¶¶Òõ¶ÌÊÓÆµ

Controller To Controller DPA Template for Denmark

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Controller To Controller DPA

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Controller To Controller DPA

Document background
This Controller to Controller DPA is essential when two organizations, each acting as independent data controllers under GDPR, need to share personal data in Denmark or across the EU. The document is specifically designed to comply with Danish data protection law and GDPR requirements, providing a robust framework for data sharing arrangements. It should be used whenever organizations need to establish clear protocols for sharing personal data while maintaining their independent controller status. The agreement covers crucial aspects such as security measures, data subject rights, breach notification procedures, and compliance responsibilities, ensuring both parties understand and can meet their obligations under Danish and EU data protection law. This document is particularly important for organizations that regularly exchange personal data as part of their business operations or collaborative projects.
Suggested Sections

1. Parties: Identification of the data controllers entering into the agreement, including their registered addresses and contact details

2. Background: Context of the data sharing relationship and purpose of the agreement

3. Definitions: Key terms used in the agreement, aligned with GDPR definitions and any additional specific terms

4. Scope and Purpose: Detailed description of the data sharing activities and their legitimate purposes

5. Roles and Responsibilities: Clear delineation of each controller's obligations and responsibilities

6. Categories of Data and Data Subjects: Specification of personal data types being shared and categories of data subjects

7. Legal Basis for Processing: Identification of the legal grounds under GDPR for the data sharing

8. Data Protection Principles: Commitment to GDPR principles and how they will be upheld

9. Security Measures: Technical and organizational measures for data protection

10. Data Subject Rights: Procedures for handling data subject requests and ensuring rights are respected

11. Personal Data Breaches: Notification requirements and procedures for handling data breaches

12. Term and Termination: Duration of the agreement and conditions for termination

13. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes

Optional Sections

1. International Transfers: Required when personal data will be transferred outside the EEA, including appropriate safeguards

2. Special Categories of Data: Additional provisions when processing special categories of personal data under Article 9 GDPR

3. Sub-processing: Terms governing the use of sub-processors by either controller

4. Joint Processing Activities: Required when controllers jointly determine purposes and means of specific processing activities

5. Liability and Indemnification: Detailed provisions on allocation of liability between controllers

6. Insurance Requirements: Specific insurance obligations for data protection risks

7. Audit Rights: Provisions for mutual auditing of data protection compliance

Suggested Schedules

1. Schedule 1 - Data Processing Details: Detailed description of data types, processing purposes, and data subject categories

2. Schedule 2 - Technical and Organizational Measures: Detailed security measures implemented by both controllers

3. Schedule 3 - Contact Points and Escalation Procedure: Key contacts and procedures for operational matters and emergencies

4. Schedule 4 - Data Transfer Mechanisms: Details of transfer mechanisms where international transfers occur

5. Schedule 5 - Data Breach Response Plan: Detailed procedures for handling and reporting data breaches

6. Appendix A - Standard Forms: Template forms for data subject requests, breach notifications, and other standard communications

7. Appendix B - Compliance Checklist: Checklist for ongoing compliance monitoring and documentation

Authors

Relevant legal definitions































Clauses























Relevant Industries
Relevant Teams
Relevant Roles
Industries






Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

Joint Controller Agreement

find out more

DPA Contract

find out more

DPA Addendum

find out more

Data Processing Addendum DPA

find out more

Controller To Controller Data Processing Agreement

find out more

Data Controller To Data Controller Agreement

find out more

Intercompany Data Processing Agreement

find out more

Controller To Controller DPA

find out more

DPA Agreement

find out more

Data Transfer Addendum

find out more

Controller Processor Agreement

find out more

Sub Processing Agreement

find out more

International Data Transfer Agreement

find out more

Data Protection Addendum

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.