Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Parties: Identification of the parties entering into the agreement - the security assessment provider and the client organization
2. Background: Context of the agreement, including the client's need for security assessment and the provider's qualifications
3. Definitions: Detailed definitions of technical and legal terms used throughout the agreement
4. Scope of Services: Detailed description of the security assessment services to be provided, including types of testing and assessment methodologies
5. Service Provider Obligations: Key responsibilities and commitments of the security assessment provider
6. Client Obligations: Client's responsibilities including access provision, information sharing, and cooperation requirements
7. Timeline and Deliverables: Specific timeframes for the assessment and description of all deliverables
8. Confidentiality: Provisions for handling sensitive information discovered during the assessment
9. Data Protection and Privacy: GDPR compliance and data handling requirements
10. Intellectual Property: Ownership of assessment results, reports, and methodologies
11. Fees and Payment: Pricing structure, payment terms, and expenses
12. Liability and Indemnification: Limitation of liability and indemnification provisions specific to security assessment risks
13. Term and Termination: Duration of the agreement and termination conditions
14. General Provisions: Standard legal provisions including governing law, dispute resolution, and notices
1. Emergency Response: Procedures for handling critical vulnerabilities discovered during assessment - include when offering emergency response services
2. Retesting Provisions: Terms for retesting after remediation - include when offering post-remediation verification services
3. Third-Party Tools: Provisions regarding use of third-party security testing tools - include when specific tools are part of the methodology
4. Personnel Security: Requirements for security clearance and vetting of assessment team - include for high-security environments
5. Insurance Requirements: Specific cyber insurance requirements - include for high-value or high-risk assessments
6. Regulatory Compliance: Specific regulatory framework compliance - include when assessment involves regulated industries
7. Cross-Border Data Transfers: Provisions for international data transfers - include when assessment involves multiple jurisdictions
1. Schedule A - Assessment Methodology: Detailed technical methodology and testing procedures
2. Schedule B - Scope of Systems: Detailed list of systems, applications, and infrastructure in scope
3. Schedule C - Pricing and Payment Schedule: Detailed breakdown of fees, payment milestones, and any variable costs
4. Schedule D - Service Levels: Performance metrics and service level commitments
5. Schedule E - Security Requirements: Specific security requirements and controls for conducting the assessment
6. Appendix 1 - Report Template: Template and format for the security assessment report
7. Appendix 2 - Incident Response Procedures: Procedures for handling and reporting security incidents during assessment
8. Appendix 3 - Contact Details: Key contacts and escalation procedures for both parties
Financial Services
Healthcare
Technology
Telecommunications
Manufacturing
Energy and Utilities
Government and Public Sector
Retail
Transportation and Logistics
Professional Services
Education
Insurance
Critical Infrastructure
Legal
Information Security
IT Operations
Risk Management
Compliance
Procurement
Information Technology
Data Protection
Internal Audit
Enterprise Architecture
Infrastructure Security
Application Security
Chief Information Security Officer (CISO)
Chief Technology Officer (CTO)
Information Security Manager
Risk Manager
Compliance Officer
Legal Counsel
IT Director
Security Operations Manager
Data Protection Officer
Procurement Manager
Contract Manager
Security Auditor
IT Project Manager
Chief Risk Officer
Chief Legal Officer
Find the exact document you need
Science Risk Assessment
A comprehensive risk assessment document for scientific research activities, compliant with Dutch and EU safety regulations and research standards.
Risk Assessment For Catering
A Dutch-compliant risk assessment document for catering operations, covering food safety, workplace hazards, and control measures under Netherlands regulations.
Museum Risk Assessment
A Dutch-law compliant risk assessment document for museums, evaluating operational, collection, and safety risks while ensuring regulatory compliance.
Local Risk Assessment
A mandatory workplace risk assessment document under Dutch law that identifies, analyzes, and evaluates occupational hazards and safety measures in compliance with Netherlands RI&E requirements.
Fraud Risk Assessment For Banks
A Dutch-compliant fraud risk assessment framework for banking institutions, aligned with DNB requirements and EU regulations.
Beauty Risk Assessment
A Dutch-compliant risk assessment document for beauty treatments, incorporating medical history review and treatment-specific risk evaluation under Netherlands healthcare regulations.
Simple Fire Risk Assessment
A Dutch-compliant fire risk assessment document evaluating fire hazards and safety measures according to local regulations and the Arbowet.
Risk Assessment Policy
A policy document establishing risk assessment procedures and responsibilities in compliance with Dutch legislation and regulations.
Liquidity Risk Assessment
A regulatory-compliant assessment of an institution's liquidity risk profile and management framework under Dutch and EU financial regulations.
Information Technology Risk Assessment
Dutch-law governed IT Risk Assessment agreement establishing framework for comprehensive technology risk evaluation, compliant with EU and Dutch regulations.
Home Working Risk Assessment
A Dutch law-compliant assessment document for evaluating and managing health and safety risks associated with home-based working arrangements.
Cyber Security Assessment
Dutch-law governed agreement for cybersecurity assessment services, defining assessment scope, methodology, and compliance requirements.
Business Risk Assessment
A Dutch law-compliant business risk assessment document that identifies and analyzes organizational risks while providing mitigation strategies.
Risk Assessment Executive Summary
A Dutch law-compliant executive summary document outlining key organizational risks, impacts, and mitigation strategies for senior management decision-making.
Remote Access Risk Assessment
A technical and legal assessment of remote access systems and associated risks, compliant with Dutch and EU regulations.
Workstation Risk Assessment
A Dutch regulatory-compliant assessment document evaluating workplace computer station safety and ergonomics, providing analysis and improvement recommendations under Arbowet requirements.
Risk Assessment Letter
A formal document under Dutch law that evaluates and documents organizational or project risks, providing analysis and mitigation recommendations while ensuring compliance with Dutch regulatory requirements.
Rapid Risk Assessment
A Dutch-compliant rapid evaluation tool for identifying and addressing workplace hazards and risks, aligned with the Arbeidsomstandighedenwet requirements.
Hot Works Risk Assessment
A Dutch-compliant risk assessment document for managing safety hazards in hot works operations, aligned with Arbeidsomstandighedenwet requirements.
Cyber Security Risk Assessment Matrix
A structured cybersecurity risk assessment document compliant with Dutch and EU regulations, used to evaluate and document organizational cyber risks and mitigation strategies.
Compressed Air Risk Assessment
A Dutch law-compliant risk assessment document for evaluating safety aspects of compressed air systems in industrial settings, ensuring compliance with local and EU safety standards.
Building Risk Assessment
A comprehensive risk evaluation document for construction projects in the Netherlands, ensuring compliance with Dutch building and safety regulations while protecting workers and public safety.
Bribery And Corruption Risk Assessment
A Dutch law-compliant assessment document analyzing organizational bribery and corruption risks, evaluating control measures, and providing recommendations for enhanced compliance.
Program Risk Assessment
A Dutch law-compliant document that assesses and documents program-related risks, providing comprehensive risk analysis and mitigation strategies.
Organisational Risk Assessment
A comprehensive risk assessment document compliant with Dutch law and EU regulations, identifying and analyzing organizational risks with proposed mitigation strategies.
Machine Guarding Risk Assessment
A technical assessment document evaluating machinery guarding systems and safety measures under Dutch and EU regulations, providing risk analysis and compliance recommendations.
Demolition Risk Assessment
A mandatory technical document under Dutch law that evaluates and addresses safety risks associated with demolition projects, ensuring compliance with national safety and environmental regulations.
Data Breach Assessment
A formal assessment document analyzing a data breach incident and its impacts, prepared in compliance with Dutch data protection laws and GDPR requirements.
Return To Work Risk Assessment
A Dutch-compliant workplace risk assessment document facilitating safe employee return to work, aligned with Arbowet requirements and including necessary workplace modifications and control measures.
Project Risk Assessment
A Dutch-compliant risk assessment document that identifies, analyzes, and provides mitigation strategies for project-related risks under Netherlands jurisdiction.
Cleaning Risk Assessment
A Dutch law-compliant risk assessment document for identifying and controlling hazards in cleaning operations, ensuring workplace safety and regulatory compliance.
Project Risk Assessment Process
A comprehensive Project Risk Assessment Process document aligned with Dutch legislation and international best practices for systematic project risk management.
Audit Risk Assessment Matrix
A structured risk assessment tool used in Dutch audit engagements that complies with local and EU audit regulations while documenting and evaluating various audit risks.
High Level Risk Assessment
A Dutch law-compliant high-level risk assessment document for identifying and evaluating organizational risks while ensuring regulatory compliance.
Modern Slavery Risk Assessment
A Dutch law-compliant assessment framework for identifying and mitigating modern slavery risks in operations and supply chains.
Vulnerability Assessment Matrix
A Dutch-compliant framework for systematically assessing and documenting organizational security vulnerabilities, aligned with local cybersecurity regulations and GDPR requirements.
Cloud Computing Risk Assessment
A detailed risk assessment for cloud computing services compliant with Dutch and EU regulations, evaluating security, compliance, and operational risks.
Hazard Identification Form
A Dutch-compliant workplace hazard identification and assessment document required under the Arbowet for documenting and managing workplace safety risks.
Procurement Risk Assessment Matrix
A structured framework for assessing procurement risks under Dutch law, incorporating EU procurement directives and local regulatory requirements.
Vulnerable Person Risk Assessment
A Dutch-law compliant risk assessment document for evaluating and managing risks associated with vulnerable individuals, ensuring appropriate care and protection measures.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it