Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Processing Addendum DPA
1. Parties: Identification of the data controller and data processor, including their legal representatives
2. Background: Context of the relationship between parties and purpose of the DPA
3. Definitions: Key terms used in the agreement, including GDPR-specific terminology
4. Scope and Purpose: Detailed description of the processing activities covered by the DPA
5. Controller's Rights and Obligations: Responsibilities and authorities of the data controller
6. Processor's Obligations: Core obligations of the processor including security measures, confidentiality, and assistance requirements
7. Sub-processors: Rules and procedures for engaging sub-processors
8. Data Transfers: Requirements and safeguards for international data transfers
9. Data Subject Rights: Procedures for handling data subject requests and processor's assistance obligations
10. Data Breach Notification: Procedures and timelines for reporting data breaches
11. Audit Rights: Controller's audit rights and processor's obligations to demonstrate compliance
12. Term and Termination: Duration of the DPA and termination provisions
13. Return or Deletion of Data: Obligations regarding personal data upon termination
14. Liability and Indemnification: Allocation of liability and indemnification obligations
15. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction
1. Insurance Requirements: Specific insurance obligations for the processor, recommended for high-risk processing
2. Special Categories of Data: Additional safeguards for processing sensitive data, required when processing special categories of personal data
3. Data Protection Impact Assessments: Processor's obligations regarding DPIAs, needed for high-risk processing
4. Processor's Personnel: Specific requirements for processor's staff, recommended for processing requiring special qualifications
5. Business Continuity: Business continuity and disaster recovery requirements, recommended for critical processing activities
6. Exit Management: Detailed exit procedures, recommended for complex processing arrangements
1. Description of Processing: Detailed description of processing activities, including categories of data subjects, types of personal data, and processing purposes
2. Technical and Organizational Measures: Detailed security measures implemented by the processor
3. Approved Sub-processors: List of approved sub-processors and their processing activities
4. Transfer Mechanisms: Details of transfer mechanisms for international data transfers, including SCCs if applicable
5. Contact Points and Procedures: Key contacts and detailed procedures for operational matters
6. Audit Requirements: Specific audit procedures and requirements
7. Data Breach Response Plan: Detailed procedures for handling and reporting data breaches
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.