Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
DPA Data Protection Agreement
"I need a Data Protection Agreement (DPA) for my South African software company acting as a data processor for multiple EU clients, with specific provisions for cross-border data transfers and cloud storage security measures, to be implemented by March 2025."
1. Parties: Identification of the data controller and data processor, including their registered addresses and company details
2. Background: Context of the agreement and the data processing relationship between the parties
3. Definitions: Definitions of key terms used in the agreement, aligned with POPIA definitions
4. Scope and Purpose: Details of the specific data processing activities covered by the agreement
5. Roles and Responsibilities: Clear delineation of roles as controller/processor and respective responsibilities under POPIA
6. Data Processing Requirements: Specific requirements for lawful processing of personal information under POPIA
7. Security Measures: Required technical and organizational security measures to protect personal information
8. Confidentiality: Obligations regarding confidentiality of personal information
9. Sub-processing: Conditions and requirements for engaging sub-processors
10. Data Subject Rights: Procedures for handling data subject requests and ensuring their rights under POPIA
11. Data Breach Notification: Procedures and timeframes for reporting and handling data breaches
12. Audit Rights: Controller's rights to audit processor's compliance
13. Term and Termination: Duration of the agreement and termination provisions
14. Return or Deletion of Data: Obligations regarding personal information upon termination
15. General Provisions: Standard contractual clauses including governing law, jurisdiction, and entire agreement
1. Cross-border Data Transfers: Required when personal information will be transferred outside South Africa, including mechanisms for ensuring adequate protection
2. Special Categories of Personal Information: Additional provisions required when processing special personal information as defined in POPIA
3. Direct Marketing: Specific provisions required when personal information will be used for direct marketing purposes
4. Automated Decision Making: Required when processing involves automated decision-making or profiling
5. Data Protection Impact Assessments: Procedures for conducting DPIAs when required
6. Insurance Requirements: Specific insurance obligations for data protection risks
7. Disaster Recovery: Detailed disaster recovery and business continuity requirements
1. Schedule 1: Processing Activities: Detailed description of processing activities, including categories of data subjects, types of personal information, and processing purposes
2. Schedule 2: Technical and Organizational Measures: Detailed specification of security measures implemented to protect personal information
3. Schedule 3: Approved Sub-processors: List of approved sub-processors and their processing activities
4. Schedule 4: Transfer Mechanisms: Details of mechanisms used for international data transfers, if applicable
5. Schedule 5: Data Breach Response Plan: Detailed procedures for responding to and reporting data breaches
6. Schedule 6: Audit Procedures: Detailed procedures for conducting compliance audits
7. Appendix A: Contact Details: Contact information for key personnel responsible for data protection
Authors
Financial Services
Healthcare
Technology
Retail
Education
Professional Services
Telecommunications
Insurance
Manufacturing
Government
Non-profit Organizations
E-commerce
Marketing Services
Human Resources
Research and Development
Legal
Compliance
Information Technology
Information Security
Risk Management
Operations
Privacy
Procurement
Data Governance
Internal Audit
Chief Privacy Officer
Data Protection Officer
Information Officer
Legal Counsel
Compliance Manager
IT Security Manager
Risk Manager
Operations Director
Chief Information Security Officer
Privacy Manager
General Counsel
Contract Manager
Chief Technology Officer
Data Protection Specialist
Information Security Analyst
Find the exact document you need
Joint Controller Data Processing Agreement
A South African law-governed agreement establishing responsibilities and obligations between joint controllers of personal information under POPIA.
DPA Data Protection Agreement
A South African law-compliant Data Protection Agreement governing personal information processing between controllers and processors under POPIA.
Joint Controller Data Sharing Agreement
A South African law-governed agreement establishing terms for joint processing of personal information between multiple controllers, ensuring POPIA compliance.
International Data Protection Agreement
A South African law-governed agreement regulating international transfers and processing of personal information in compliance with POPIA and global data protection standards.
Supplier Data Processing Agreement
South African law-governed data processing agreement establishing terms for personal information processing under POPIA.
Data Privacy Addendum
A South African law-compliant Data Privacy Addendum governing personal information processing between controllers and processors under POPIA.
Non Disclosure Agreement Data Protection
South African Non-Disclosure Agreement with POPIA-compliant data protection provisions for safeguarding confidential and personal information.
Confidentiality Agreement Data Protection
South African Confidentiality Agreement with data protection provisions compliant with POPIA, governing the protection of confidential information and personal data.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.