Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the joint controllers entering into the agreement
2. Background: Context of the joint processing activities and relationship between the parties
3. Definitions: Key terms used in the agreement, including GDPR-specific terminology
4. Scope and Purpose: Definition of the joint processing activities covered by the agreement
5. Roles and Responsibilities: Detailed allocation of responsibilities between joint controllers for GDPR compliance
6. Transparency and Data Subject Rights: How the parties will handle data subject requests and ensure transparency
7. Data Security: Security measures each party must implement and maintain
8. Data Breach Notification: Procedures for handling and reporting personal data breaches
9. Liability and Indemnification: Distribution of liability between parties and indemnification provisions
10. Term and Termination: Duration of the agreement and conditions for termination
11. Governing Law and Jurisdiction: Specification of Dutch law as governing law and jurisdiction for disputes
12. General Provisions: Standard contractual provisions including severability, entire agreement, and amendments
1. International Data Transfers: Required when personal data will be transferred outside the EEA
2. Sub-processor Management: Needed when either party may engage sub-processors
3. Insurance Requirements: Specific insurance obligations when dealing with high-risk processing
4. Audit Rights: Detailed audit provisions when regular compliance verification is needed
5. Joint Marketing Activities: When the joint processing involves marketing activities
6. Industry-Specific Compliance: For sectors with additional regulatory requirements (e.g., healthcare, finance)
1. Schedule 1 - Processing Activities: Detailed description of joint processing activities, including categories of data and purposes
2. Schedule 2 - Technical and Organizational Measures: Specific security measures implemented by each party
3. Schedule 3 - Data Subject Information: Template privacy notices and information provided to data subjects
4. Schedule 4 - Data Breach Response Plan: Detailed procedures for handling data breaches
5. Schedule 5 - Contact Points: Key contacts for each party for various purposes (general, security, data subject requests)
6. Appendix A - Data Flow Diagram: Visual representation of how data flows between the joint controllers
7. Appendix B - Compliance Checklist: Checklist of responsibilities for each party
Find the document you need
International Data Transfer Addendum
Dutch law-governed International Data Transfer Addendum for GDPR-compliant personal data transfers from the Netherlands/EU to non-EEA countries.
Intra Group Data Processing Agreement
Dutch law-governed data processing agreement for intra-group personal data transfers and processing, ensuring GDPR compliance within corporate groups.
Data Processing Contract
Dutch law-governed Data Processing Contract establishing GDPR-compliant terms between controller and processor.
Controller To Controller Agreement
A Dutch law-governed agreement between two data controllers establishing terms for compliant personal data sharing under GDPR and UAVG.
Joint Controller Agreement
A Dutch law-governed agreement establishing responsibilities and obligations between joint controllers under GDPR and UAVG for shared data processing activities.
Data Processing Addendum
A Dutch law-governed agreement establishing GDPR-compliant terms for personal data processing between a controller and processor.
Controller Processor Agreement
A Dutch law-governed agreement establishing GDPR-compliant terms for personal data processing between controller and processor.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
