Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the Data Controller and Data Processor, including full legal names and registered addresses
2. Background: Context of the agreement, relationship between parties, and purpose of data processing activities
3. Definitions: Definitions of key terms including Personal Information, Processing, Data Subject, Security Breach, and other relevant terms under Canadian privacy laws
4. Scope and Purpose of Processing: Detailed description of the data processing activities, types of personal information involved, and purposes of processing
5. Obligations of the Data Controller: Responsibilities of the data controller including providing lawful instructions, obtaining necessary consents, and ensuring legal basis for processing
6. Obligations of the Data Processor: Core processor obligations including processing only on documented instructions, maintaining confidentiality, implementing security measures, and breach notification requirements
7. Security Measures: Technical and organizational security measures required to protect personal information
8. Sub-processing: Conditions and requirements for engaging sub-processors, including notification and approval processes
9. Data Subject Rights: Procedures for handling data subject requests and supporting the controller in responding to such requests
10. Data Breach Notification: Procedures and timeframes for reporting security breaches in accordance with PIPEDA requirements
11. Audit Rights: Controller's rights to audit processor's compliance and processor's obligation to demonstrate compliance
12. Term and Termination: Duration of the agreement, termination circumstances, and data deletion/return obligations
13. Governing Law and Jurisdiction: Specification of Canadian law as governing law and jurisdiction for disputes
1. Cross-border Data Transfers: Required when personal information will be transferred outside of Canada, addressing adequacy requirements and transfer mechanisms
2. Industry-Specific Requirements: Additional provisions for specific sectors such as healthcare or financial services
3. Provincial Law Compliance: Specific provisions to address requirements of provincial privacy laws where applicable
4. Data Protection Impact Assessment: Procedures for conducting DPIAs when required for high-risk processing activities
5. Insurance Requirements: Specific insurance obligations for cyber liability and data breach coverage
6. Service Levels: Specific performance metrics and standards for data processing activities, if applicable
1. Schedule A - Description of Processing Activities: Detailed description of processing activities, categories of data subjects, types of personal information, and processing purposes
2. Schedule B - Technical and Organizational Security Measures: Comprehensive list of security measures implemented by the processor
3. Schedule C - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule D - Data Transfer Mechanisms: Details of mechanisms used for any cross-border data transfers
5. Schedule E - Security Breach Response Plan: Detailed procedures for handling and reporting security breaches
6. Appendix 1 - Contact Details: Contact information for key personnel responsible for data protection and breach notification
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
