidential information
6. Appendix A - Technical Specifications: Technical details and specifications related to the product development
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.