¶¶Òõ¶ÌÊÓÆµ

Data Protection Addendum Template for Australia

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Data Protection Addendum

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Data Protection Addendum

"I need a Data Protection Addendum for my Australian healthcare software company that will be processing patient data for multiple hospitals in New South Wales, with the agreement planned to start in March 2025."

Document background
A Data Protection Addendum (DPA) is essential for organizations operating in Australia that engage in the collection, processing, or transfer of personal information. This document is typically used when one organization (the data controller) engages another (the data processor) to process personal information on its behalf. The DPA ensures compliance with the Privacy Act 1988, Australian Privacy Principles, and the Notifiable Data Breaches scheme. It becomes particularly crucial when organizations share sensitive data, engage cloud service providers, or transfer data internationally. The addendum outlines specific security measures, breach notification procedures, audit rights, and data handling requirements, providing a framework for privacy-compliant data processing operations.
Suggested Sections

1. Parties: Identification of the data controller and data processor, including full legal names and contact details

2. Background: Context of the agreement, reference to the main agreement this DPA supplements, and purpose of the data processing relationship

3. Definitions: Key terms used throughout the document, including 'Personal Information', 'Processing', 'Data Breach', and other relevant terminology aligned with Australian Privacy Principles

4. Scope and Application: Details of what data processing activities are covered and how the DPA relates to the main agreement

5. Data Processor Obligations: Core obligations of the data processor including processing limitations, security measures, and compliance with instructions

6. Data Controller Obligations: Responsibilities of the data controller including lawful basis for processing and providing documented instructions

7. Security Requirements: Specific technical and organizational measures required to protect personal information

8. Data Breach Notification: Procedures and timeframes for reporting data breaches in accordance with the Notifiable Data Breaches scheme

9. Subprocessing: Requirements and restrictions for engaging subprocessors

10. Audit Rights: Controller's rights to audit processor's compliance and processor's obligations to demonstrate compliance

11. Term and Termination: Duration of the DPA and circumstances under which it can be terminated

12. Return or Destruction of Data: Obligations regarding personal information upon termination of services

Optional Sections

1. Cross-Border Data Transfers: Required when personal information will be transferred outside Australia, detailing compliance with APP 8 and international transfer mechanisms

2. Industry-Specific Requirements: Additional provisions for specific sectors such as healthcare or financial services

3. Data Protection Impact Assessments: Procedures for conducting DPIAs when required for high-risk processing activities

4. Government Access Requests: Procedures for handling government and law enforcement requests for personal information

5. Privacy by Design: Specific requirements for implementing privacy by design principles in processing activities

6. Data Minimization and Retention: Specific requirements for data minimization and retention periods beyond standard obligations

Suggested Schedules

1. Schedule 1 - Processing Activities: Detailed description of all processing activities, including categories of data subjects, types of personal information, and purposes of processing

2. Schedule 2 - Security Measures: Detailed technical and organizational security measures implemented by the processor

3. Schedule 3 - Approved Subprocessors: List of approved subprocessors and their processing activities

4. Schedule 4 - Transfer Mechanisms: Details of mechanisms used for international data transfers, if applicable

5. Appendix A - Data Breach Response Plan: Detailed procedures for identifying, reporting, and responding to data breaches

6. Appendix B - Compliance Checklist: Checklist of compliance requirements and how they are met under the DPA

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions



































Clauses




























Relevant Industries

Technology and Software

Healthcare and Medical Services

Financial Services

Professional Services

Education

Retail and E-commerce

Telecommunications

Insurance

Government and Public Sector

Manufacturing

Marketing and Advertising

Research and Development

Transportation and Logistics

Relevant Teams

Legal

Compliance

Information Security

Privacy

Risk Management

Information Technology

Procurement

Operations

Data Governance

Vendor Management

Relevant Roles

Chief Privacy Officer

Data Protection Officer

Chief Information Security Officer

Privacy Manager

Compliance Officer

Legal Counsel

IT Security Manager

Risk Manager

Privacy Analyst

Information Governance Manager

Operations Director

Procurement Manager

Contract Manager

Chief Technology Officer

Chief Legal Officer

Industries








Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

National Data Privacy Agreement

Australian-compliant data privacy agreement template addressing Privacy Act requirements and data protection obligations.

find out more

DPA Data Protection Agreement

An Australian-compliant Data Protection Agreement governing the processing of personal information between organizations under the Privacy Act 1988 and APPs.

find out more

Joint Controller Data Sharing Agreement

An Australian-law governed agreement establishing terms for joint control and sharing of personal data between organizations, ensuring compliance with Australian privacy legislation.

find out more

Data Controller Agreement

An Australian-compliant agreement establishing data controller obligations and responsibilities under the Privacy Act 1988 and related privacy legislation.

find out more

Joint Data Controller Agreement

An Australian law-compliant agreement establishing rights and obligations between joint data controllers under the Privacy Act 1988 and APPs.

find out more

Non Disclosure Agreement Data Protection

Australian Non-Disclosure Agreement with integrated data protection provisions compliant with the Privacy Act 1988 (Cth) and APPs.

find out more

Data Protection Addendum

An Australian law-compliant addendum establishing data protection obligations between data controllers and processors under the Privacy Act 1988 and APPs.

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.