Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Acceptable Use Agreement
"I need an Acceptable Use Agreement for our new cloud-based enterprise software platform launching in March 2025, compliant with Saudi Arabian law and covering remote worker access, data protection, and cybersecurity requirements for our 500+ employees in the financial services sector."
1. Parties: Identification of the service provider and the user/customer, including full legal names and contact details
2. Background: Context of the agreement, nature of the service/system being provided, and purpose of the acceptable use terms
3. Definitions: Detailed definitions of technical terms, services, and key concepts used throughout the agreement
4. Scope of Services: Description of the services/systems covered by the acceptable use terms
5. Acceptable Use Terms: Detailed terms outlining permitted uses of the service/system
6. Prohibited Activities: Comprehensive list of prohibited activities and misuse of the service/system
7. User Responsibilities: User obligations for security, access credentials, and proper usage
8. Monitoring and Enforcement: Provider's rights to monitor usage and enforce compliance
9. Security Requirements: Security measures and protocols users must follow
10. Compliance with Laws: Requirements for compliance with Saudi laws, including Anti-Cyber Crime Law and Shariah principles
11. Data Protection and Privacy: Terms regarding data handling and privacy in accordance with Saudi data protection laws
12. Suspension and Termination: Circumstances and procedures for service suspension or agreement termination
13. Liability and Indemnification: Limitations of liability and user indemnification obligations
14. Governing Law and Jurisdiction: Specification of Saudi Arabian law as governing law and jurisdiction for disputes
1. Third-Party Access: Terms governing access by third parties, used when the service allows for third-party integrations or access
2. Content Guidelines: Specific guidelines for user-generated content, included when the service allows content creation or sharing
3. Data Processing Terms: Detailed terms for data processing activities, required when the service involves significant data processing
4. Service Level Commitments: Performance levels and availability commitments, included for critical services
5. Export Control: Terms regarding export restrictions, included when the service may involve cross-border data transfer
6. Intellectual Property Rights: Specific terms regarding IP rights, included when the service involves content creation or licensing
7. Emergency Access: Procedures for emergency access to services, included for critical systems
8. Religious and Cultural Considerations: Specific terms regarding compliance with religious and cultural norms, included when relevant to the service
1. Technical Requirements: Detailed technical specifications and requirements for using the service
2. Security Protocols: Specific security measures and protocols users must implement
3. Acceptable Use Examples: Examples of acceptable and unacceptable use cases
4. Incident Response Procedures: Step-by-step procedures for handling security incidents
5. Fee Schedule: Details of any fees or charges for service usage, if applicable
6. Service Support Details: Contact information and procedures for technical support
7. Compliance Checklist: Checklist of compliance requirements under Saudi law
8. Data Classification Guide: Guidelines for classifying and handling different types of data
Authors
Information Technology
Telecommunications
Financial Services
Healthcare
Education
E-commerce
Government Services
Professional Services
Manufacturing
Media and Entertainment
Energy
Transportation
Retail
Legal
Information Technology
Information Security
Compliance
Risk Management
Digital Operations
Infrastructure
Security Operations
IT Governance
Data Protection
Technical Support
Service Delivery
Chief Information Security Officer
IT Director
Legal Counsel
Compliance Officer
Information Security Manager
Risk Manager
System Administrator
Network Engineer
Data Protection Officer
IT Policy Manager
Security Operations Manager
Digital Services Manager
Technology Compliance Specialist
IT Governance Manager
Find the exact document you need
Email And Internet Usage Policy
A policy document governing email and internet usage in Saudi Arabian organizations, ensuring compliance with local laws while maintaining security and cultural considerations.
Acceptable Use Agreement
A Saudi Arabian law-compliant agreement defining acceptable use terms for technology systems and services, incorporating local regulatory requirements and Shariah principles.
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.