Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
DPA Addendum
"I need a DPA Addendum under Singapore law for my software company that processes customer data across APAC, with specific focus on healthcare data security requirements and cross-border transfers to Australia, to be effective from March 2025."
1. Parties: Identification of data controller and data processor, including full legal names and registration details
2. Background: Context of the data processing relationship and reference to main agreement
3. Definitions: Key terms used throughout the DPA including Personal Data, Processing, Data Subject, Controller, Processor, etc.
4. Scope of Processing: Details of permitted data processing activities, purposes, and types of personal data
5. Data Protection Obligations: Core obligations regarding data security, privacy, and compliance with PDPA requirements
6. Security Measures: Required technical and organizational measures to ensure data protection
7. Breach Notification: Procedures and timelines for handling and reporting data breaches
8. Term and Termination: Duration of the DPA and conditions for termination
9. Governing Law: Specification of Singapore law as governing law and jurisdiction
1. Cross-Border Transfers: Requirements and safeguards for international data transfers under PDPA
2. Industry-Specific Requirements: Additional obligations for regulated sectors such as healthcare or financial services
3. Data Protection Impact Assessment: Requirements and procedures for conducting DPIAs for high-risk processing
4. Audit Rights: Provisions for conducting audits and inspections of data processing activities
5. Data Subject Rights: Procedures for handling data subject requests and rights under PDPA
1. Schedule 1: Processing Details: Detailed description of processing activities, categories of data subjects and personal data, processing purposes
2. Schedule 2: Security Measures: Comprehensive list of technical and organizational security measures implemented
3. Schedule 3: Approved Sub-processors: List of authorized sub-processors, their roles, and locations
4. Schedule 4: Transfer Mechanisms: Details of cross-border transfer safeguards and mechanisms used
5. Schedule 5: Data Breach Response Plan: Detailed procedures and contact information for data breach response
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.