Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Controller Agreement
"Need a Data Controller Agreement for our Singapore-based fintech company sharing customer payment data with a third-party analytics provider, with specific emphasis on cross-border data transfers to their EU servers and breach notification procedures."
1. Parties: Identification of the Data Controller and other contracting parties, including registration details and addresses
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms used throughout the agreement, including PDPA-specific terminology
4. Scope and Purpose: Define the scope of data processing activities and legitimate purposes
5. Data Protection Obligations: Core obligations under PDPA including collection, use, disclosure, and protection of personal data
6. Security Measures: Technical and organizational measures for data protection
7. Breach Notification: Procedures for handling and reporting data breaches
8. Data Subject Rights: Procedures for handling data subject requests and rights
1. Cross-border Transfers: Requirements and compliance measures for international data transfers outside Singapore
2. Sector-Specific Requirements: Additional requirements for regulated industries such as healthcare, finance, or telecommunications
3. Sub-processing: Terms and conditions for engaging and managing third-party data processors
4. Data Protection Impact Assessment: Requirements and procedures for conducting DPIAs for high-risk processing activities
1. Schedule 1 - Categories of Personal Data: Detailed list of personal data types being processed under this agreement
2. Schedule 2 - Technical and Organizational Measures: Comprehensive description of security measures and controls implemented
3. Schedule 3 - Sub-processors: List of approved sub-processors, their roles, and responsibilities
4. Schedule 4 - Data Transfer Mechanisms: Details of cross-border transfer arrangements and safeguards
5. Schedule 5 - Contact Points: Key contacts for data protection matters and breach notifications
Authors
Applicable Data Protection Laws
Business Day
Confidential Information
Consent
Data Breach
Data Controller
Data Protection Impact Assessment
Data Protection Laws
Data Protection Officer
Data Subject
Data Subject Rights
Effective Date
Joint Controllers
Notice
PDPA
PDPC
Personal Data
Processing
Reasonable Security Arrangements
Representatives
Security Measures
Sensitive Personal Data
Services
Sub-processor
Technical and Organisational Measures
Term
Third Party
Transfer
Scope of Processing
Data Protection Obligations
Controller Responsibilities
Joint Control Arrangements
Security Measures
Confidentiality
Data Subject Rights
Data Breach Notification
Cross-border Transfers
Sub-processing
Audit Rights
Liability and Indemnification
Term and Termination
Return or Deletion of Data
Governing Law
Dispute Resolution
Force Majeure
Assignment
Notices
Severability
Entire Agreement
Amendments
Data Protection Impact Assessments
Record Keeping
Cooperation with Regulators
Insurance
Costs and Expenses
Third Party Rights
Counterparts
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.