Your data doesn't train Genie's AI
You keep IP ownership of your information
1. Purpose and Scope: Defines the purpose of processing and scope of assessment, including identification of the data controller and processing activities being evaluated
2. Data Processing Activities: Detailed description of all processing activities being assessed, including types of data, categories of data subjects, and processing purposes
3. Legitimate Interest Assessment: Three-part test evaluating: 1) Purpose test - identifying legitimate interest, 2) Necessity test - demonstrating processing is necessary, 3) Balancing test - weighing interests against individual rights
4. Risk Assessment: Comprehensive evaluation of risks to individual rights and freedoms, including privacy impacts and potential harms
5. Safeguards and Mitigations: Detailed description of technical and organizational measures implemented to protect individual rights and reduce identified risks
6. Compliance Framework: Analysis of applicable laws and regulations, including FTC Act, state privacy laws, and sector-specific requirements
1. International Transfer Assessment: Additional assessment required when data transfers outside the US are involved, including analysis of recipient country adequacy and transfer mechanisms
2. Sector-Specific Considerations: Detailed analysis of industry-specific requirements when processing regulated sector data (e.g., HIPAA, GLBA, FERPA)
3. Special Categories Assessment: Additional evaluation required when processing sensitive data categories or involving vulnerable data subjects
1. Schedule A - Data Flow Maps: Visual representations and diagrams showing how personal data flows through the organization, including third-party transfers
2. Schedule B - Risk Matrix: Detailed risk scoring framework including likelihood and impact assessments, with specific mitigation measures for each identified risk
3. Schedule C - Supporting Documentation: Collection of relevant policies, procedures, and controls referenced in the assessment, including privacy notices and consent mechanisms
4. Schedule D - Compliance Checklist: Comprehensive checklist ensuring all relevant legal and regulatory requirements are addressed in the assessment
Find the exact document you need
Data Privacy Assessment
A comprehensive evaluation of an organization's privacy practices under U.S. federal and state privacy laws, assessing data handling procedures and compliance requirements.
Data Protection Risk Assessment
A comprehensive evaluation of data protection risks and compliance requirements under U.S. federal and state privacy laws.
Data Breach Impact Assessment
A regulatory-required evaluation document analyzing the impact and consequences of a data security incident under U.S. federal and state laws.
Legitimate Interest Impact Assessment
A U.S.-compliant assessment documenting the balance between organizational interests and individual privacy rights in data processing activities.
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it