¶¶Òõ¶ÌÊÓÆµ

Government Non Disclosure Agreement Template for United States

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Government Non Disclosure Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Government Non Disclosure Agreement

"I need a Government Non Disclosure Agreement for a defense contractor who will be accessing Top Secret information related to naval submarine technology, with specific provisions for international personnel and secure facility requirements."

Document background
Government Non-Disclosure Agreements are essential tools for protecting national security and sensitive government information in the United States. These agreements are required whenever contractors, individuals, or organizations need access to classified or sensitive government information. The document establishes strict protocols for information handling, security clearance requirements, and consequences of unauthorized disclosure. It operates under federal jurisdiction and must comply with various regulations including the National Security Act, Freedom of Information Act, and specific agency requirements. This type of agreement is particularly crucial in defense contracts, intelligence operations, and other sensitive government projects.
Suggested Sections

1. Parties: Identification of the government agency and the recipient of classified/sensitive information

2. Background: Context of the disclosure relationship and purpose of the agreement

3. Definitions: Key terms including 'Classified Information', 'Sensitive Information', 'Need to Know', etc.

4. Scope of Confidential Information: Detailed description of what constitutes protected information

5. Security Clearance Requirements: Required clearance levels and verification procedures

6. Obligations of Recipient: Specific duties regarding handling and protecting information

7. Term and Termination: Duration of obligations and termination conditions

8. Return or Destruction of Information: Procedures for handling protected information upon termination

Optional Sections

1. International Transfer Restrictions: Required when information might cross borders or when dealing with international contractors or foreign involvement

2. Specific Agency Requirements: Agency-specific handling procedures, required when dealing with specific agencies (DoD, DOE, etc.)

3. Subcontractor Requirements: Rules for sharing with subcontractors, required when subcontractors may be involved

Suggested Schedules

1. Security Procedures Manual: Detailed procedures for handling classified information

2. Authorized Personnel List: List of individuals cleared to access the information

3. Classification Guide: Guidelines for identifying and marking classified information

4. Incident Reporting Procedures: Steps to follow in case of security breaches

5. Facility Clearance Documentation: Proof of facility security clearance if required

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Clauses






























Industries

National Security Act of 1947: Fundamental law that established the structure of U.S. national security organizations and procedures for handling classified information

Freedom of Information Act (FOIA): Law governing public access to federal government records, with exemptions for classified and sensitive information

Trade Secrets Act: Federal law (18 U.S.C. ยง 1905) prohibiting federal employees from disclosing confidential government information

Privacy Act of 1974: Regulates the collection, maintenance, use, and dissemination of personal information by federal agencies

Intelligence Identities Protection Act: Criminalizes the intentional disclosure of information identifying covert intelligence officers

Classified Information Procedures Act: Establishes procedures for handling classified information in federal criminal proceedings

Executive Order 13526: Prescribes a uniform system for classifying, safeguarding, and declassifying national security information

Executive Order 12829: Establishes the National Industrial Security Program to safeguard classified information released to contractors

Federal Acquisition Regulation (FAR): Primary regulation for federal government procurement, including provisions for handling sensitive information

Defense Federal Acquisition Regulation Supplement: DoD-specific procurement regulations including additional requirements for classified information protection

18 U.S.C. ยง 793: Criminal statute concerning gathering, transmitting, or losing defense information

18 U.S.C. ยง 798: Criminal statute specifically addressing disclosure of classified information

FISMA: Federal Information Security Management Act establishing information security standards for federal agencies

NIST Special Publications: Technical standards and guidelines for information security and data protection

State Trade Secret Laws: State-specific regulations protecting government and private sector trade secrets

Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.