Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Management Agreement
"I need a Data Management Agreement for my fintech startup based in Singapore, which will be processing customer payment data through a third-party cloud service provider, with specific provisions for cross-border transfers to our development team in India starting March 2025."
1. Parties: Identification of all contracting parties, including registered addresses and company numbers
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms used throughout the agreement, including technical and legal definitions
4. Scope of Services: Details of data management services to be provided
5. Data Protection Obligations: Compliance with PDPA and other applicable laws
6. Security Requirements: Technical and organizational measures for data protection
7. Breach Notification: Procedures for reporting and handling data breaches
8. Term and Termination: Duration of agreement and termination provisions
1. Cross-Border Transfers: Rules for international data transfers when data will be transferred outside Singapore
2. Sector-Specific Compliance: Additional regulatory requirements for regulated industries (banking, healthcare, etc.)
3. Sub-processors: Rules for engaging third-party data processors when sub-processors will be involved
4. Data Subject Rights: Procedures for handling data subject requests when processing personal data of individuals
1. Schedule 1: Services Description: Detailed description of data management services
2. Schedule 2: Security Requirements: Technical specifications for security measures
3. Schedule 3: Processing Activities: Details of data processing activities and purposes
4. Schedule 4: Service Levels: Performance metrics and service level agreements
5. Schedule 5: Fee Schedule: Pricing and payment terms
6. Appendix A: Data Categories: List of data types being processed
7. Appendix B: Approved Sub-processors: List of approved third-party data processors
Authors
Applicable Data Protection Laws
Authorized Personnel
Breach Notification
Business Day
Confidential Information
Controller
Data
Data Subject
Data Protection Laws
Data Protection Officer
Effective Date
Force Majeure Event
Intellectual Property Rights
Personal Data
PDPA
Processing
Processor
Security Breach
Security Requirements
Services
Sub-processor
Term
Third Party
Permitted Purpose
Processing Instructions
Regulatory Authority
Representatives
Special Categories of Personal Data
Technical and Organizational Measures
Security Requirements
Confidentiality
Processing Limitations
Sub-processing
Audit Rights
Cross-border Transfers
Breach Notification
Data Subject Rights
Liability and Indemnification
Force Majeure
Term and Termination
Exit Management
Compliance with Laws
Data Retention
Security Incidents
Personnel Requirements
Service Levels
Records and Audits
Intellectual Property
Insurance
Governing Law
Dispute Resolution
Assignment and Subcontracting
Notices
Entire Agreement
Severability
Variation
Waiver
Third Party Rights
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.