Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the data controller and data processor, including their legal representatives
2. Background: Context of the processing relationship and reference to the main service agreement
3. Definitions: Key terms used in the agreement, including GDPR-specific terminology
4. Scope and Purpose of Processing: Detailed description of what personal data will be processed and for what specific purposes
5. Duration: Term of the agreement and its relationship to the main service agreement
6. Nature and Purpose of Processing: Specific details about how the data will be processed and the legitimate basis for processing
7. Processor Obligations: Core obligations of the processor including confidentiality, security, and compliance with controller's instructions
8. Sub-processing: Rules and procedures for engaging sub-processors
9. Data Subject Rights: Processor's obligations to assist controller with data subject requests
10. Security Measures: Required technical and organizational security measures
11. Data Breach Notification: Procedures and timelines for reporting data breaches
12. Audit Rights: Controller's rights to audit and processor's obligations to demonstrate compliance
13. Data Return and Deletion: Obligations regarding data handling upon agreement termination
14. Liability and Indemnities: Allocation of risks and responsibilities between parties
15. Governing Law and Jurisdiction: Specification of Dutch law and jurisdiction
1. International Data Transfers: Required when personal data will be transferred outside the EU/EEA
2. Special Categories of Data: Additional requirements when processing sensitive personal data
3. Joint Controller Provisions: Required when the relationship includes elements of joint controllership
4. Insurance Requirements: Specific insurance obligations for high-risk processing activities
5. Business Continuity: Required for critical processing operations requiring specific continuity guarantees
6. Data Protection Impact Assessment: Cooperation obligations when processing requires a DPIA
1. Schedule 1 - Processing Activities: Detailed description of processing activities, including categories of data subjects and personal data
2. Schedule 2 - Technical and Organizational Measures: Detailed security measures implemented by the processor
3. Schedule 3 - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule 4 - Security Breach Notification Template: Standard format for reporting data breaches
5. Schedule 5 - Data Transfer Mechanisms: Details of mechanisms used for any international data transfers
6. Schedule 6 - Contact Points: Key contacts for operational, technical and legal matters
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
