Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Processing Agreement Addendum
"I need a Data Processing Agreement Addendum for our Australian healthcare software company that will be engaging a cloud service provider in Singapore to process patient data, with specific emphasis on cross-border data transfers and healthcare privacy compliance."
1. Parties: Identification of the data controller and data processor, including full legal names and contact details
2. Background: Context of the agreement, reference to the main agreement this addendum relates to, and the purpose of the data processing activities
3. Definitions: Key terms used in the agreement, including 'Personal Information', 'Processing', 'Data Controller', 'Data Processor', 'Privacy Laws' and other relevant terms
4. Scope and Purpose of Processing: Detailed description of the data processing activities, types of personal information involved, and permitted purposes
5. Obligations of the Data Processor: Core responsibilities including processing only on documented instructions, maintaining confidentiality, implementing security measures, and assisting with data subject requests
6. Data Security Measures: Specific technical and organizational security measures required to protect personal information
7. Sub-processors: Conditions and requirements for engaging sub-processors, including approval processes
8. Data Breach Notification: Procedures and timeframes for reporting data breaches in accordance with the Notifiable Data Breaches scheme
9. Audit Rights: Controller's rights to audit the processor's compliance and processor's obligations to demonstrate compliance
10. Term and Termination: Duration of the addendum and specific termination rights related to data processing
11. Return or Deletion of Data: Obligations regarding personal information upon termination of services
12. Governing Law and Jurisdiction: Confirmation of Australian law as governing law and jurisdiction for disputes
1. Cross-border Data Transfers: Required when personal information will be transferred outside Australia, including specific safeguards and compliance measures
2. Industry-Specific Requirements: Additional provisions required for specific sectors (e.g., healthcare, financial services)
3. Data Protection Impact Assessment: Procedures for conducting DPIAs when required for high-risk processing activities
4. Processor Personnel: Specific requirements for processor's staff accessing personal information, including training and confidentiality obligations
5. Insurance Requirements: Specific insurance obligations related to data processing activities and cyber risks
6. Business Continuity: Requirements for maintaining business continuity and disaster recovery plans for data processing activities
1. Schedule 1 - Processing Activities: Detailed description of processing activities, including categories of data subjects, types of personal information, and processing purposes
2. Schedule 2 - Security Measures: Detailed technical and organizational security measures to be implemented
3. Schedule 3 - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule 4 - Cross-border Transfer Mechanisms: Details of mechanisms used for international data transfers, if applicable
5. Appendix A - Data Breach Response Plan: Detailed procedures for identifying, reporting, and managing data breaches
6. Appendix B - Compliance Checklist: Checklist of compliance requirements under Australian privacy laws
Authors
Technology and Software
Healthcare and Medical Services
Financial Services
Professional Services
E-commerce and Retail
Education
Telecommunications
Insurance
Government and Public Sector
Manufacturing
Marketing and Advertising
Research and Development
Cloud Services
Consulting
Legal
Compliance
Information Security
IT
Risk Management
Procurement
Operations
Data Governance
Privacy
Information Management
Vendor Management
Chief Privacy Officer
Data Protection Officer
Privacy Manager
Chief Information Security Officer
Legal Counsel
Compliance Manager
IT Director
Risk Manager
Operations Manager
Procurement Manager
Contract Manager
Chief Technology Officer
Information Security Manager
Privacy Analyst
Data Governance Manager
Find the exact document you need
Personal Information Processing Agreement
An Australian law-governed agreement establishing terms for personal information processing between controllers and processors, ensuring compliance with the Privacy Act 1988 and APPs.
DPA Data Processing Addendum
An Australian-law compliant agreement that establishes terms for processing personal information under the Privacy Act 1988 and APPs, defining data handling obligations between controllers and processors.
Data Processing Agreement Addendum
An Australian-compliant addendum governing data processing responsibilities between controllers and processors under the Privacy Act 1988.
Joint Controller Agreement
An Australian law-governed agreement establishing rights and obligations between joint controllers of personal data under the Privacy Act 1988.
Intra Group Data Sharing Agreement
An Australian law-governed agreement regulating data sharing between entities within the same corporate group, ensuring compliance with privacy laws and data protection requirements.
Dpia Agreement
An Australian agreement governing the conduct of Data Protection Impact Assessments under the Privacy Act 1988 and related privacy laws.
Subprocessor Agreement
An Australian legal agreement governing data processing arrangements between a processor and subprocessor, ensuring compliance with Australian privacy laws and data protection requirements.
Master Data Protection Agreement
An Australian law-governed agreement establishing data protection obligations between parties, ensuring compliance with the Privacy Act 1988 and related privacy legislation.
Controller To Controller Data Processing Agreement
An Australian law-compliant agreement governing personal data sharing between two independent data controllers, ensuring Privacy Act 1988 and APP compliance.
Intra Group Data Transfer Agreement
An Australian law-compliant agreement governing data transfers between entities within the same corporate group, ensuring privacy law compliance and operational efficiency.
Data Management Agreement
An Australian law-governed agreement establishing data management and protection obligations between parties, ensuring compliance with Privacy Act 1988 and related legislation.
Intercompany Data Processing Agreement
An Australian law-governed agreement regulating data processing activities between related companies within the same corporate group.
Controller To Controller DPA
An Australian law-compliant agreement governing personal data sharing between two independent data controllers, ensuring Privacy Act compliance and data protection.
Intercompany Data Sharing Agreement
An Australian-law governed agreement for regulated data sharing between related corporate entities, incorporating privacy law compliance and data protection measures.
DPA Agreement
An Australian-law compliant agreement governing personal information processing between controllers and processors, ensuring adherence to the Privacy Act 1988 and APPs.
Third Party Data Processing Agreement
An Australian-compliant agreement governing the processing of personal information by third-party service providers under Privacy Act 1988 and APPs.
Data Transfer Addendum
An Australian law-compliant addendum governing data transfer arrangements between parties, ensuring compliance with the Privacy Act 1988 and APPs.
Supplier Data Processing Agreement
An Australian-law governed agreement setting out terms for processing personal information between an organization and its supplier, ensuring compliance with Australian privacy laws.
Controller Processor Agreement
An Australian law-compliant agreement governing the processing of personal data between a controller and processor, aligned with the Privacy Act 1988 and APPs.
Order Processing Agreement
An Australian-law governed agreement establishing terms for order processing services, including operational procedures, compliance requirements, and service levels.
Data Protection Agreement For Employees
An Australian-compliant employee data protection agreement establishing rights and obligations for handling personal information in the employment context.
Affiliate Addendum
An Australian law-governed addendum establishing terms and conditions for affiliate marketing relationships, including commercial terms and compliance requirements.
Sub Processing Agreement
An Australian-law governed agreement that establishes terms for sub-processing of personal data, ensuring compliance with privacy laws and data protection requirements.
International Data Transfer Agreement
An Australian law-compliant agreement governing cross-border data transfers, ensuring protection of personal information under the Privacy Act 1988 and APPs.
Data Transfer Agreement
An Australian law-governed agreement establishing terms for secure and compliant data transfer between organizations, ensuring adherence to Australian privacy regulations.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.