Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Third Party Access Agreement
"I need a Third Party Access Agreement for my software development company to grant our external IT maintenance provider access to our cloud infrastructure and customer databases from March 2025, ensuring compliance with New Zealand privacy laws and including strict data protection protocols."
1. Parties: Identifies and defines all parties to the agreement, including the data/system owner and the third party requiring access
2. Background: Explains the context and purpose of the agreement, including the systems or data being accessed
3. Definitions: Defines key terms used throughout the agreement
4. Grant of Access: Specifies the scope and nature of access being granted, including any limitations
5. Access Requirements: Details the technical and procedural requirements for accessing the systems or data
6. Security Obligations: Outlines security measures, protocols, and compliance requirements
7. Privacy and Data Protection: Addresses privacy obligations under NZ Privacy Act 2020 and related regulations
8. Confidentiality: Details confidentiality obligations and restrictions on information use
9. Term and Termination: Specifies duration of access rights and circumstances for termination
10. Fees and Payments: Details any costs associated with access and payment terms
11. Liability and Indemnification: Addresses risk allocation and liability limitations
12. Dispute Resolution: Outlines process for resolving disputes
13. General Provisions: Standard boilerplate clauses including governing law, notices, and amendments
1. Service Levels: Include when specific performance metrics or availability requirements need to be maintained
2. Business Continuity: Add when access is critical to business operations and continuity planning is essential
3. Audit Rights: Include for regulated industries or when regular compliance monitoring is required
4. Intellectual Property Rights: Add when access involves proprietary software or content
5. Data Migration: Include when data transfer or migration services are part of the access arrangement
6. Insurance Requirements: Add for high-risk access scenarios or when required by industry regulations
7. Change Management: Include when frequent system or access requirement changes are anticipated
8. Personnel Requirements: Add when specific qualifications or security clearances are required for individuals accessing the systems
1. Schedule 1 - Technical Specifications: Detailed technical requirements and specifications for access
2. Schedule 2 - Security Protocols: Specific security measures, standards, and compliance requirements
3. Schedule 3 - Authorized Users: List of approved users and their access levels
4. Schedule 4 - Fee Schedule: Detailed breakdown of fees and payment terms
5. Schedule 5 - Service Level Requirements: Specific performance metrics and service levels if applicable
6. Appendix A - Access Request Form: Standard form for requesting new or modified access
7. Appendix B - Incident Report Template: Template for reporting security or access incidents
8. Appendix C - Compliance Checklist: Checklist of regulatory and security compliance requirements
Authors
Information Technology
Financial Services
Healthcare
Government and Public Sector
Telecommunications
Education
Professional Services
Manufacturing
Utilities
Research and Development
Energy
Transportation and Logistics
Legal
Information Security
IT Operations
Compliance
Risk Management
Procurement
Data Protection
Vendor Management
Information Technology
Infrastructure
Operations
Corporate Security
Chief Information Security Officer
IT Director
Compliance Manager
Data Protection Officer
Legal Counsel
Risk Manager
Information Security Manager
Vendor Management Officer
Operations Director
Technology Manager
Privacy Officer
Contract Manager
Security Administrator
Systems Administrator
IT Procurement Manager
Find the exact document you need
Access Licence Agreement
A New Zealand-governed agreement establishing terms and conditions for accessing and using specific property or facilities.
Shared Driveway Access Agreement
A New Zealand legal agreement establishing rights, responsibilities, and cost-sharing arrangements for shared driveway access between multiple property owners.
Deed Of Indemnity And Access
A New Zealand law-governed deed providing indemnification and document access rights to company directors and officers.
Custody And Access Agreement
A New Zealand legal agreement establishing custody and access arrangements for children, governed by the Care of Children Act 2004.
Access Agreement For Adjoining Property
A New Zealand law-governed agreement establishing terms for accessing adjoining property, typically used for construction or maintenance purposes.
Third Party Access Agreement
A New Zealand-governed agreement establishing terms for third-party access to an organization's systems, data, or facilities, ensuring security and regulatory compliance.
Road Access Agreement
A New Zealand-governed agreement establishing legal rights and conditions for accessing property, including maintenance obligations and usage terms.
Network Access Agreement
A New Zealand-governed agreement establishing terms for telecommunications network access between infrastructure owners and access seekers.
Land Access Agreement
A New Zealand-governed agreement establishing terms and conditions for accessing and using specified land or property, ensuring compliance with local regulations and cultural considerations.
Early Access Agreement
A New Zealand-governed agreement establishing terms for pre-release software access and testing, including user rights, obligations, and liability limitations.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.