Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the reviewing organization and the client organization
2. Background: Context of the QMS review, including the client's current certification status and reason for review
3. Definitions: Key terms used throughout the document, including technical QMS terminology
4. Scope of Review: Detailed outline of what aspects of the QMS will be reviewed and any exclusions
5. Review Methodology: The approach and methods to be used in conducting the QMS review
6. Timeline and Milestones: Specific timeframes for different phases of the review process
7. Obligations of the Reviewer: Responsibilities and commitments of the reviewing organization
8. Client Responsibilities: Required cooperation, access, and resources to be provided by the client
9. Deliverables: Specific outputs and reports to be provided as part of the review
10. Confidentiality: Provisions for handling sensitive information accessed during the review
11. Fees and Payment Terms: Cost structure and payment schedule for the review services
12. General Terms: Standard contractual provisions including governing law, notices, and amendment procedures
1. Certification Support: Include when the review is part of certification preparation or maintenance
2. Training Provisions: Include when staff training on findings is part of the scope
3. Remedial Action Plan: Include when the reviewer will assist in developing correction plans
4. Follow-up Review: Include when subsequent reviews are planned to verify improvements
5. Multi-site Provisions: Include when review covers multiple client locations
6. Industry-Specific Requirements: Include when specific industry standards or regulations apply
1. Schedule A - Review Checklist: Detailed checklist of all QMS elements to be reviewed
2. Schedule B - Required Documentation: List of documents and records the client must provide
3. Schedule C - Review Team: Qualifications and roles of review team members
4. Schedule D - Applicable Standards: Specific ISO and industry standards against which the QMS will be reviewed
5. Schedule E - Fee Structure: Detailed breakdown of fees and payment milestones
6. Appendix 1 - Review Ƶ: Standard forms and templates to be used during the review
7. Appendix 2 - Reporting Format: Template and requirements for the final review report
8. Appendix 3 - Compliance Criteria: Specific criteria used to assess compliance levels
Find the exact document you need
Construction Risk Assessment Monitoring And Review Plan
A comprehensive construction risk assessment and monitoring framework compliant with South African OHS Act and Construction Regulations.
Quality Management System Review
A South African law-compliant agreement for conducting a comprehensive Quality Management System Review, aligned with national standards and ISO requirements.
Management Review Policy
A South African-compliant policy document outlining procedures and requirements for conducting organizational management reviews, aligned with local corporate governance standards.
Management Review Plan
A South African law-compliant framework document establishing procedures for systematic management system reviews, aligned with local regulations and corporate governance requirements.
360 Degree Management Review
A South African-compliant framework for conducting comprehensive 360-degree management performance reviews, including multi-source feedback processes and legal safeguards.
360 Degree Feedback Performance Appraisal
A South African law-compliant agreement establishing procedures and guidelines for conducting 360-degree feedback performance appraisals.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
