Create a bespoke document in minutes, 聽or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership聽of your information
Third Party Data Sharing Agreement
"I need a Third Party Data Sharing Agreement to allow my Singapore-based fintech company to share customer transaction data with our cloud analytics provider, ensuring PDPA compliance and including specific provisions for cross-border transfers to their US servers."
1. Parties: Identification of data controller and data processor/recipient
2. Background: Context of data sharing arrangement and relationship between parties
3. Definitions: Key terms used throughout the agreement including data categories, processing activities, and compliance requirements
4. Purpose of Data Sharing: Specific purposes for which data will be shared and processed, including scope and limitations
5. Data Protection Obligations: Security measures, compliance requirements, and specific obligations under PDPA
6. Data Handling Procedures: Procedures for collection, processing, storage, and deletion of shared data
7. Confidentiality: Protection of shared data and confidential information, including non-disclosure obligations
8. Term and Termination: Duration of agreement, renewal terms, and conditions for termination
9. Return or Destruction of Data: Procedures for handling data upon termination of agreement
10. General Provisions: Standard contractual terms including governing law, dispute resolution, and entire agreement
1. Cross-border Transfers: Requirements and compliance measures for international data transfers outside Singapore
2. Sector-Specific Compliance: Additional requirements for regulated industries such as banking or healthcare
3. Sub-processing: Terms and conditions for engaging additional data processors or sub-contractors
4. Data Breach Notification: Specific procedures and timelines for reporting data breaches
5. Audit Rights: Terms allowing data controller to audit recipient's compliance
1. Schedule 1 - Data Categories: Detailed list of personal data types to be shared and processed
2. Schedule 2 - Security Requirements: Technical and organizational security measures required for data protection
3. Schedule 3 - Processing Activities: Detailed description of permitted data processing activities and purposes
4. Schedule 4 - Contact Details: Key contacts for data protection matters and breach notification
5. Schedule 5 - Compliance Checklist: Checklist of PDPA and other regulatory requirements
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a 拢1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.