Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Controller To Controller DPA
1. Parties: Identification of the data controllers entering into the agreement, including their registered addresses and contact details
2. Background: Context of the data sharing relationship and purpose of the agreement
3. Definitions: Key terms used in the agreement, aligned with GDPR definitions and any additional specific terms
4. Scope and Purpose: Detailed description of the data sharing activities and their legitimate purposes
5. Roles and Responsibilities: Clear delineation of each controller's obligations and responsibilities
6. Categories of Data and Data Subjects: Specification of personal data types being shared and categories of data subjects
7. Legal Basis for Processing: Identification of the legal grounds under GDPR for the data sharing
8. Data Protection Principles: Commitment to GDPR principles and how they will be upheld
9. Security Measures: Technical and organizational measures for data protection
10. Data Subject Rights: Procedures for handling data subject requests and ensuring rights are respected
11. Personal Data Breaches: Notification requirements and procedures for handling data breaches
12. Term and Termination: Duration of the agreement and conditions for termination
13. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. International Transfers: Required when personal data will be transferred outside the EEA, including appropriate safeguards
2. Special Categories of Data: Additional provisions when processing special categories of personal data under Article 9 GDPR
3. Sub-processing: Terms governing the use of sub-processors by either controller
4. Joint Processing Activities: Required when controllers jointly determine purposes and means of specific processing activities
5. Liability and Indemnification: Detailed provisions on allocation of liability between controllers
6. Insurance Requirements: Specific insurance obligations for data protection risks
7. Audit Rights: Provisions for mutual auditing of data protection compliance
1. Schedule 1 - Data Processing Details: Detailed description of data types, processing purposes, and data subject categories
2. Schedule 2 - Technical and Organizational Measures: Detailed security measures implemented by both controllers
3. Schedule 3 - Contact Points and Escalation Procedure: Key contacts and procedures for operational matters and emergencies
4. Schedule 4 - Data Transfer Mechanisms: Details of transfer mechanisms where international transfers occur
5. Schedule 5 - Data Breach Response Plan: Detailed procedures for handling and reporting data breaches
6. Appendix A - Standard Forms: Template forms for data subject requests, breach notifications, and other standard communications
7. Appendix B - Compliance Checklist: Checklist for ongoing compliance monitoring and documentation
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.