Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Sub Processing Agreement
"I need a Sub Processing Agreement for my Australian fintech company that will engage a cloud services provider to process customer payment data, with specific provisions for cross-border data transfers to Singapore and enhanced security measures for financial data."
1. Parties: Identification of the main contractor (processor) and the sub-processor
2. Background: Context of the agreement, reference to the main processing agreement, and the need for sub-processing
3. Definitions: Key terms used throughout the agreement, including data protection specific terminology
4. Scope and Purpose: Detailed description of the sub-processing services and permitted processing activities
5. Obligations of the Sub-processor: Core responsibilities including compliance with instructions, confidentiality, and security measures
6. Technical and Organizational Measures: Security requirements and specific measures for data protection
7. Data Breach Notification: Procedures and timeframes for reporting data breaches
8. Audit Rights: Rights of the processor and controller to audit the sub-processor
9. International Data Transfers: Rules and safeguards for cross-border data transfers
10. Confidentiality: Confidentiality obligations and handling of sensitive information
11. Term and Termination: Duration of the agreement and termination provisions
12. Return or Deletion of Data: Obligations regarding data handling upon contract termination
13. Liability and Indemnities: Allocation of risk and responsibility between parties
14. General Provisions: Standard contractual terms including governing law, jurisdiction, and amendments
1. Sub-contracting: Required if the sub-processor may engage further sub-processors
2. Insurance Requirements: Specific insurance obligations, recommended for high-risk processing
3. Service Levels: Include when specific performance metrics are required
4. Business Continuity: Required for critical processing activities
5. Specific Industry Compliance: Include when processing data in regulated industries
6. Data Protection Impact Assessment: Required for high-risk processing activities
7. Personnel Requirements: Include when specific qualifications or clearances are needed
1. Schedule 1 - Processing Activities: Detailed description of the types of data and processing activities
2. Schedule 2 - Technical and Security Measures: Specific security controls and technical requirements
3. Schedule 3 - Service Levels: Performance metrics and service level agreements
4. Schedule 4 - Fee Schedule: Pricing and payment terms for the sub-processing services
5. Schedule 5 - Approved Sub-processors: List of authorized further sub-processors if applicable
6. Appendix A - Data Breach Response Plan: Detailed procedures for handling data breaches
7. Appendix B - Audit Requirements: Specific procedures and requirements for audits
8. Appendix C - Standard Contractual Clauses: For international data transfers where required
Authors
Approved Sub-processor
Australian Privacy Principles
Authorised Person
Business Day
Business Hours
Confidential Information
Consent
Controller
Data
Data Breach
Data Protection Laws
Data Subject
Data Subject Rights
Effective Date
Force Majeure Event
GDPR
Information Commissioner
Initial Term
Intellectual Property Rights
International Data Transfer
Main Processing Agreement
Notice
OAIC
Personal Information
Personnel
Privacy Act
Privacy Laws
Processor
Processing
Processing Instructions
Processing Services
Regulatory Authority
Security Breach
Security Requirements
Sensitive Information
Services
Standard Contractual Clauses
Sub-processor
Technical and Organizational Measures
Term
Territory
Third Party
Appointment
Processing Obligations
Sub-processing
Data Protection
Privacy Compliance
Security Measures
Confidentiality
Audit Rights
Data Breach
Cross-border Transfer
Personnel
Service Levels
Warranties
Liability
Indemnification
Insurance
Term and Termination
Data Return and Deletion
Force Majeure
Assignment
Notices
Dispute Resolution
Governing Law
Entire Agreement
Severability
Variation
Waiver
Costs
Relationship of Parties
Technology
Financial Services
Healthcare
Telecommunications
Cloud Services
E-commerce
Professional Services
Education
Government
Insurance
Marketing and Advertising
Research and Development
Manufacturing
Logistics
Consulting
Legal
Compliance
Information Technology
Information Security
Privacy
Risk Management
Procurement
Operations
Data Governance
Contract Management
Technical Operations
Security Operations
Chief Privacy Officer
Data Protection Officer
Privacy Manager
Legal Counsel
Compliance Manager
Information Security Manager
IT Director
Chief Information Officer
Chief Technology Officer
Privacy Analyst
Contract Manager
Procurement Manager
Risk Manager
Operations Manager
Project Manager
General Counsel
Chief Legal Officer
Data Governance Manager
Find the exact document you need
Personal Information Processing Agreement
An Australian law-governed agreement establishing terms for personal information processing between controllers and processors, ensuring compliance with the Privacy Act 1988 and APPs.
DPA Data Processing Addendum
An Australian-law compliant agreement that establishes terms for processing personal information under the Privacy Act 1988 and APPs, defining data handling obligations between controllers and processors.
Data Processing Agreement Addendum
An Australian-compliant addendum governing data processing responsibilities between controllers and processors under the Privacy Act 1988.
Joint Controller Agreement
An Australian law-governed agreement establishing rights and obligations between joint controllers of personal data under the Privacy Act 1988.
Intra Group Data Sharing Agreement
An Australian law-governed agreement regulating data sharing between entities within the same corporate group, ensuring compliance with privacy laws and data protection requirements.
Dpia Agreement
An Australian agreement governing the conduct of Data Protection Impact Assessments under the Privacy Act 1988 and related privacy laws.
Subprocessor Agreement
An Australian legal agreement governing data processing arrangements between a processor and subprocessor, ensuring compliance with Australian privacy laws and data protection requirements.
Master Data Protection Agreement
An Australian law-governed agreement establishing data protection obligations between parties, ensuring compliance with the Privacy Act 1988 and related privacy legislation.
Controller To Controller Data Processing Agreement
An Australian law-compliant agreement governing personal data sharing between two independent data controllers, ensuring Privacy Act 1988 and APP compliance.
Intra Group Data Transfer Agreement
An Australian law-compliant agreement governing data transfers between entities within the same corporate group, ensuring privacy law compliance and operational efficiency.
Data Management Agreement
An Australian law-governed agreement establishing data management and protection obligations between parties, ensuring compliance with Privacy Act 1988 and related legislation.
Intercompany Data Processing Agreement
An Australian law-governed agreement regulating data processing activities between related companies within the same corporate group.
Controller To Controller DPA
An Australian law-compliant agreement governing personal data sharing between two independent data controllers, ensuring Privacy Act compliance and data protection.
Intercompany Data Sharing Agreement
An Australian-law governed agreement for regulated data sharing between related corporate entities, incorporating privacy law compliance and data protection measures.
DPA Agreement
An Australian-law compliant agreement governing personal information processing between controllers and processors, ensuring adherence to the Privacy Act 1988 and APPs.
Third Party Data Processing Agreement
An Australian-compliant agreement governing the processing of personal information by third-party service providers under Privacy Act 1988 and APPs.
Data Transfer Addendum
An Australian law-compliant addendum governing data transfer arrangements between parties, ensuring compliance with the Privacy Act 1988 and APPs.
Supplier Data Processing Agreement
An Australian-law governed agreement setting out terms for processing personal information between an organization and its supplier, ensuring compliance with Australian privacy laws.
Controller Processor Agreement
An Australian law-compliant agreement governing the processing of personal data between a controller and processor, aligned with the Privacy Act 1988 and APPs.
Order Processing Agreement
An Australian-law governed agreement establishing terms for order processing services, including operational procedures, compliance requirements, and service levels.
Data Protection Agreement For Employees
An Australian-compliant employee data protection agreement establishing rights and obligations for handling personal information in the employment context.
Affiliate Addendum
An Australian law-governed addendum establishing terms and conditions for affiliate marketing relationships, including commercial terms and compliance requirements.
Sub Processing Agreement
An Australian-law governed agreement that establishes terms for sub-processing of personal data, ensuring compliance with privacy laws and data protection requirements.
International Data Transfer Agreement
An Australian law-compliant agreement governing cross-border data transfers, ensuring protection of personal information under the Privacy Act 1988 and APPs.
Data Transfer Agreement
An Australian law-governed agreement establishing terms for secure and compliant data transfer between organizations, ensuring adherence to Australian privacy regulations.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.