Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Sharing Agreement Controller To Processor
"I need a Data Sharing Agreement Controller To Processor for my Singapore-based fintech company to engage a cloud service provider to process customer payment data, with strict security measures and sub-processor restrictions to ensure PDPA compliance."
1. Parties: Identification of the Controller and Processor, including registration details
2. Background: Context of the data sharing arrangement and roles of parties
3. Definitions: Key terms used in the agreement including types of data
4. Scope and Purpose: Specific purposes for which data will be processed
5. Duration: Term of the agreement and renewal provisions
6. Obligations of the Processor: Core processing obligations and compliance requirements under PDPA
7. Security Measures: Required technical and organizational measures for data protection
8. Data Breach Procedures: Notification and handling of data breaches
9. Termination: Termination rights and consequences including data deletion
1. Cross-border Transfers: Terms governing international data transfers and compliance with Singapore cross-border requirements
2. Sub-processing: Terms and conditions for engaging and managing sub-processors
3. Industry-Specific Compliance: Additional compliance requirements for regulated industries (healthcare, banking, etc.)
1. Schedule 1 - Description of Processing: Detailed description of processing activities, categories of data subjects, types of personal data, and processing purposes
2. Schedule 2 - Security Measures: Detailed technical and organizational security measures specification
3. Schedule 3 - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule 4 - Transfer Mechanisms: Details of cross-border transfer arrangements and safeguards
Authors
Data Protection Obligations
Security Measures
Confidentiality
Sub-processing
Data Subject Rights
Breach Notification
Audit Rights
Cross-border Transfers
Data Retention
Return or Deletion of Data
Liability and Indemnification
Term and Termination
Governing Law
Dispute Resolution
Force Majeure
Assignment
Notices
Severability
Entire Agreement
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.