Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Aup Agreement
"I need an AUP Agreement for my cloud computing services company based in Manila, covering standard security protocols and data privacy requirements for business clients, with specific provisions for third-party integrations and API usage."
1. Parties: Identification of the service provider and the user/organization to whom the AUP applies
2. Background: Context of the agreement, including the nature of services provided and purpose of the AUP
3. Definitions: Clear definitions of technical terms, services, and key concepts used throughout the agreement
4. Scope of Services: Detailed description of the services covered by the AUP
5. Acceptable Use Terms: Specific rules and guidelines for acceptable use of the services
6. Prohibited Activities: Explicit listing of forbidden activities and behaviors
7. Security Requirements: Mandatory security measures and practices users must follow
8. Data Privacy and Protection: Terms relating to data handling and privacy compliance with Philippine Data Privacy Act
9. User Responsibilities: Specific obligations and duties of users when utilizing the services
10. Monitoring and Enforcement: Details of how compliance will be monitored and violations addressed
11. Consequences of Violation: Specific penalties and actions for breach of the AUP
12. Term and Termination: Duration of the agreement and conditions for termination
13. Governing Law: Specification of Philippine law as governing law and jurisdiction
1. Service Level Commitments: Include when specific service levels are guaranteed as part of the agreement
2. Third Party Access: Include when users may grant access to third parties or contractors
3. Industry-Specific Compliance: Include when the AUP applies to regulated industries with specific compliance requirements
4. Emergency Changes: Include when provider needs right to make immediate changes for security or regulatory compliance
5. Bandwidth and Resource Usage: Include when services have specific resource limitations or restrictions
6. Content Guidelines: Include when users can create or upload content to the service
1. Schedule A - Acceptable Use Standards: Detailed technical specifications and standards for acceptable use
2. Schedule B - Security Requirements: Detailed security protocols and requirements
3. Schedule C - Fee Schedule: If applicable, details of any fees or charges for service usage
4. Appendix 1 - Incident Response Procedures: Step-by-step procedures for handling security incidents or violations
5. Appendix 2 - Technical Requirements: Specific technical requirements for using the service
6. Appendix 3 - Contact Information: Key contacts for support, violations reporting, and escalation procedures
Authors
Information Technology
Telecommunications
Financial Services
Healthcare
Education
E-commerce
Professional Services
Government
Manufacturing
Media and Entertainment
Cloud Services
Retail
Legal
Information Technology
Information Security
Compliance
Risk Management
Human Resources
Operations
Digital Services
Privacy
Infrastructure
Technical Support
Corporate Communications
Chief Information Officer
IT Director
Information Security Manager
Compliance Officer
Legal Counsel
System Administrator
Network Manager
Data Protection Officer
Risk Manager
IT Security Analyst
Operations Manager
Human Resources Director
Digital Services Manager
Chief Technology Officer
Privacy Officer
Find the exact document you need
Email And Internet Usage Policy
A policy document governing email and internet usage in Philippine organizations, ensuring compliance with local data privacy and cybersecurity laws.
Aup Agreement
A Philippine-compliant legal agreement defining acceptable use terms and conditions for IT services, including security requirements and user responsibilities under local data privacy and cybercrime laws.
Acceptable Use Agreement
A Philippine-compliant Acceptable Use Agreement outlining terms and conditions for digital service usage, incorporating local data privacy and cybersecurity requirements.
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.