Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the data exporter and data importer, including their full legal names, registration numbers, and addresses
2. Background: Context of the data transfer relationship and purpose of the agreement
3. Definitions: Detailed definitions of terms used in the agreement, including specific POPIA-related terminology
4. Scope and Purpose of Transfer: Details of what personal information will be transferred and for what specific purposes
5. Obligations of the Data Exporter: Responsibilities of the party sending the data, including ensuring legal basis for transfer and data accuracy
6. Obligations of the Data Importer: Responsibilities of the receiving party, including data protection measures and processing limitations
7. Security Measures: Specific technical and organizational security measures to protect the transferred data
8. Data Subject Rights: Procedures for handling data subject requests and ensuring POPIA compliance regarding subject rights
9. Breach Notification: Procedures and timeframes for reporting data breaches
10. Audit Rights: Rights of the data exporter to audit the data importer's compliance
11. Duration and Termination: Term of the agreement and conditions for termination
12. Return or Destruction of Data: Obligations regarding data handling upon termination
13. Governing Law and Jurisdiction: Specification of South African law as governing law and jurisdiction for disputes
14. General Provisions: Standard contractual terms including severability, entire agreement, and amendments
1. Sub-Processing: Required if the data importer will use sub-processors, detailing conditions and approval processes
2. Special Categories of Personal Information: Required when transferring sensitive personal information as defined in POPIA
3. Data Protection Impact Assessment: Required for high-risk processing activities
4. Insurance Requirements: Optional section specifying required insurance coverage for data protection
5. Cross-Border Transfer Mechanisms: Required when transfers involve countries without adequate data protection laws
6. Business Continuity and Disaster Recovery: Optional section for critical data transfers requiring contingency planning
7. Joint Controller Provisions: Required when both parties act as joint controllers of the personal information
1. Schedule 1: Description of Transfer: Detailed description of the personal information being transferred, including categories of data subjects and data types
2. Schedule 2: Technical and Security Measures: Specific technical and organizational security measures implemented by both parties
3. Schedule 3: Authorized Sub-Processors: List of approved sub-processors, if applicable
4. Schedule 4: Transfer Impact Assessment: Assessment of risks and mitigation measures for the data transfer
5. Schedule 5: Data Processing Instructions: Detailed processing instructions and parameters
6. Appendix A: Contact Points: List of key contacts for data protection matters and breach reporting
7. Appendix B: Standard Contractual Clauses: If required, standard contractual clauses for international transfers
Find the exact document you need
International Data Transfer Addendum
A South African law-compliant addendum governing international transfers of personal information under POPIA requirements.
Intra Group Data Processing Agreement
A South African law-governed agreement regulating personal information processing between entities within the same corporate group, ensuring POPIA compliance.
Third Party Processing Agreement
A South African law-governed agreement regulating personal information processing between a responsible party and an operator under POPIA.
Data Processing Addendum
A South African law-compliant agreement governing personal information processing between controllers and processors under POPIA.
Intercompany Data Transfer Agreement
South African law-governed agreement regulating intra-group data transfers in compliance with POPIA and local data protection regulations.
Data Management Agreement
A South African law-compliant agreement governing data management and processing activities between organizations, ensuring POPIA compliance and data protection.
Data Controller To Data Controller Agreement
South African POPIA-compliant agreement governing personal information sharing between two data controllers, establishing mutual obligations and responsibilities.
DPA Agreement
A South African law-compliant Data Processing Agreement establishing terms for handling personal information under POPIA regulations.
Third Party Data Processing Agreement
A South African law-compliant agreement governing the processing of personal information by a third-party operator on behalf of a responsible party under POPIA.
Personal Data Transfer Agreement
A POPIA-compliant agreement for transferring personal information between parties under South African law.
Controller Processor Agreement
A South African law-governed agreement between a data controller and processor establishing terms for personal information processing under POPIA.
Affiliate Addendum
A South African law-compliant addendum establishing terms and conditions for affiliate marketing relationships, including commission structures and compliance requirements.
Sub Processing Agreement
A South African-compliant agreement governing the delegation of personal information processing activities to a sub-processor under POPIA requirements.
International Data Transfer Agreement
A South African law-governed agreement for cross-border personal information transfers, ensuring POPIA compliance and data protection standards.
Data Protection Addendum
A South African law-governed addendum establishing POPIA-compliant terms for personal information processing between parties.
ұԾ’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)