Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the data controller and data processor, including full legal names and registration details
2. Background: Context of the agreement and the relationship between the parties
3. Definitions: Key terms used in the agreement, aligned with PDPL definitions
4. Scope and Purpose of Processing: Detailed description of the data processing activities and their legitimate purposes
5. Obligations of the Data Processor: Core responsibilities including security measures, confidentiality, and processing limitations
6. Obligations of the Data Controller: Controller's duties including providing instructions and ensuring lawful basis for processing
7. Technical and Organizational Measures: Security measures required to protect personal data
8. Sub-processing: Rules and restrictions regarding the engagement of sub-processors
9. Data Subject Rights: Procedures for handling data subject requests and ensuring their rights
10. Data Breach Notification: Procedures and timeframes for reporting data breaches
11. Audit Rights: Controller's rights to audit processor's compliance
12. Cross-border Data Transfers: Rules for transferring data outside Saudi Arabia
13. Term and Termination: Duration of the agreement and termination provisions
14. Return or Deletion of Data: Obligations regarding data handling upon contract termination
15. Governing Law and Jurisdiction: Confirmation of Saudi Arabian law and jurisdiction
1. Special Categories of Personal Data: Additional provisions when processing sensitive personal data as defined under PDPL
2. Data Protection Impact Assessment: Requirements when processing activities require DPIA under Saudi law
3. Insurance Requirements: Specific insurance obligations for high-risk processing activities
4. Industry-Specific Compliance: Additional requirements for specific sectors (e.g., healthcare, financial services)
5. Joint Controller Provisions: Used when the relationship involves joint controllership rather than simple controller-processor relationship
6. Data Localization Requirements: Specific provisions for maintaining data within Saudi Arabia when required by law
1. Description of Processing Activities: Detailed information about the types of data, categories of data subjects, and processing operations
2. Technical and Organizational Security Measures: Detailed security protocols and measures implemented by the processor
3. Approved Sub-processors: List of pre-approved sub-processors and their processing activities
4. Data Transfer Mechanisms: Details of mechanisms used for international data transfers
5. Service Level Agreement: Performance metrics and service levels for data processing activities
6. Personal Data Breach Response Plan: Detailed procedures for handling and reporting data breaches
7. Data Retention Schedule: Specific timeframes for retaining different categories of data
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
