Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the data controller (responsible party) and data processor (operator) with their full legal details
2. Background: Context of the agreement and the processing relationship between the parties
3. Definitions: Definitions of key terms, incorporating POPIA terminology and agreement-specific terms
4. Scope and Purpose of Processing: Detailed description of the processing activities, purposes, and types of personal information involved
5. Obligations of the Processor: Core responsibilities of the processor including security measures, confidentiality, and compliance with POPIA
6. Instructions and Authority: Requirements for the processor to act only on documented instructions from the controller
7. Security Measures: Technical and organizational security measures required to protect personal information
8. Sub-processing: Conditions and requirements for engaging sub-processors
9. Data Subject Rights: Procedures for handling data subject requests and assisting the controller
10. Data Breaches: Notification requirements and procedures for handling data breaches
11. Audit Rights: Controller's rights to audit the processor's compliance
12. Term and Termination: Duration of the agreement and termination provisions
13. Return or Deletion of Data: Obligations regarding personal information upon termination
14. Liability and Indemnities: Allocation of liability and indemnification provisions
15. General Provisions: Standard contractual provisions including governing law, jurisdiction, and notice requirements
1. Cross-border Data Transfers: Required when personal information will be transferred outside South Africa
2. Special Personal Information: Required when processing special categories of personal information as defined in POPIA
3. Direct Marketing: Required when the processing activities involve direct marketing purposes
4. Automated Decision Making: Required when processing involves automated decision-making or profiling
5. Children's Data: Required when processing personal information of children
6. Insurance Requirements: Required when specific insurance coverage is needed for the processing activities
7. Business Continuity: Required for critical processing activities requiring business continuity guarantees
1. Schedule 1 - Processing Activities: Detailed description of processing activities, including categories of data subjects, types of personal information, and processing purposes
2. Schedule 2 - Technical and Organizational Security Measures: Detailed specifications of required security measures and controls
3. Schedule 3 - Approved Sub-processors: List of approved sub-processors and their processing activities
4. Schedule 4 - Transfer Mechanisms: Details of mechanisms for lawful cross-border transfers if applicable
5. Schedule 5 - Service Levels: Service level agreements specific to data processing activities
6. Appendix A - Data Breach Response Plan: Detailed procedures for handling and reporting data breaches
7. Appendix B - Audit Procedures: Detailed procedures for conducting compliance audits
Find the exact document you need
International Data Transfer Addendum
A South African law-compliant addendum governing international transfers of personal information under POPIA requirements.
Intra Group Data Processing Agreement
A South African law-governed agreement regulating personal information processing between entities within the same corporate group, ensuring POPIA compliance.
Third Party Processing Agreement
A South African law-governed agreement regulating personal information processing between a responsible party and an operator under POPIA.
Data Processing Addendum
A South African law-compliant agreement governing personal information processing between controllers and processors under POPIA.
Intercompany Data Transfer Agreement
South African law-governed agreement regulating intra-group data transfers in compliance with POPIA and local data protection regulations.
Data Management Agreement
A South African law-compliant agreement governing data management and processing activities between organizations, ensuring POPIA compliance and data protection.
Data Controller To Data Controller Agreement
South African POPIA-compliant agreement governing personal information sharing between two data controllers, establishing mutual obligations and responsibilities.
DPA Agreement
A South African law-compliant Data Processing Agreement establishing terms for handling personal information under POPIA regulations.
Third Party Data Processing Agreement
A South African law-compliant agreement governing the processing of personal information by a third-party operator on behalf of a responsible party under POPIA.
Personal Data Transfer Agreement
A POPIA-compliant agreement for transferring personal information between parties under South African law.
Controller Processor Agreement
A South African law-governed agreement between a data controller and processor establishing terms for personal information processing under POPIA.
Affiliate Addendum
A South African law-compliant addendum establishing terms and conditions for affiliate marketing relationships, including commission structures and compliance requirements.
Sub Processing Agreement
A South African-compliant agreement governing the delegation of personal information processing activities to a sub-processor under POPIA requirements.
International Data Transfer Agreement
A South African law-governed agreement for cross-border personal information transfers, ensuring POPIA compliance and data protection standards.
Data Protection Addendum
A South African law-governed addendum establishing POPIA-compliant terms for personal information processing between parties.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)