Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the data controller and data processor, including registered details
2. Background: Context of the processing relationship and reference to main service agreement
3. Definitions: Key terms used in the agreement, including GDPR-specific terminology
4. Scope and Purpose of Processing: Detailed description of what personal data will be processed and for what purposes
5. Duration: Term of the agreement and provisions for termination
6. Nature and Purpose of Processing: Specific details about how data will be processed and for what business purposes
7. Processor Obligations: Core obligations of the processor including confidentiality, security, and cooperation requirements
8. Sub-processors: Rules and procedures for engaging sub-processors
9. Data Subject Rights: Processor's obligations to assist with data subject requests
10. Data Breach Notification: Procedures and timeframes for reporting data breaches
11. Audit Rights: Controller's rights to audit and processor's obligations to demonstrate compliance
12. International Transfers: Rules for transferring data outside the EEA
13. Return or Deletion of Data: Obligations regarding data at the end of processing
14. Liability and Indemnities: Allocation of risks and responsibilities
15. Governing Law and Jurisdiction: Confirmation of Dutch law application and jurisdiction
1. Insurance Requirements: Specific insurance obligations for the processor - include when dealing with sensitive data or high-risk processing
2. Business Continuity: Business continuity and disaster recovery requirements - include for critical processing activities
3. Specific Security Requirements: Additional security measures beyond standard requirements - include for high-risk processing
4. Costs and Fees: Payment terms for processing services - include if not covered in main service agreement
5. Joint Controller Provisions: Specific provisions if parties act as joint controllers - include only if applicable
6. Industry-Specific Requirements: Additional requirements for specific sectors (e.g., healthcare, financial) - include based on industry
1. Schedule 1 - Details of Processing: Detailed description of data categories, subjects, processing operations
2. Schedule 2 - Technical and Organizational Measures: Security measures and controls implemented by the processor
3. Schedule 3 - Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Schedule 4 - Transfer Mechanisms: Details of international transfer mechanisms (if applicable)
5. Schedule 5 - Security Breach Response Plan: Detailed procedures for handling and reporting data breaches
6. Appendix A - Contact Details: Key contacts for both parties for operational and breach notification purposes
Find the document you need
International Data Transfer Addendum
Dutch law-governed International Data Transfer Addendum for GDPR-compliant personal data transfers from the Netherlands/EU to non-EEA countries.
Intra Group Data Processing Agreement
Dutch law-governed data processing agreement for intra-group personal data transfers and processing, ensuring GDPR compliance within corporate groups.
Data Processing Contract
Dutch law-governed Data Processing Contract establishing GDPR-compliant terms between controller and processor.
Controller To Controller Agreement
A Dutch law-governed agreement between two data controllers establishing terms for compliant personal data sharing under GDPR and UAVG.
Joint Controller Agreement
A Dutch law-governed agreement establishing responsibilities and obligations between joint controllers under GDPR and UAVG for shared data processing activities.
Data Processing Addendum
A Dutch law-governed agreement establishing GDPR-compliant terms for personal data processing between a controller and processor.
Controller Processor Agreement
A Dutch law-governed agreement establishing GDPR-compliant terms for personal data processing between controller and processor.
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
