Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including ABN/ACN for companies
2. Background: Context of the agreement, relationship between parties, and purpose of information sharing
3. Definitions: Definitions of key terms including Confidential Information, Personal Information, Data Protection Laws, Permitted Purpose
4. Scope and Purpose: Detailed description of the permitted uses of confidential information and personal data
5. Confidentiality Obligations: Core confidentiality requirements and restrictions on use and disclosure
6. Data Protection Obligations: Compliance with Privacy Act and APPs, data security measures, breach notification requirements
7. Security Measures: Required technical and organizational measures to protect confidential information and personal data
8. Breach Notification: Procedures for reporting and handling data breaches and confidentiality breaches
9. Return or Destruction: Requirements for handling confidential information and personal data upon termination
10. Term and Termination: Duration of obligations and circumstances for termination
11. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. International Data Transfers: Required when personal information may be transferred outside Australia
2. Specific Data Types: Additional provisions for sensitive information or special categories of personal data
3. Subcontractor Obligations: Required when either party may engage subcontractors to process information
4. Audit Rights: Optional provisions for audit and inspection rights regarding data protection measures
5. Insurance Requirements: Specific insurance obligations for data protection and cyber liability
6. Competing Activities: Restrictions on competing activities, if relevant to the business relationship
7. Publicity: Provisions regarding public announcements or references to the relationship
1. Schedule 1 - Specified Confidential Information: Detailed list or categories of confidential information covered
2. Schedule 2 - Security Requirements: Specific technical and organizational security measures required
3. Schedule 3 - Approved Subcontractors: List of pre-approved subcontractors (if applicable)
4. Appendix A - Data Processing Details: Details of personal information processing activities
5. Appendix B - Breach Response Plan: Detailed procedures for handling data and confidentiality breaches
Find the exact document you need
National Data Privacy Agreement
Australian-compliant data privacy agreement template addressing Privacy Act requirements and data protection obligations.
DPA Data Protection Agreement
An Australian-compliant Data Protection Agreement governing the processing of personal information between organizations under the Privacy Act 1988 and APPs.
Joint Controller Data Sharing Agreement
An Australian-law governed agreement establishing terms for joint control and sharing of personal data between organizations, ensuring compliance with Australian privacy legislation.
Data Controller Agreement
An Australian-compliant agreement establishing data controller obligations and responsibilities under the Privacy Act 1988 and related privacy legislation.
Joint Data Controller Agreement
An Australian law-compliant agreement establishing rights and obligations between joint data controllers under the Privacy Act 1988 and APPs.
Non Disclosure Agreement Data Protection
Australian Non-Disclosure Agreement with integrated data protection provisions compliant with the Privacy Act 1988 (Cth) and APPs.
Data Protection Addendum
An Australian law-compliant addendum establishing data protection obligations between data controllers and processors under the Privacy Act 1988 and APPs.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)