Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of all joint controllers who are parties to the agreement
2. Background: Context of the data sharing arrangement, relationship between parties, and purpose of the agreement
3. Definitions: Defined terms including key concepts from privacy laws, data categories, and operational terms
4. Scope and Purpose: Detailed description of the data sharing activities and legitimate purposes for processing
5. Roles and Responsibilities: Clear delineation of each party's obligations as joint controllers
6. Data Protection Compliance: Commitments to comply with Privacy Act, APPs, and other relevant legislation
7. Technical and Organizational Measures: Security measures implemented to protect shared data
8. Data Subject Rights: Procedures for handling data subject requests and maintaining their rights
9. Data Breach Notification: Protocols for identifying, reporting, and managing data breaches
10. Confidentiality: Obligations regarding confidentiality of shared data and business information
11. Term and Termination: Duration of agreement and circumstances for termination
12. Liability and Indemnities: Allocation of risk and responsibilities between parties
13. General Provisions: Standard contractual clauses including governing law, dispute resolution, and entire agreement
1. Cross-Border Data Transfers: Required when data will be transferred outside Australia, detailing compliance with APP 8
2. Subprocessing: Include when parties may engage third-party data processors
3. Industry-Specific Compliance: Add when sharing data in regulated sectors (e.g., healthcare, financial services)
4. Data Monetization: Include if parties intend to commercialize the shared data
5. Consumer Data Right Compliance: Required when sharing involves CDR data
6. Joint Marketing Activities: Include if parties will conduct joint marketing using shared data
1. Categories of Data: Detailed list of personal and non-personal data being shared
2. Technical Security Requirements: Specific security standards and protocols for data protection
3. Data Processing Activities: Detailed description of processing operations and purposes
4. Contact Points and Escalation Procedures: Key contacts and procedures for operational matters and emergencies
5. Privacy Notice Template: Joint privacy notice to be provided to data subjects
6. Data Breach Response Plan: Detailed procedures for managing data breaches
7. Approved Subprocessors: List of approved third-party processors if applicable
Find the exact document you need
National Data Privacy Agreement
Australian-compliant data privacy agreement template addressing Privacy Act requirements and data protection obligations.
DPA Data Protection Agreement
An Australian-compliant Data Protection Agreement governing the processing of personal information between organizations under the Privacy Act 1988 and APPs.
Joint Controller Data Sharing Agreement
An Australian-law governed agreement establishing terms for joint control and sharing of personal data between organizations, ensuring compliance with Australian privacy legislation.
Data Controller Agreement
An Australian-compliant agreement establishing data controller obligations and responsibilities under the Privacy Act 1988 and related privacy legislation.
Joint Data Controller Agreement
An Australian law-compliant agreement establishing rights and obligations between joint data controllers under the Privacy Act 1988 and APPs.
Non Disclosure Agreement Data Protection
Australian Non-Disclosure Agreement with integrated data protection provisions compliant with the Privacy Act 1988 (Cth) and APPs.
Data Protection Addendum
An Australian law-compliant addendum establishing data protection obligations between data controllers and processors under the Privacy Act 1988 and APPs.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)