Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the contracting parties, including registration details and addresses
2. Background: Context of the agreement, relationship between parties, and purpose of data management services
3. Definitions: Detailed definitions of terms used throughout the agreement, including POPIA-specific terminology
4. Scope of Services: Detailed description of data management services to be provided
5. Data Protection Obligations: Compliance with POPIA and other relevant data protection laws
6. Data Security Measures: Required security standards, protocols, and measures for data protection
7. Roles and Responsibilities: Clear delineation of roles as data controller/operator under POPIA
8. Data Processing Instructions: Specific instructions for handling and processing personal information
9. Confidentiality: Obligations regarding confidentiality of data and business information
10. Breach Notification: Procedures and timeframes for reporting data breaches
11. Audit Rights: Rights to audit compliance with agreement terms and data protection laws
12. Term and Termination: Duration of agreement and termination provisions
13. Data Return/Destruction: Procedures for handling data upon termination
14. Liability and Indemnification: Allocation of risks and responsibilities for data-related incidents
15. General Provisions: Standard contractual terms including governing law, jurisdiction, and dispute resolution
1. Cross-border Data Transfers: Provisions for international data transfers, required when data will be processed outside South Africa
2. Sub-processing: Terms for engaging sub-processors, needed when third-party processing is anticipated
3. Industry-Specific Compliance: Additional compliance requirements for specific sectors (e.g., healthcare, financial services)
4. Data Analytics and Mining: Provisions for data analysis and mining activities, if part of services
5. Disaster Recovery: Detailed disaster recovery and business continuity procedures, recommended for critical data
6. Insurance Requirements: Specific insurance obligations for data-related risks
7. Service Level Agreement: Specific performance metrics and service levels, if applicable
8. Change Management: Procedures for implementing changes to data management processes
1. Schedule 1: Data Categories and Processing Activities: Detailed list of data types and processing activities covered
2. Schedule 2: Technical and Organizational Security Measures: Specific security measures and protocols to be implemented
3. Schedule 3: Service Level Specifications: Detailed service levels and performance metrics
4. Schedule 4: Fee Schedule: Pricing and payment terms for services
5. Schedule 5: Authorized Sub-processors: List of approved sub-processors and their roles
6. Schedule 6: Data Breach Response Plan: Detailed procedures for handling data breaches
7. Appendix A: Contact Details: Key contacts for operational and emergency matters
8. Appendix B: Data Processing Instructions: Detailed processing instructions and procedures
Find the exact document you need
International Data Transfer Addendum
A South African law-compliant addendum governing international transfers of personal information under POPIA requirements.
Intra Group Data Processing Agreement
A South African law-governed agreement regulating personal information processing between entities within the same corporate group, ensuring POPIA compliance.
Third Party Processing Agreement
A South African law-governed agreement regulating personal information processing between a responsible party and an operator under POPIA.
Data Processing Addendum
A South African law-compliant agreement governing personal information processing between controllers and processors under POPIA.
Intercompany Data Transfer Agreement
South African law-governed agreement regulating intra-group data transfers in compliance with POPIA and local data protection regulations.
Data Management Agreement
A South African law-compliant agreement governing data management and processing activities between organizations, ensuring POPIA compliance and data protection.
Data Controller To Data Controller Agreement
South African POPIA-compliant agreement governing personal information sharing between two data controllers, establishing mutual obligations and responsibilities.
DPA Agreement
A South African law-compliant Data Processing Agreement establishing terms for handling personal information under POPIA regulations.
Third Party Data Processing Agreement
A South African law-compliant agreement governing the processing of personal information by a third-party operator on behalf of a responsible party under POPIA.
Personal Data Transfer Agreement
A POPIA-compliant agreement for transferring personal information between parties under South African law.
Controller Processor Agreement
A South African law-governed agreement between a data controller and processor establishing terms for personal information processing under POPIA.
Affiliate Addendum
A South African law-compliant addendum establishing terms and conditions for affiliate marketing relationships, including commission structures and compliance requirements.
Sub Processing Agreement
A South African-compliant agreement governing the delegation of personal information processing activities to a sub-processor under POPIA requirements.
International Data Transfer Agreement
A South African law-governed agreement for cross-border personal information transfers, ensuring POPIA compliance and data protection standards.
Data Protection Addendum
A South African law-governed addendum establishing POPIA-compliant terms for personal information processing between parties.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)