Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Employee Undertaking Agreement
"I need an Employee Undertaking Agreement for a senior software developer in our Manila-based fintech startup, with strong emphasis on intellectual property protection and data privacy compliance, particularly for handling customer financial data."
1. Parties: Identification of the employer and employee, including their complete legal names and addresses
2. Background: Context of the employment relationship and purpose of the undertaking
3. Definitions: Key terms used throughout the agreement, including 'Confidential Information', 'Intellectual Property', and 'Company Property'
4. Duration of Employment: Period of employment and terms regarding notice periods
5. Duties and Responsibilities: Employee's role, reporting structure, and key responsibilities
6. Confidentiality Obligations: Employee's obligations regarding confidential information during and after employment
7. Intellectual Property Rights: Assignment and ownership of intellectual property created during employment
8. Company Property: Handling and return of company property and documents
9. Data Protection: Employee's obligations regarding data privacy and protection
10. Post-Employment Obligations: Continuing obligations after employment termination
11. General Provisions: Standard clauses including governing law, amendments, and severability
12. Execution: Signature blocks and execution formalities
1. Non-Competition: Restrictions on working with competitors, used when employee has access to sensitive competitive information
2. Non-Solicitation: Restrictions on soliciting employees or customers, relevant for client-facing roles
3. Training and Development: Obligations regarding company-provided training and potential reimbursement requirements
4. Remote Work Provisions: Specific obligations and requirements for remote working arrangements
5. Social Media Policy: Guidelines for social media use and online behavior, important for public-facing roles
6. Industry-Specific Compliance: Additional obligations specific to regulated industries (e.g., banking, healthcare)
7. International Travel: Obligations regarding international assignments or travel, if applicable
1. Schedule 1 - Job Description: Detailed description of the employee's role and responsibilities
2. Schedule 2 - Confidential Information: Specific categories of confidential information covered by the agreement
3. Schedule 3 - Company Policies: List of applicable company policies the employee must comply with
4. Appendix A - Code of Conduct: Company's code of conduct and ethical guidelines
5. Appendix B - IT Security Policy: Specific IT and data security requirements
6. Appendix C - Return of Company Property Checklist: Itemized list of company property to be returned upon employment termination
Authors
Technology
Financial Services
Healthcare
Manufacturing
Professional Services
Telecommunications
Retail
Education
Pharmaceuticals
Business Process Outsourcing
Energy
Construction
Media and Entertainment
Real Estate
Human Resources
Legal
Information Technology
Research and Development
Finance
Sales
Marketing
Operations
Product Development
Business Development
Customer Service
Administration
Executive Management
Strategy
Quality Assurance
Chief Executive Officer
Chief Technology Officer
Senior Manager
Software Developer
Research Scientist
Financial Analyst
Human Resources Manager
Sales Executive
Project Manager
Product Manager
Data Analyst
Business Development Manager
Operations Manager
Marketing Manager
Legal Counsel
Systems Administrator
Account Manager
Research and Development Engineer
Department Head
Executive Assistant
Find the exact document you need
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.