¶¶Òõ¶ÌÊÓÆµ

Non Exclusive Software License Agreement Template for India

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Non Exclusive Software License Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Non Exclusive Software License Agreement

"I need a Non-Exclusive Software License Agreement for licensing our healthcare management software to hospitals in India, with specific provisions for patient data protection and integration with existing hospital systems, planned to be implemented by March 2025."

Document background
The Non-Exclusive Software License Agreement is essential for organizations seeking to license software products while retaining the right to license the same software to other parties. This document is specifically structured to comply with Indian legal requirements and is commonly used when a software provider wishes to grant usage rights to multiple licensees. The agreement covers crucial elements including license scope, term, payment provisions, intellectual property protection, and compliance with Indian IT laws. It's particularly relevant in scenarios where software is being licensed for business use, whether for standard off-the-shelf software or customized solutions, and includes necessary provisions for data protection, security requirements, and technical specifications as required under Indian law.
Suggested Sections

1. Parties: Identification of the licensor and licensee with their complete legal details

2. Background: Context of the agreement and brief description of the software product

3. Definitions: Detailed definitions of terms used throughout the agreement

4. Grant of License: Scope of the non-exclusive license, permitted uses, and territory

5. License Fees and Payment Terms: Payment structure, timing, and method of payment

6. Term and Termination: Duration of the license and circumstances for termination

7. Intellectual Property Rights: Assertion and protection of licensor's IP rights

8. Licensee Obligations: Key responsibilities and restrictions on the licensee

9. Warranties and Representations: Warranties provided by both parties

10. Limitation of Liability: Limits on liability and exclusions

11. Confidentiality: Protection of confidential information

12. Governing Law and Jurisdiction: Confirmation of Indian law governance and jurisdiction

13. General Provisions: Standard boilerplate clauses including notices, assignment, and severability

Optional Sections

1. Source Code Escrow: Include when source code escrow arrangements are required for business continuity

2. Professional Services: Include when additional implementation or support services are part of the arrangement

3. Service Level Agreement: Include when specific performance levels and support requirements need to be documented

4. Data Protection and Privacy: Include when personal data processing is involved

5. Export Controls: Include for international licensing arrangements

6. Audit Rights: Include when licensor requires right to audit licensee's usage

7. Insurance Requirements: Include when specific insurance coverage is required from either party

8. Training and Documentation: Include when specific training and documentation obligations exist

Suggested Schedules

1. Schedule 1 - Software Description: Detailed technical specifications and functionality of the licensed software

2. Schedule 2 - License Fees: Detailed breakdown of license fees, payment schedules, and pricing models

3. Schedule 3 - Technical Requirements: Minimum system requirements and technical specifications for software operation

4. Schedule 4 - Support and Maintenance Terms: Details of support services, maintenance, and updates if included

5. Schedule 5 - Authorized Users: Definition and limitations of authorized users if applicable

6. Appendix A - Acceptable Use Policy: Detailed policies regarding acceptable use of the software

7. Appendix B - Security Requirements: Security protocols and requirements for software usage

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions








































Clauses





























Relevant Industries

Information Technology

Software Development

Financial Services

Healthcare

E-commerce

Manufacturing

Education

Telecommunications

Professional Services

Retail

Banking

Insurance

Government and Public Sector

Media and Entertainment

Relevant Teams

Legal

Information Technology

Procurement

Compliance

Risk Management

Finance

Information Security

Operations

Vendor Management

Software Asset Management

Relevant Roles

Chief Technology Officer

Legal Counsel

IT Director

Procurement Manager

Software License Manager

Compliance Officer

Contract Manager

Information Security Officer

Technology Risk Manager

Business Development Manager

Software Asset Manager

IT Operations Manager

Legal Operations Manager

Chief Information Officer

Vendor Relationship Manager

Industries








Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.