The Document Library

Terms of Service

The websites, services or applications ("Services") are owned and operated by Confidentiality Corp using the brand and service name. By using the Services, you agree to follow and be bound by these terms of use (the "Terms of Use") and agree to comply with all applicable laws and regulations. It is your responsibility to review these Terms of Use periodically. If at any time you find these Terms of Use unacceptable or if you do not agree to these Terms of Use, please do not use the Services. We may revise these Terms of Use at any time without notice to you. Please also refer to our Privacy Policy, which is hereby incorporated by reference.You agree that by using the Services you represent and warrant that you are legally able to enter into a contract.

Ownership. The Services are owned and operated by Confidentiality Corp. All right, title and interest in and to the materials used as part of providing the Services, including but not limited to software, information, documents, logos, graphics, and images (“Materials”) are owned by Confidentiality Corp. None of the Materials may be copied, reproduced, republished, downloaded, uploaded, posted, sold, licensed, displayed, transmitted or distributed in any way, except as part of legitimate use of the Services by registered users in good standing of the Services, and nothing on this Site or on any Applications shall be construed to confer any license to any of Confidentiality Corp's intellectual property rights, whether by estoppel, implication or otherwise.Limited License. If you are a registered user of the Services in good standing, Co. grants you a limited, non-exclusive, non-transferable license to use a Nondisclosure Agreement (“NDA”) generated by the Services expressly to be used between you and a named second Party who is also a registered user of the Services in good standing; you may not use such agreements in any other circumstance, and you may not copy the content of agreements generated by the Services for use or sale outside of As a registered user of the Services, you are licensed to keep, for your own personal records, electronic or physical copies of documents created by for your account

A complete set of documentation on the Terms of Service can be sent by writing to specifying nature of the request.

Legal Disclaimers

Copyright © 2019 Confidentiality Corp. All rights reserved. Confidentiality Corp provides information and software services only. is not a law firm or a substitute for an attorney or law firm. does not provide legal advice or provide any legal services. Use of is subject to our Terms of Service, and Polices.  The site uses cookies (not chocolate chip kind).

Privacy Policy

Protecting your private information is our priority. This Privacy Policy governs data collection and usage of the products, services, software, platform and websites (collectively, "Services") provided by and any of our subsidiaries or affiliates (collectively, "Confidentiality Corp"). By using the Services, you consent to the data practices described in this policy as well as our Terms of Service . If you do not agree to any part of this Privacy Policy, then you should stop accessing the Services.

For further info on our complete Policies (includes Security, Use of Information, Security of Information) please request a copy by writing

Security of Documents

Agreemint runs on top of a typical server-side web application stack comprised of a web server which controls most of the application logic. A relational database is used for persistence. These components are provisioned inside a virtual private cloud (VPC), which only allows communication within the VPC. The application communicates with the hosts outside the VPC through a firewall which only allows traffic to the web server on a specific port. Even though components within the VPC are isolated, they each contain access control which limits the communicate to other specific hosts and protocols. Communication within the VPC is encrypted, so that even if a component within the VPC is compromised and the access control is configured incorrectly, the compromised component will not be able to eavesdrop on traffic within the VPC.

While the web server inside the VPC can communicate to the outside through the firewall protecting the VPC, it is still not directly exposed to the Internet. Instead, it communicates with a load balancer, which itself is restricted by an access control list. Finally, the load balancer communicates with the outside world via an edge firewall, which is responsible for passing only the desired traffic to the load balancer. Information in the database is secured through several layers. The traffic between the web server and the database server is encrypted. In addition, data-at-rest in encrypted with disk-level encryption. Finally, for sensitive information such as documents, the document data itself is encrypted with a group key, to which Agreemint does not have access. This means that the sensitive data can only be read by parties who have an access key to the document.

For further info on our complete Policies (includes Security, Use of Information, Security of Information) please request a copy by writing is not an attorney or law firm, and can only provide self-help services at your direction. 

Copyright 2018 Confidentiality Corp