Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Protection Addendum
"I need a Data Protection Addendum for my Australian healthcare software company that will be processing patient data for multiple hospitals in New South Wales, with the agreement planned to start in March 2025."
1. Parties: Identification of the data controller and data processor, including full legal names and contact details
2. Background: Context of the agreement, reference to the main agreement this DPA supplements, and purpose of the data processing relationship
3. Definitions: Key terms used throughout the document, including 'Personal Information', 'Processing', 'Data Breach', and other relevant terminology aligned with Australian Privacy Principles
4. Scope and Application: Details of what data processing activities are covered and how the DPA relates to the main agreement
5. Data Processor Obligations: Core obligations of the data processor including processing limitations, security measures, and compliance with instructions
6. Data Controller Obligations: Responsibilities of the data controller including lawful basis for processing and providing documented instructions
7. Security Requirements: Specific technical and organizational measures required to protect personal information
8. Data Breach Notification: Procedures and timeframes for reporting data breaches in accordance with the Notifiable Data Breaches scheme
9. Subprocessing: Requirements and restrictions for engaging subprocessors
10. Audit Rights: Controller's rights to audit processor's compliance and processor's obligations to demonstrate compliance
11. Term and Termination: Duration of the DPA and circumstances under which it can be terminated
12. Return or Destruction of Data: Obligations regarding personal information upon termination of services
1. Cross-Border Data Transfers: Required when personal information will be transferred outside Australia, detailing compliance with APP 8 and international transfer mechanisms
2. Industry-Specific Requirements: Additional provisions for specific sectors such as healthcare or financial services
3. Data Protection Impact Assessments: Procedures for conducting DPIAs when required for high-risk processing activities
4. Government Access Requests: Procedures for handling government and law enforcement requests for personal information
5. Privacy by Design: Specific requirements for implementing privacy by design principles in processing activities
6. Data Minimization and Retention: Specific requirements for data minimization and retention periods beyond standard obligations
1. Schedule 1 - Processing Activities: Detailed description of all processing activities, including categories of data subjects, types of personal information, and purposes of processing
2. Schedule 2 - Security Measures: Detailed technical and organizational security measures implemented by the processor
3. Schedule 3 - Approved Subprocessors: List of approved subprocessors and their processing activities
4. Schedule 4 - Transfer Mechanisms: Details of mechanisms used for international data transfers, if applicable
5. Appendix A - Data Breach Response Plan: Detailed procedures for identifying, reporting, and responding to data breaches
6. Appendix B - Compliance Checklist: Checklist of compliance requirements and how they are met under the DPA
Authors
Technology and Software
Healthcare and Medical Services
Financial Services
Professional Services
Education
Retail and E-commerce
Telecommunications
Insurance
Government and Public Sector
Manufacturing
Marketing and Advertising
Research and Development
Transportation and Logistics
Legal
Compliance
Information Security
Privacy
Risk Management
Information Technology
Procurement
Operations
Data Governance
Vendor Management
Chief Privacy Officer
Data Protection Officer
Chief Information Security Officer
Privacy Manager
Compliance Officer
Legal Counsel
IT Security Manager
Risk Manager
Privacy Analyst
Information Governance Manager
Operations Director
Procurement Manager
Contract Manager
Chief Technology Officer
Chief Legal Officer
Find the exact document you need
National Data Privacy Agreement
Australian-compliant data privacy agreement template addressing Privacy Act requirements and data protection obligations.
DPA Data Protection Agreement
An Australian-compliant Data Protection Agreement governing the processing of personal information between organizations under the Privacy Act 1988 and APPs.
Joint Controller Data Sharing Agreement
An Australian-law governed agreement establishing terms for joint control and sharing of personal data between organizations, ensuring compliance with Australian privacy legislation.
Data Controller Agreement
An Australian-compliant agreement establishing data controller obligations and responsibilities under the Privacy Act 1988 and related privacy legislation.
Joint Data Controller Agreement
An Australian law-compliant agreement establishing rights and obligations between joint data controllers under the Privacy Act 1988 and APPs.
Non Disclosure Agreement Data Protection
Australian Non-Disclosure Agreement with integrated data protection provisions compliant with the Privacy Act 1988 (Cth) and APPs.
Data Protection Addendum
An Australian law-compliant addendum establishing data protection obligations between data controllers and processors under the Privacy Act 1988 and APPs.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.