Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Processing Agreement
"I need a data processing agreement ensuring compliance with GDPR, detailing data retention for 5 years, breach notification within 72 hours, and third-party data sharing limited to EU-based processors only."
What is a Data Processing Agreement?
A Data Processing Agreement sets clear rules for how one company handles and protects another company's data. Under Australian Privacy Principles, businesses need these agreements when sharing personal information with service providers, contractors, or third-party processors.
The agreement spells out security measures, data breach procedures, and each party's responsibilities. It helps organizations comply with the Privacy Act 1988 and shields both sides from legal risks. Common uses include cloud services, payroll processing, and customer relationship management systems where sensitive data changes hands.
When should you use a Data Processing Agreement?
You need a Data Processing Agreement anytime your business shares personal information with external service providers. This includes hiring cloud storage providers, outsourcing payroll processing, using marketing automation tools, or engaging IT contractors who can access customer data.
Under Australian privacy laws, these agreements become essential when working with vendors who handle sensitive information like health records, financial details, or personal identifiers. Getting the agreement in place before sharing data protects your organization from privacy breaches, regulatory penalties, and reputational damage under the Privacy Act 1988.
What are the different types of Data Processing Agreement?
- DPA Agreement: Standard template for business-to-business data processing, covering basic security and compliance requirements
- Data Transfer Agreement: Specifically designed for cross-border data transfers, with extra safeguards for international compliance
- Data Protection Agreement For Employees: Internal agreement focusing on staff handling of sensitive data and privacy obligations
- Controller Processor Agreement: Detailed roles and responsibilities between data controllers and processors
- Data Transfer Addendum: Supplementary document adding specific data transfer provisions to existing agreements
Who should typically use a Data Processing Agreement?
- Data Controllers: Businesses and organizations that determine how personal data is processed, like retailers, healthcare providers, and government agencies collecting customer information
- Data Processors: Service providers handling data on behalf of controllers, such as cloud storage companies, marketing agencies, and payroll processors
- Legal Teams: In-house lawyers and external counsel who draft and review Data Processing Agreements to ensure compliance with Australian privacy laws
- Privacy Officers: Compliance specialists who oversee data protection practices and monitor agreement implementation
- IT Managers: Technical staff responsible for implementing security measures and data handling protocols specified in the agreements
How do you write a Data Processing Agreement?
- Data Mapping: List all personal information types being shared, how they'll be used, and where they'll be stored
- Security Assessment: Document existing data protection measures and identify any gaps that need addressing
- Roles Definition: Clarify who acts as data controller and processor, plus their specific responsibilities
- Compliance Check: Review Australian Privacy Principles requirements affecting your data handling needs
- Template Selection: Use our platform to generate a customized Data Processing Agreement that includes all required elements
- Review Points: Establish timeframes for regular reviews and outline breach notification procedures
What should be included in a Data Processing Agreement?
- Parties and Roles: Clear identification of data controller and processor, with their legal business details
- Data Scope: Specific types of personal information being processed, including purpose and duration
- Security Measures: Detailed technical and organizational safeguards meeting Australian Privacy Principles
- Breach Protocol: Mandatory notification procedures and response timelines under Privacy Act requirements
- Subprocessing Terms: Rules for engaging additional data processors and transfer restrictions
- Compliance Framework: References to relevant Australian privacy laws and regulatory obligations
- Termination Rights: Conditions for ending the agreement and data return or deletion procedures
What's the difference between a Data Processing Agreement and a Data Sharing Agreement?
A Data Processing Agreement differs significantly from a Data Sharing Agreement in several key ways. While both deal with data handling, they serve distinct purposes under Australian privacy law.
- Primary Purpose: Data Processing Agreements govern how a service provider handles data on behalf of another organization, while Data Sharing Agreements focus on the mutual exchange of information between equal partners
- Relationship Structure: Processing agreements establish a controller-processor relationship with clear hierarchies, whereas sharing agreements create peer-to-peer relationships between organizations
- Legal Obligations: Processing agreements must comply with specific requirements under the Privacy Act 1988 for third-party data handlers, while sharing agreements have more flexible terms based on mutual benefit
- Risk Management: Processing agreements emphasize security measures and processor limitations, while sharing agreements focus on mutual responsibilities and joint data governance
Download our whitepaper on the future of AI in Legal
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.