Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the data discloser and recipient, including registration details and addresses
2. Background: Context of the agreement and relationship between the parties
3. Definitions: Definitions of key terms including Personal Information, Processing, Data Subject, and other POPIA-specific terminology
4. Purpose and Scope: Detailed description of the purpose for data disclosure and scope of permitted use
5. Duration: Term of the agreement and conditions for renewal or termination
6. Data Protection Compliance: Obligations under POPIA and other relevant data protection laws
7. Security Measures: Required security measures for protecting disclosed data
8. Confidentiality Obligations: Obligations regarding confidentiality and non-disclosure
9. Data Subject Rights: Procedures for handling data subject access requests and other rights
10. Breach Notification: Procedures and timeframes for reporting data breaches
11. Return or Destruction of Data: Requirements for handling data upon termination
12. Liability and Indemnification: Allocation of liability and indemnification provisions
13. General Provisions: Standard contractual clauses including governing law, jurisdiction, and dispute resolution
1. Cross-Border Transfer Provisions: Required when data will be transferred outside South Africa, addressing POPIA Chapter 9 requirements
2. Special Personal Information: Required when processing special categories of personal information under POPIA Section 26
3. Sub-processors: Required when the recipient may engage third parties to process the disclosed data
4. Insurance Requirements: Optional section specifying required insurance coverage for data protection
5. Audit Rights: Optional provisions for audit and inspection rights
6. Data Protection Impact Assessment: Required when processing poses high risks to data subjects
7. Business Continuity: Optional provisions for ensuring continuity of data protection measures
1. Schedule A - Description of Personal Information: Detailed description of the categories of personal information to be disclosed
2. Schedule B - Security Requirements: Technical and organizational security measures required for data protection
3. Schedule C - Approved Sub-processors: List of approved third-party processors (if applicable)
4. Schedule D - Processing Activities: Detailed description of all processing activities to be performed
5. Schedule E - Data Transfer Mechanisms: Details of mechanisms used for any cross-border transfers
6. Appendix 1 - Contact Details: Contact information for key personnel and data protection officers
7. Appendix 2 - Standard Contractual Clauses: Standard clauses for international data transfers if applicable
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
