Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Transfer Addendum
1. Parties: Identification of the data exporter and data importer, including their roles as controller/processor
2. Background: Context of the data transfer relationship and reference to the main agreement
3. Definitions: Key terms specific to data transfer, including those from GDPR and Danish Data Protection Act
4. Scope and Purpose: Details of the data transfers covered, including types of data and processing purposes
5. Roles and Responsibilities: Specific obligations of each party under data protection laws
6. Transfer Mechanisms: Legal basis for transfers and compliance with transfer requirements
7. Security Measures: Technical and organizational measures for data protection
8. Data Subject Rights: Procedures for handling data subject requests and rights
9. Breach Notification: Requirements and procedures for reporting data breaches
10. Audit Rights: Provisions for monitoring and verifying compliance
11. Term and Termination: Duration of the addendum and termination provisions
12. Governing Law: Confirmation of Danish law application and jurisdiction
1. Third Country Transfers: Additional safeguards for transfers outside EEA - include when transfers to non-adequate countries are involved
2. Sub-processor Provisions: Requirements for engaging sub-processors - include when sub-processors will be used
3. Special Categories of Data: Additional safeguards for sensitive data - include when processing special categories of personal data
4. Data Protection Impact Assessment: DPIA requirements - include for high-risk processing activities
5. Local Data Protection Requirements: Specific Danish law requirements - include when processing involves Danish citizens
6. Data Minimization and Retention: Specific requirements for data minimization and retention periods - include for complex data processing scenarios
1. Schedule 1 - Details of Processing: Detailed description of processing activities, categories of data subjects and data
2. Schedule 2 - Technical and Organizational Measures: Specific security measures implemented for data protection
3. Schedule 3 - Approved Sub-processors: List of approved sub-processors and their processing activities
4. Schedule 4 - Transfer Impact Assessment: Assessment of risks and safeguards for international transfers
5. Schedule 5 - Standard Contractual Clauses: Incorporation of relevant modules of EU SCCs
6. Schedule 6 - Contact Details: Contact information for data protection officers and representatives
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.