Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the data controller and data processor, including full legal names, registration details, and addresses
2. Background: Context of the agreement, relationship between parties, and brief description of the data processing activities
3. Definitions: Key terms used in the agreement, including those from FADP and relevant technical terminology
4. Scope and Purpose of Processing: Detailed description of the authorized data processing activities, categories of data subjects, and types of personal data
5. Duration: Term of the agreement, including start date and termination provisions
6. Obligations of the Data Processor: Core responsibilities including processing only on documented instructions, confidentiality, security measures, and subprocessing restrictions
7. Obligations of the Data Controller: Responsibilities including lawful basis for processing, accuracy of data, and providing documented instructions
8. Technical and Organizational Measures: Security requirements and standards to be maintained for data protection
9. Data Subject Rights: Procedures for handling data subject requests and processor's assistance obligations
10. Personal Data Breach: Notification requirements and procedures in case of data breaches
11. Audit Rights: Controller's rights to audit and processor's obligations to demonstrate compliance
12. Cross-border Data Transfers: Rules and safeguards for international data transfers
13. Return or Deletion of Data: Obligations regarding data handling upon termination of services
14. Liability and Indemnification: Allocation of responsibilities and financial obligations for breaches
15. General Provisions: Standard contractual terms including governing law, jurisdiction, and amendment procedures
1. Insurance Requirements: Specific insurance obligations for the processor - include when dealing with sensitive data or high-risk processing
2. Business Continuity: Disaster recovery and business continuity requirements - include for critical processing activities
3. Special Categories of Data: Additional safeguards for sensitive data - include when processing special categories of personal data
4. Industry-Specific Requirements: Specific provisions for regulated industries - include for financial services, healthcare, etc.
5. Data Protection Impact Assessments: Cooperation requirements for DPIAs - include for high-risk processing activities
6. Joint Controller Provisions: Additional terms for joint controller scenarios - include when parties share controller responsibilities
1. Schedule 1 - Processing Activities: Detailed description of processing activities, including purposes, categories of data subjects and personal data
2. Schedule 2 - Technical and Organizational Measures: Detailed security measures and controls implemented by the processor
3. Schedule 3 - Approved Subprocessors: List of authorized subprocessors and their processing activities
4. Schedule 4 - Transfer Mechanisms: Details of cross-border transfer mechanisms and safeguards
5. Schedule 5 - Contact Points: Key contacts and escalation procedures for both parties
6. Appendix A - Data Breach Response Plan: Detailed procedures and responsibilities for handling data breaches
7. Appendix B - Audit Requirements: Specific procedures and requirements for conducting audits
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
