Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the data controller and data processor, including full legal names, registration numbers, and registered addresses
2. Background: Context of the agreement, relationship between parties, and purpose of the data processing arrangement
3. Definitions: Definitions of key terms used in the agreement, including specific terms from PDPA 2010
4. Scope and Purpose of Processing: Detailed description of the permitted data processing activities and their specific purposes
5. Duration of Processing: Term of the agreement and processing activities, including conditions for renewal and termination
6. Nature and Type of Personal Data: Categories of personal data to be processed and categories of data subjects
7. Obligations of the Data Processor: Processor's responsibilities including security measures, confidentiality, and compliance with instructions
8. Obligations of the Data Controller: Controller's responsibilities including lawful basis for processing and providing clear instructions
9. Security Measures: Technical and organizational security measures required to protect personal data
10. Sub-processing: Conditions and requirements for engaging sub-processors
11. Data Subject Rights: Procedures for handling data subject requests and assistance to the controller
12. Data Breach Notification: Procedures and timeframes for reporting and handling personal data breaches
13. Audit Rights: Controller's rights to audit and processor's obligations to demonstrate compliance
14. Data Return and Deletion: Obligations regarding data return or deletion upon agreement termination
15. Liability and Indemnities: Allocation of liability and indemnification obligations between parties
16. General Provisions: Standard contractual terms including governing law, jurisdiction, and amendment procedures
1. Cross-border Data Transfers: Required when personal data will be transferred outside Malaysia, specifying compliance with PDPA transfer requirements
2. Specific Industry Requirements: Include when processing data in regulated industries (e.g., healthcare, financial services) requiring additional compliance measures
3. Business Continuity: Additional provisions for ensuring continuous data processing services in disaster scenarios
4. Data Protection Impact Assessment: Required when processing activities are likely to result in high risk to individuals
5. Insurance Requirements: Specific insurance obligations for high-risk or high-value processing activities
6. Change Control Procedure: Detailed procedures for managing changes to processing activities or security measures
1. Schedule 1 - Processing Activities: Detailed description of specific processing activities, including data types, purposes, and processing operations
2. Schedule 2 - Technical and Organizational Security Measures: Detailed security requirements and standards to be maintained by the processor
3. Schedule 3 - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule 4 - Data Transfer Mechanisms: Details of mechanisms used for any international data transfers
5. Schedule 5 - Service Levels: Performance metrics and service levels for processing activities
6. Appendix A - Data Breach Response Plan: Detailed procedures and contact information for handling data breaches
7. Appendix B - Audit Requirements: Specific procedures and requirements for conducting compliance audits
8. Appendix C - Fee Schedule: Pricing and payment terms for processing services
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
