Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Data Processing Agreement
I need a data processing agreement ensuring compliance with GDPR, detailing data retention for 5 years, breach notification within 72 hours, and third-party data sharing limited to EU-based processors only.
What is a Data Processing Agreement?
A Data Processing Agreement spells out how one company will handle and protect another company's sensitive data. It's a legally binding contract that becomes essential when you share customer information, employee records, or other personal data with vendors, cloud services, or business partners.
Under U.S. privacy laws like CCPA and state regulations, these agreements help companies stay compliant while working with data processors. They outline security measures, data breach procedures, and limits on how information can be used. Most businesses need them when using services like payroll systems, marketing platforms, or customer support tools that handle personal data.
When should you use a Data Processing Agreement?
You need a Data Processing Agreement whenever you share customer data with outside vendors or service providers. This includes common scenarios like hiring a cloud storage company, using marketing automation tools, or working with payment processors that handle personal information from your customers or employees.
The agreement becomes particularly important when dealing with sensitive data covered by U.S. privacy laws like CCPA, HIPAA, or state regulations. For example, if you use third-party software for payroll processing, customer relationship management, or email marketing, having this agreement in place protects both parties and ensures legal compliance.
What are the different types of Data Processing Agreement?
- DPA Agreement: The standard comprehensive agreement covering basic data processing terms and security requirements
- Data Transfer Addendum: Specifically addresses cross-border data transfers and additional safeguards needed
- Data Processing Addendum: Adds to existing service agreements with detailed processing instructions and compliance requirements
- Data Protection Addendum: Focuses on enhanced privacy protections and security measures
- International Data Transfer Agreement: Comprehensive agreement for global data transfers with country-specific compliance measures
Who should typically use a Data Processing Agreement?
- Data Controllers: Companies that collect and own customer data, like retailers, healthcare providers, or financial institutions
- Data Processors: Third-party vendors who handle data on behalf of controllers, such as cloud service providers or marketing agencies
- Legal Teams: In-house counsel or external law firms who draft and review the agreements to ensure compliance
- Privacy Officers: Professionals who oversee data protection policies and ensure DPA requirements are met
- IT Security Teams: Technical staff responsible for implementing security measures specified in the agreement
- Compliance Managers: Personnel who monitor adherence to data protection requirements and regulatory standards
How do you write a Data Processing Agreement?
- Data Inventory: List all types of personal data being processed, including customer details, employee records, or sensitive information
- Processing Activities: Document how the data will be used, stored, transferred, and protected by the processor
- Security Measures: Outline specific technical and organizational safeguards required to protect the data
- Compliance Requirements: Identify relevant U.S. privacy laws and state regulations that apply to your data processing
- Contact Details: Gather information for key personnel responsible for data protection at both organizations
- Review Process: Set up procedures for regular monitoring and updating the agreement as needed
What should be included in a Data Processing Agreement?
- Parties and Roles: Clear identification of data controller and processor, including contact details and responsibilities
- Data Description: Specific types of personal data being processed and purposes of processing
- Security Measures: Technical and organizational safeguards to protect data from breaches
- Breach Protocol: Procedures for handling and reporting data breaches within required timeframes
- Compliance Terms: References to relevant U.S. privacy laws and regulations being followed
- Data Transfer Rules: Guidelines for sharing data with subprocessors or across borders
- Termination Terms: Procedures for ending the agreement and returning or deleting data
What's the difference between a Data Processing Agreement and a Data Sharing Agreement?
A Data Processing Agreement differs significantly from a Data Sharing Agreement in both purpose and scope. While both deal with data handling, they serve distinct legal functions in U.S. business operations.
- Primary Purpose: DPAs govern how a third party processes data on behalf of the data owner, while Data Sharing Agreements establish rules for exchanging data between equal partners
- Legal Relationship: DPAs create a controller-processor relationship with clear hierarchies; Data Sharing Agreements typically involve peer organizations with mutual obligations
- Compliance Focus: DPAs emphasize security measures and processing limitations under privacy laws like CCPA; Data Sharing Agreements focus on mutual rights, usage terms, and confidentiality
- Scope of Control: DPAs restrict the processor's use of data to specific authorized purposes; Data Sharing Agreements often grant broader usage rights to both parties
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.