Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Contractor Work Contract
"I need a Contractor Work Contract for a software developer who will be working remotely from January 2025, with access to our client data and systems, so we need strong data protection and security clauses."
1. Parties: Identifies the contracting parties, including full legal names, addresses, and company registration details if applicable
2. Background: Sets out the context of the agreement and confirms the intention to engage the contractor as an independent service provider
3. Definitions: Defines key terms used throughout the agreement
4. Scope of Services: Detailed description of the services to be provided by the contractor
5. Term and Termination: Duration of the contract and circumstances under which it can be terminated
6. Payment Terms: Fees, payment schedule, expenses, invoicing requirements and payment methods
7. Independent Contractor Status: Explicitly confirms the contractor's status as an independent contractor and not an employee
8. Contractor's Obligations: Key responsibilities, quality standards, and delivery requirements
9. Client's Obligations: Client's responsibilities including provision of information, access, and resources
10. Intellectual Property Rights: Ownership and usage rights of any IP created during the contract
11. Confidentiality: Protection of confidential information and trade secrets
12. Data Protection: GDPR compliance and data handling requirements
13. Insurance and Liability: Required insurance coverage and limitation of liability provisions
14. General Provisions: Standard legal clauses including governing law, notices, and entire agreement
1. Equipment and Resources: Used when specific equipment or resources are provided by either party
2. Subcontracting: Include when the contractor may need to subcontract certain services
3. Non-Compete: Used when restricting the contractor from working with competitors
4. Non-Solicitation: Include when preventing the contractor from soliciting client's employees or customers
5. Change Control: Used for projects where scope changes are likely
6. Service Levels: Include when specific performance metrics need to be maintained
7. Force Majeure: Used when needing to address circumstances beyond parties' control
8. Anti-Corruption: Include for high-value contracts or when working with public sector
9. Health and Safety: Used when contractor works on client premises or in high-risk environments
1. Schedule 1 - Services Description: Detailed specification of services to be provided
2. Schedule 2 - Fee Schedule: Detailed breakdown of fees, rates, and payment terms
3. Schedule 3 - Service Levels: Performance metrics and quality standards
4. Schedule 4 - Client Policies: Relevant client policies the contractor must comply with
5. Schedule 5 - Data Processing Agreement: Detailed GDPR compliance requirements if handling personal data
6. Appendix A - Project Timeline: Detailed project milestones and deadlines
7. Appendix B - Required Insurance: Specific insurance requirements and coverage levels
Authors
Information Technology
Professional Services
Construction
Financial Services
Healthcare
Education
Creative Industries
Engineering
Management Consulting
Digital Marketing
Research and Development
Software Development
Legal
Human Resources
Procurement
Finance
Operations
Project Management Office
Information Technology
Research and Development
Strategic Planning
Risk and Compliance
Project Manager
IT Consultant
Business Analyst
Software Developer
Management Consultant
HR Director
Legal Counsel
Procurement Manager
Finance Director
Operations Manager
Creative Director
Marketing Consultant
Engineering Consultant
Research Specialist
Training Consultant
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.