Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
International Data Protection Agreement
"I need an International Data Protection Agreement for my South African technology company that will be using a cloud service provider based in Germany to process our customer data, with the agreement to commence on March 1, 2025."
1. Parties: Identification of the contracting parties, including their registered addresses and company details
2. Background: Context of the agreement, relationship between parties, and purpose of data processing activities
3. Definitions: Definitions of key terms used in the agreement, aligned with POPIA terminology
4. Scope and Purpose: Detailed description of the data processing activities covered by the agreement
5. Roles and Responsibilities: Clear designation of parties as responsible party (controller) and/or operator (processor) under POPIA
6. Data Protection Principles: Commitment to comply with POPIA's conditions for lawful processing of personal information
7. Cross-Border Data Transfers: Rules and safeguards for international transfer of personal information
8. Security Measures: Technical and organizational measures required to protect personal information
9. Confidentiality: Obligations regarding confidentiality of personal information and trade secrets
10. Breach Notification: Procedures for handling and reporting security compromises and data breaches
11. Audit Rights: Rights and procedures for auditing compliance with the agreement
12. Liability and Indemnities: Allocation of risk and responsibility between the parties
13. Term and Termination: Duration of the agreement and circumstances for termination
14. Return or Destruction of Data: Obligations regarding personal information upon termination
15. General Provisions: Standard contractual terms including governing law, jurisdiction, and dispute resolution
1. Sub-processing: Include when the operator may need to engage sub-processors for data processing activities
2. Data Subject Rights: Include detailed procedures for handling data subject requests when parties share responsibility
3. Insurance Requirements: Include when specific insurance coverage for data protection risks is required
4. Business Continuity: Include when continuous access to data is critical for operations
5. Special Categories of Data: Include when processing special personal information under POPIA
6. Joint Controller Provisions: Include when parties are acting as joint responsible parties under POPIA
1. Description of Processing Activities: Detailed description of personal information categories, processing purposes, and data subjects
2. Technical and Organizational Security Measures: Specific security controls and measures implemented to protect data
3. Approved Sub-processors: List of approved sub-processors and their processing activities
4. Data Transfer Mechanisms: Details of mechanisms used for lawful cross-border data transfers
5. Contact Details and Escalation Procedures: Key contacts and procedures for operational and emergency communications
6. Service Level Agreement: Performance metrics and service levels for data processing activities
7. Fee Schedule: Pricing and payment terms for data processing services if applicable
Authors
Financial Services
Healthcare
Technology
E-commerce
Telecommunications
Professional Services
Manufacturing
Education
Insurance
Retail
Logistics
Pharmaceuticals
Business Process Outsourcing
Cloud Computing
Research and Development
Legal
Compliance
Information Technology
Information Security
Risk Management
Data Protection
Operations
Procurement
International Business
Vendor Management
Privacy
Corporate Governance
Data Governance
Information Management
Commercial
Chief Privacy Officer
Data Protection Officer
Legal Counsel
Compliance Manager
Information Security Manager
Risk Manager
IT Director
Chief Information Officer
Chief Technology Officer
Privacy Manager
Contracts Manager
Chief Legal Officer
Information Officer
Data Governance Manager
Operations Director
Commercial Director
Chief Operating Officer
Head of Compliance
Head of Risk
International Business Development Manager
Find the exact document you need
Joint Controller Data Processing Agreement
A South African law-governed agreement establishing responsibilities and obligations between joint controllers of personal information under POPIA.
DPA Data Protection Agreement
A South African law-compliant Data Protection Agreement governing personal information processing between controllers and processors under POPIA.
Joint Controller Data Sharing Agreement
A South African law-governed agreement establishing terms for joint processing of personal information between multiple controllers, ensuring POPIA compliance.
International Data Protection Agreement
A South African law-governed agreement regulating international transfers and processing of personal information in compliance with POPIA and global data protection standards.
Supplier Data Processing Agreement
South African law-governed data processing agreement establishing terms for personal information processing under POPIA.
Data Privacy Addendum
A South African law-compliant Data Privacy Addendum governing personal information processing between controllers and processors under POPIA.
Non Disclosure Agreement Data Protection
South African Non-Disclosure Agreement with POPIA-compliant data protection provisions for safeguarding confidential and personal information.
Confidentiality Agreement Data Protection
South African Confidentiality Agreement with data protection provisions compliant with POPIA, governing the protection of confidential information and personal data.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.