Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Joint Controller Data Sharing Agreement
"I need a Joint Controller Data Sharing Agreement under South African law for a partnership between a healthcare provider and a medical research institute, with specific provisions for handling sensitive medical data and research findings, to be effective from March 2025."
1. Parties: Identification of the joint controllers entering into the agreement, including their registered addresses and company registration numbers
2. Background: Context of the agreement, description of the joint processing activities, and the relationship between the parties
3. Definitions: Definitions of key terms used in the agreement, including those from POPIA and any agreement-specific terms
4. Scope and Purpose: Details of the personal information to be shared and processed, and the specific purposes for which it will be processed
5. Roles and Responsibilities: Detailed allocation of responsibilities between the joint controllers, including primary points of contact and information officer duties
6. Lawful Basis for Processing: Specification of the legal grounds under POPIA for the processing activities
7. Data Subject Rights: Procedures for handling data subject requests and ensuring compliance with POPIA's data subject rights
8. Security Measures: Security requirements and standards to be maintained by both parties in accordance with POPIA Section 19
9. Data Breach Notification: Procedures for identifying, reporting, and managing personal information breaches
10. Confidentiality: Obligations regarding confidentiality and security of shared information
11. Liability and Indemnification: Allocation of liability between the parties and indemnification provisions
12. Term and Termination: Duration of the agreement and circumstances under which it can be terminated
13. General Provisions: Standard contractual clauses including governing law, jurisdiction, and dispute resolution
1. Cross-border Transfers: Required when personal information will be transferred outside South Africa, addressing POPIA's requirements for cross-border transfers
2. Direct Marketing: Required when the shared data will be used for direct marketing purposes, ensuring compliance with POPIA's direct marketing provisions
3. Subprocessing: Required when either party intends to use subprocessors for the processing activities
4. Insurance: Optional section specifying insurance requirements when processing high-risk or sensitive personal information
5. Audit Rights: Optional section detailing audit procedures when regular compliance verification is required
6. Data Protection Impact Assessment: Required when processing activities present high risks to data subjects
1. Schedule 1: Categories of Personal Information: Detailed list of personal information categories being processed and shared
2. Schedule 2: Processing Activities: Detailed description of all processing activities carried out by the joint controllers
3. Schedule 3: Technical and Organizational Measures: Specific security measures and controls implemented by both parties
4. Schedule 4: Contact Details: Contact information for key personnel, including information officers and emergency contacts
5. Schedule 5: Data Subject Rights Procedure: Detailed procedures for handling data subject requests
6. Appendix A: Standard Forms: Templates for data breach notifications, data subject requests, and other standard communications
7. Appendix B: Security Incident Response Plan: Detailed procedures for responding to security incidents and data breaches
Authors
Financial Services
Healthcare
Insurance
Telecommunications
Retail
Technology
Education
Professional Services
Market Research
Banking
E-commerce
Real Estate
Consulting
Transportation and Logistics
Marketing and Advertising
Legal
Compliance
Information Security
Data Protection
Risk Management
Information Technology
Operations
Privacy
Information Management
Data Governance
Regulatory Affairs
Chief Privacy Officer
Data Protection Officer
Information Officer
Legal Counsel
Compliance Manager
Risk Manager
IT Security Manager
Chief Information Security Officer
Privacy Manager
Data Governance Manager
Chief Legal Officer
Chief Technology Officer
Operations Director
Contract Manager
Chief Compliance Officer
Information Management Officer
Find the exact document you need
Joint Controller Data Processing Agreement
A South African law-governed agreement establishing responsibilities and obligations between joint controllers of personal information under POPIA.
DPA Data Protection Agreement
A South African law-compliant Data Protection Agreement governing personal information processing between controllers and processors under POPIA.
Joint Controller Data Sharing Agreement
A South African law-governed agreement establishing terms for joint processing of personal information between multiple controllers, ensuring POPIA compliance.
International Data Protection Agreement
A South African law-governed agreement regulating international transfers and processing of personal information in compliance with POPIA and global data protection standards.
Supplier Data Processing Agreement
South African law-governed data processing agreement establishing terms for personal information processing under POPIA.
Data Privacy Addendum
A South African law-compliant Data Privacy Addendum governing personal information processing between controllers and processors under POPIA.
Non Disclosure Agreement Data Protection
South African Non-Disclosure Agreement with POPIA-compliant data protection provisions for safeguarding confidential and personal information.
Confidentiality Agreement Data Protection
South African Confidentiality Agreement with data protection provisions compliant with POPIA, governing the protection of confidential information and personal data.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.