Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Embedded License
1. Parties: Identification of licensor and licensee with full legal details
2. Background: Context of the agreement, nature of the embedded system, and business purpose
3. Definitions: Definitions of technical terms, embedded system components, and key contract terms
4. Grant of License: Scope of license, permitted uses, and integration rights for the embedded software
5. Technical Specifications: Detailed specifications of the embedded software and integration requirements
6. Implementation and Integration: Requirements and procedures for implementing the embedded software
7. License Restrictions: Limitations on use, modification, and distribution of the embedded software
8. Intellectual Property Rights: Ownership of IP, protection measures, and infringement handling
9. Payment Terms: License fees, payment schedule, and related financial terms
10. Warranties and Representations: Warranties regarding software functionality and performance
11. Liability and Indemnification: Allocation of risks and responsibilities between parties
12. Term and Termination: Duration, renewal terms, and termination conditions
13. Confidentiality: Protection of proprietary information and trade secrets
14. General Provisions: Standard legal provisions including governing law and dispute resolution
1. Source Code Escrow: Terms for source code escrow arrangement, used when source code access might be needed
2. Export Control: Export compliance terms, required when software may be subject to export restrictions
3. Data Protection: GDPR compliance terms, needed when personal data is processed
4. Maintenance and Support: Terms for ongoing support and maintenance, if offered
5. Quality Assurance: Quality standards and testing requirements, for critical applications
6. Security Requirements: Specific security measures and compliance requirements, for sensitive applications
7. Change Management: Procedures for managing software updates and changes
8. Disaster Recovery: Business continuity provisions, important for critical systems
1. Technical Specification Schedule: Detailed technical specifications of the embedded software
2. Integration Requirements: Specific requirements for hardware integration
3. Pricing Schedule: Detailed pricing structure and payment terms
4. Service Level Agreement: Performance metrics and service levels if applicable
5. Approved Hardware List: List of hardware platforms approved for software integration
6. Security Standards: Required security standards and compliance requirements
7. Support and Maintenance Terms: Detailed support and maintenance procedures
8. Change Request Procedure: Process for requesting and implementing changes
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.