Your data doesn't train Ҵý's AI
You keep IP ownership of your docs
1. Parties: Identification of all parties to the agreement, including ABN/ACN numbers
2. Background: Context of the data sharing arrangement and purpose of the agreement
3. Definitions: Detailed definitions including 'Confidential Information', 'Personal Information', 'Data', 'Permitted Purpose', and other key terms
4. Scope of Agreement: Clear boundaries of what data is covered and permitted uses
5. Confidentiality Obligations: Core confidentiality requirements and restrictions on use
6. Data Protection and Security: Specific measures required to protect shared data
7. Privacy Compliance: Obligations under the Privacy Act and Australian Privacy Principles
8. Permitted Disclosures: Circumstances under which data can be shared and with whom
9. Data Handling Requirements: Specific protocols for handling, storing, and processing data
10. Breach Notification: Procedures for handling and reporting data breaches
11. Term and Termination: Duration of agreement and termination provisions
12. Return or Destruction of Data: Requirements for data handling upon termination
13. General Provisions: Standard provisions including governing law, jurisdiction, and entire agreement
1. Cross-border Data Transfers: Required when data may be transferred outside Australia
2. Third Party Access: Include when third party contractors or service providers may need access to the data
3. Data Analytics and Derived Data: Include when shared data will be used for analytics or to create derived data sets
4. Industry-Specific Requirements: Include when data relates to regulated industries (e.g., healthcare, financial services)
5. Audit Rights: Include when regular auditing of data handling practices is required
6. Insurance Requirements: Include when specific insurance coverage for data breaches is required
7. Data Quality and Updates: Include when ongoing data quality management is important
8. Competitive Use Restrictions: Include when parties are competitors or could become competitors
1. Schedule 1 - Data Description: Detailed description of data types, formats, and classification
2. Schedule 2 - Security Standards: Specific security measures and standards to be maintained
3. Schedule 3 - Approved Purposes: Detailed list of approved uses for the shared data
4. Schedule 4 - Authorized Personnel: List of personnel authorized to access the data
5. Schedule 5 - Data Handling Protocols: Detailed procedures for data transfer, storage, and handling
6. Appendix A - Data Breach Response Plan: Detailed procedures for responding to data breaches
7. Appendix B - Privacy Impact Assessment: Assessment of privacy implications and mitigation measures
Find the document you need
ұԾ’s Security Promise
Ҵý is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; ұԾ’s AI improves independently
All data stored on Ҵý is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
