Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Information Sharing Agreement
"I need an Information Sharing Agreement for sharing patient data between my hospital and a medical research institute in Malaysia, ensuring PDPA compliance and including specific provisions for handling sensitive medical information, scheduled to begin March 2025."
1. Parties: Identification of all parties to the agreement, including their legal status and registered addresses
2. Background: Context of the agreement, relationship between parties, and general purpose of information sharing
3. Definitions: Detailed definitions of key terms, including types of information, security classifications, and technical terminology
4. Purpose and Scope: Specific objectives of information sharing and boundaries of permitted use
5. Data Protection Principles: Compliance with PDPA 2010 principles and data protection obligations
6. Information Security Requirements: Security measures, protocols, and standards for protecting shared information
7. Confidentiality Obligations: Confidentiality requirements and restrictions on information disclosure
8. Authorized Users: Specification of who can access the shared information and under what conditions
9. Data Handling Procedures: Protocols for data transfer, storage, processing, and disposal
10. Breach Notification: Procedures for reporting and handling data breaches or security incidents
11. Term and Termination: Duration of agreement and conditions for termination
12. Return or Destruction of Information: Procedures for handling shared information upon termination
13. Governing Law and Jurisdiction: Specification of Malaysian law and jurisdiction
1. International Transfer: Include when information will be transferred outside Malaysia, addressing PDPA requirements for cross-border transfers
2. Intellectual Property Rights: Include when shared information includes copyrighted materials or proprietary information
3. Government Authority Requirements: Include when parties are subject to specific government regulations or Official Secrets Act
4. Audit Rights: Include when regular compliance audits are required
5. Insurance Requirements: Include when specific insurance coverage is needed for data protection
6. Cost Allocation: Include when there are significant costs associated with information sharing infrastructure
7. Business Continuity: Include when continuous access to information is critical for operations
1. Schedule 1 - Types of Information: Detailed categorization of information to be shared and their security classifications
2. Schedule 2 - Security Protocols: Technical specifications for security measures and encryption requirements
3. Schedule 3 - Authorized Personnel: List of authorized users and their access levels
4. Schedule 4 - Data Transfer Procedures: Technical procedures for secure data transfer and verification
5. Schedule 5 - Incident Response Plan: Detailed procedures for handling security incidents and breaches
6. Appendix A - Contact Details: Contact information for key personnel and emergency contacts
7. Appendix B - Technical Requirements: Technical specifications for systems and infrastructure
8. Appendix C - Compliance Checklist: Checklist for ensuring compliance with PDPA and other relevant regulations
Authors
Financial Services
Healthcare
Technology
Education
Government
Telecommunications
Research and Development
Manufacturing
Retail
Professional Services
Insurance
Energy
Legal
Information Technology
Compliance
Information Security
Risk Management
Operations
Data Protection
Privacy
Corporate Governance
Project Management
Systems Administration
Information Governance
Chief Information Officer
Data Protection Officer
Chief Privacy Officer
Information Security Manager
Compliance Officer
Legal Counsel
IT Director
Risk Manager
Operations Manager
Project Manager
Systems Administrator
Data Manager
Chief Technology Officer
Information Governance Manager
Find the exact document you need
Sharing Agreement
A Malaysian law-governed agreement establishing terms for sharing resources, assets, or facilities between multiple parties.
Third Party Sharing Agreement
A Malaysian law-governed agreement establishing terms for secure data sharing between organizations, ensuring PDPA compliance and defining parties' rights and obligations.
Information Sharing Agreement
A Malaysian law-governed agreement establishing terms and protocols for secure information sharing between organizations, ensuring PDPA compliance.
Personal Data Sharing Agreement
A Malaysian law-governed agreement establishing terms for personal data sharing between organizations, ensuring PDPA 2010 compliance.
Data Exchange Agreement
A Malaysian law-governed agreement establishing terms for secure data exchange between parties, ensuring compliance with PDPA 2010.
Content Sharing Agreement
A Malaysian law-governed agreement establishing terms for content sharing and distribution between parties, including rights, permissions, and compliance requirements.
Security Sharing Agreement
A Malaysian law-governed agreement establishing rights and priorities among multiple security holders sharing common collateral, including enforcement mechanisms and trustee arrangements.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.