Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Joint Data Controller Agreement
"I need a Joint Data Controller Agreement for a partnership between our healthcare tech company and a hospital chain in Singapore, with specific focus on patient data sharing and strict security measures, to be implemented by March 2025."
1. Parties: Identification and details of the joint data controllers
2. Background: Context of the agreement and relationship between parties
3. Definitions: Key terms used throughout the agreement, including PDPA-specific terminology
4. Scope and Purpose: Define the scope of joint processing activities and purposes of data processing
5. Roles and Responsibilities: Detailed allocation of responsibilities between controllers under PDPA requirements
6. Data Protection Obligations: Joint compliance requirements under PDPA including collection, use, disclosure, and retention
7. Security Measures: Technical and organizational measures required for data protection
8. Data Breach Procedures: Protocol for handling and reporting data breaches under Singapore law
9. Data Subject Rights: Procedures for handling data subject access requests and other rights
10. Term and Termination: Duration of the agreement and termination provisions
11. General Provisions: Standard contractual terms including governing law, jurisdiction, and dispute resolution
1. Cross-border Transfers: Rules for international data transfers - required when data will be transferred outside Singapore
2. Industry-Specific Requirements: Additional requirements for specific sectors like healthcare or finance - include when parties operate in regulated industries
3. Sub-processing: Rules for engaging data processors - include when third-party processors will be involved
4. Data Protection Impact Assessment: Requirements for conducting DPIAs - include for high-risk processing activities
1. Schedule 1: Categories of Personal Data: Detailed list of personal data types being processed jointly
2. Schedule 2: Technical and Organizational Measures: Detailed security measures implemented by both parties
3. Schedule 3: Data Processing Activities: Detailed description of joint processing activities and purposes
4. Schedule 4: Contact Points: Key contacts for operational matters, data protection officers, and emergency situations
5. Appendix A: Data Breach Response Plan: Detailed procedures and timeline for handling data breaches
6. Appendix B: Data Subject Rights Procedure: Detailed procedures for handling various types of data subject requests
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.