起草数据保护条款

0 浏览
0 试用
0 购买
Oct 2, 2025更新

生成合同中涉及特定数据类型的数据保护条款,确保法律严谨。

示例1

以下为一份可直接并入主服务合同或框架协议的数据保护附录(Data Protection Addendum/“本附录”)范本,适用于多业务线/多地区处理员工与客户个人信息(含敏感)并涉及跨境传输的情形。该范本采取“全球基线条款+地区附录+技术附件”的结构,确保在欧盟/英国/瑞士、中华人民共和国、美国(含加州)等主要法域的合规一致性与可执行性。请结合具体业务线(含各子服务/产品)、数据流程、技术架构与供应链分包情况,在附件中明确处理细节并完成必要的监管文件签署与备案。

数据保护附录(DPA)
版本号:[●];生效日:[●]
甲方:[●](可能为个人信息处理者/控制者)
乙方:[●](可能为受托处理者/处理者/服务提供商/承包商)

第一条 定义与适用范围
1.1 定义
- 个人信息/个人数据:指与已识别或可识别的自然人有关的任何信息,包括但不限于员工与客户信息。
- 敏感个人信息/特殊类别个人数据:在适用法域下需要加强保护的个人信息,包括但不限于身份证件号码、精准定位、金融账户、生物特征、健康与医疗、未成年人信息、工会会员、宗教信仰、种族/民族、性取向等。各法域定义以适用法律为准(如欧盟GDPR第9条、中华人民共和国《个人信息保护法》(“PIPL”)第28条、加州CPRA对“敏感信息”的界定等)。
- 处理/Processing:就个人信息的任何操作或一组操作(如收集、存储、使用、传输、提供、公开、删除、销毁、查阅、分析、画像、自动化决策等)。
- 控制者/个人信息处理者、处理者/受托处理者、分处理者/再受托方:依各法域法律(如GDPR第4条、PIPL及配套制度、加州CPRA等)之法定含义。
- 适用法律:指对本附录项下个人信息处理活动具有管辖的所有法律、法规、规章、国家标准/强制性标准、监管指引与裁判规则,包括欧盟GDPR、英国UK GDPR及DPA 2018、瑞士FADP、中华人民共和国PIPL及配套办法(含出境标准合同、数据出境安全评估等)、美国各州隐私法(含加州CPRA)等。

1.2 适用业务范围
本附录适用于甲乙双方在主合同、框架协议、订单、工作说明书(SOW)、产品说明及其补充文件中约定的所有业务线与地区下的个人信息处理活动。各业务线的个人信息处理详情(包括数据主体类别、数据类型、处理目的、处理期限、接收方、跨境传输路径及安全措施等)应在附件一(处理说明)中分别列明,并与各SOW相互参照。

1.3 法律地位与优先顺序
如本附录与主合同其他条款不一致,以数据保护合规为目的之条款为优先;若涉及各法域强制性要求冲突,适用更高保护标准。欧盟/英国标准合同条款(SCC/IDTA/UK Addendum)及中国“个人信息出境标准合同”等经签署且生效者,在其适用范围内优先于本附录的一般性约定。

第二条 角色定位与合规基础
2.1 角色认定
各业务线的角色关系(控制者-处理者、共同控制者、处理者-分处理者、CPRA下的服务提供商/承包商等)由附件一逐项明确。若未明确,默认甲方为控制者/个人信息处理者,乙方为处理者/受托处理者。

2.2 合法性基础与透明度
- 甲方负责确定各法域下处理的合法性基础、透明度义务及个人告知(如GDPR第6条、第13/14条;PIPL第13条、第17条),并保证已依法取得必要授权、告知与同意(如涉及敏感个人信息、跨境传输需取得单独同意等)。
- 对员工数据,甲方确认其合法性基础与雇佣法一致,避免在不适当情况下依赖同意作为唯一基础(GDPR一致性原则)。乙方据甲方书面指示处理。

2.3 目的限制与数据最小化
乙方仅按甲方书面指示、为附件一载明之特定目的处理,且实施数据最小化、必要性与比例性控制,不得出于自身或第三方利益进行额外处理(除非法律明确要求且已依法通知甲方)。

第三条 处理者义务(GDPR第28条等对标)
3.1 仅依指示处理;如法律强制要求,乙方应在法律允许范围内先行通知甲方。
3.2 保密义务:确保所有经授权的人员受保密约束,并接受定期隐私与安全培训。
3.3 安全措施:实施不低于行业最佳实践的技术与组织措施(详见附件二),包括但不限于加密(传输与静态)、访问控制、最小权限、密钥管理、网络隔离、日志与监控、漏洞管理、零信任/多因子认证、数据脱敏与伪匿名化、备份与灾难恢复、供应链安全与安全开发生命周期(SSDLC)。
3.4 分处理者:须经甲方事先书面批准(一般/具体审批),签署不低于本附录标准的书面协议并实现义务贯穿;乙方对分处理者的行为与不作为承担连带责任。乙方应维护并更新分处理者清单(附件三)并提供订阅式变更通知机制与合理异议权。
3.5 协助义务:乙方应协助甲方履行个人权利请求(访问、更正、删除、限制、携带、反对、撤回同意、不被自动化决策仅独立决定等)、数据保护影响评估(DPIA/PIPIA)、与监管机构的事前咨询、合规审计及记录保存义务。
3.6 记录与审计:乙方维护处理活动记录与安全文档;甲方或其独立审计方可在合理频率与时间内进行审计(含远程审计、报告审阅与现场审计),前提是不对乙方商业机密与其他客户数据造成不当影响。乙方可提供第三方合规报告以替代部分审计(如ISO/IEC 27001、ISO 27701、SOC 2 Type II)。
3.7 数据泄露通报:一经发现可能导致个人信息泄露、篡改、丢失、未经授权访问或使用等安全事件,乙方应“无不当延误”并在不迟于知悉后72小时内(或更短时限,如适用法域要求)向甲方通报初步事实、影响评估、已采取与拟采取的补救措施,并持续更新直至处置完成。甲方负责(除非法律另有要求或双方另行约定)对监管机构与数据主体的正式法定通知;乙方应提供必要协助。
3.8 数据境内存储与本地化:如法域要求本地存储或限制跨境传输(如中国关键信息基础设施运营者、重要数据或触发阈值时的数据出境限制),乙方应遵循并协助甲方合规实施。

第四条 跨境传输与政府访问请求
4.1 欧盟/英国/瑞士跨境机制
- 适用GDPR第44条及后续条款、Schrems II判决要求,双方将签署并适用欧盟委员会2021/914号标准合同条款(SCC),根据实际角色选择模块(M1/M2/M3/M4),并完成附表;英国数据转移采用IDTA或UK Addendum;瑞士转移遵循FDPIC要求并作必要调整。
- 双方进行传输影响评估(TIA/DTIA),并采取必要的补充措施(如端到端加密、密钥由EEA内控制、分片存储、透明度报告、调用门槛审查等)。
4.2 中华人民共和国跨境机制
- 依据PIPL第38条及配套规定,双方择一并落实适用路径:网信部门安全评估(触发阈值情形:CIIO或处理≥100万人的个人信息,或自上年1月1日起累计向境外提供≥10万人个人信息或≥1万人敏感个人信息);个人信息保护认证;签署“个人信息出境标准合同”并在签署后10个工作日内向所在地网信部门备案;其他法律规定情形。甲方负责开展个人信息出境合规论证与风险自评估,乙方配合提供材料并履行相应承诺。
- 出境需履行单独同意、充分告知境外接收方信息、处理目的方式、个人行使权利路径等法定义务。
4.3 其他法域
- 美国等不限制“跨州传输”,但对向境外共享的尽职审查、政府访问与执法配合仍应遵守适用法律并采取合理的企业与技术措施确保等效保护。
4.4 政府/执法访问请求
- 如乙方收到任何政府、法院或执法机构关于个人信息披露的强制请求,须在法律允许范围内及时通知甲方并仅在依法必要且范围最小化的前提下提供,尽最大努力寻求保密、缩小范围或救济,并记录披露情况。

第五条 个人权利与自动化决策
5.1 乙方应建立流程以协助甲方在法定期限内响应员工与客户的权利请求;未经甲方书面同意,不直接回应数据主体,法律另有强制要求除外。
5.2 自动化决策与画像:涉及对个体权益有重大影响的自动化决策时,乙方应支持甲方履行透明度、解释权、拒绝或要求人工干预的权利(GDPR第22条、PIPL相关要求),并避免不合理差别对待。

第六条 数据保留、删除与返还
6.1 乙方仅在完成处理目的所必需期间保留个人信息,期满或协议终止时,按甲方选择删除或返还全部个人信息及其副本(法律另有强制保存要求的除外),并出具删除证明。
6.2 备份介质、日志与灾备站点的数据应同步执行删除或覆盖,确保可验证的不可逆销毁。

第七条 匿名化、去标识化与统计
在法律允许范围内,乙方可基于去标识化/匿名化数据进行统计与服务优化,但不得尝试重新识别或将其用于识别特定个体的目的,并确保该等处理不构成“个人信息处理”。匿名化/去标识化方法与控制点应在附件二说明。

第八条 CCPA/CPRA及同类州法下的契约要求(如适用)
8.1 若乙方在加州法律下构成“服务提供商”或“承包商”,乙方承诺:
- 仅为合同指定的业务目的处理,不得“出售”或“共享”个人信息,不得用于跨情境行为广告或构建独立档案;
- 遵循删除、纠正、限制使用敏感个人信息等指令,不得将个人信息“合并”用于非合同目的;
- 接受合理审计与合规证明要求;确保分处理者履行等同义务。
8.2 其他州法(VA/CO/CT/UT等)同类要求以更高标准从严执行。

第九条 责任与赔偿
9.1 乙方对违反本附录、适用法律或甲方书面指示而导致的损害承担相应责任;如涉及监管罚款、第三方索赔或数据主体损害赔偿,按双方主合同约定的责任限制与赔偿条款执行,但不适用于因乙方故意或重大过失导致的违法处理、数据泄露、擅自跨境传输、对个人权利的实质性侵害以及违反强制性数据传输机制承诺之情形(该等情形下的责任限制不适用或不低于法律允许的下限)。
9.2 任何一方的间接/后果性损失赔偿以主合同约定为准,但法律强制另有规定的,从其规定。

第十条 变更、存续与可分割
10.1 法律变更:如适用法律、监管指引或标准合同条款更新,双方应善意协商修订本附录及其附件,以维持合法性与可执行性。
10.2 本附录自生效日起存续至双方个人信息处理关系完全终止;涉及保密、安全事件处置、协助义务与责任条款在终止后继续有效。
10.3 条款如被认定无效或不可执行,不影响其他条款之效力;双方应以尽可能接近原意的条款替代。

附件一:处理说明(按业务线与地区列示)
A. 业务线/产品名称与地区覆盖
B. 数据主体类别:员工(在职/候选人/离职/实习生)、客户(终端消费者/B端客户联系人)、供应商联系人等
C. 个人信息类型:基础身份、账户、联系方式、交易/订单、定位与设备标识、行为日志、通信内容;敏感信息(身份证件、金融账户、生物识别、健康、政治立场/宗教信仰/工会会员等,按法域定义勾选)
D. 处理目的与法律基础:提供与运营服务、客户支持、计费结算、风控与反欺诈(在法域允许范围内)、合规审计、法定义务
E. 处理活动:收集、传输、存储、分析、画像/自动化决策(如有需特别标注)
F. 保留期限与删除机制:明确期限或触发条件、归档与备份策略
G. 接收方与分处理者:名称、所在地、角色、处理活动简述
H. 跨境路径:数据来源地、存储地、访问地、传输机制(SCC模块/IDTA/UK Addendum/瑞士调整;中国路径:安全评估/认证/标准合同+备案)
I. 权利请求与联系人:甲方与乙方的数据保护联系人/隐私邮箱
J. 特殊合规项:儿童/未成年人数据(如禁止或需额外同意)、员工监控类场景限制(透明度、必要性、工会/劳资程序要求)

附件二:安全与合规技术—组织措施(TOMs)
- 治理与人员:数据保护官(DPO)/信息安全负责人任命;内部制度与最小必要授权;背景调查与保密协议;定期培训与考核
- 资产与访问控制:资产清单;身份与访问管理(MFA/SSO/零信任);职能分离;特权账号管控;会话与超时策略
- 加密与密钥管理:TLS 1.2+/HTTPS;AES-256静态加密;密钥硬件托管或HSM;密钥分权与轮换;密钥不可由不受等效保护的境外主体单独控制(跨境补充措施)
- 开发与变更:安全编码标准;代码审计/SAST/DAST;依赖库SBOM;DevSecOps;变更审批与回滚
- 网络与主机安全:分区分域;WAF/IDS/IPS;反DDoS;端点安全;补丁与漏洞管理(含SLA)
- 数据治理:数据映射与分级分类;脱敏/伪匿名化;数据最小化;差分隐私(如适用);测试数据去敏
- 日志与监控:安全事件与SIEM;日志不可篡改;留存周期与访问审计
- 业务连续性与灾难恢复:RTO/RPO指标;异地灾备;演练
- 供应链安全:分处理者尽职调查;合同义务贯穿;合规认证/报告审阅
- 事件响应:CSIRT流程;72小时内初步通报能力;根因分析与改进追踪
- 匿名化/去标识化:方法论、攻击模型评估与重识别风险测试
- 隐私工程:隐私影响评估模板;默认隐私与数据保护设计(Privacy by Design & by Default)

附件三:分处理者清单
- 名称、注册地址与数据所在地、处理活动描述、适用地区、跨境机制、认证/审计报告摘要、最近一次评估日期

附件四:跨境传输文件与地区附录
A. 欧盟/英国/瑞士数据传输
- 欧盟SCC(2021/914)模块选择与附表填写;技术与组织措施、次级接收方清单;DTIA结论与补充措施
- 英国IDTA或UK Addendum签署与并入;瑞士FDPIC要求之红线调整(如管辖、第三方受权)
B. 中华人民共和国地区附录
- 出境路径选择与合规程序:安全评估触发阈值(CIIO或≥100万人PI、≥10万人PI或≥1万人敏感PI累计出境);个人信息出境标准合同签署与10个工作日备案;或认证途径
- 出境前风险自评估内容:处理目的必要性、个人信息类别与规模、境外接收方义务能力、跨境风险与应对、个人权利保障、境外法律与执法访问风险评估等
- 敏感个人信息单独同意、最小范围、影响对个体权益评估;禁止非法提供给境外执法(需经主管机关批准)
- 安全事件:立即采取补救并向主管部门报告并告知个人(PIPL第57条)
C. 美国及其他法域
- CPRA下服务提供商/承包商合规条款并入;对政府访问的透明与挑战机制;其他地区(如巴西LGPD、新加坡PDPA等)采用“同等保护”与法定传输工具,按当地监管指引执行(如PDPA可通知事件对PDPC的报告时间为完成可通知事件评估后不迟于3日内向监管报告,且在满足门槛时尽快告知受影响个人;LGPD对监管通报“合理时间内”要求并以ANPD最新指引为准)

附件五:个人权利请求与联络窗口
- 甲方DPO/隐私联系人:[姓名/邮箱/电话]
- 乙方DPO/隐私联系人:[姓名/邮箱/电话]
- 权利请求SLA:接收后[●]个工作日内确认,复杂请求在法律时限内完成(GDPR一般为1个月,可延长2个月并说明理由;PIPL等从严执行)

实施与合规要点(供签署与落地时使用)
- 为每一条业务线与地区完成附件一“处理说明”,确保角色、目的、数据项、保留期、分处理者与跨境路径清晰、可稽核。
- 与欧盟/英国/瑞士数据传输相关的SCC/IDTA/UK Addendum须作为附件四签署并完成TIAs;对中国出境,依据触发条件择路径并完成备案/评估/认证,收集并归档个人单独同意。
- 对CPRA场景,确保“禁止出售/分享”“限制敏感PI用途”等条款已写入主链路与分处理者合同,提供审计权与删除协助承诺。
- 以附件二TOMs对标贵司实际技术措施、证据与报告(ISO/SOC2等),并建立年度复核与渗透测试机制。
- 建立数据泄露演练与72小时通报能力(并按中国“立即/及时”标准同步行动);统一事件分级、跨法域沟通口径与证据保全。
- 对员工数据另行确认劳资程序、监控透明度与必要性评估,避免不当依赖同意作为处理基础。

重要提示
- 本范本为跨法域合规的合同模板结构与条款建议,具体落地需结合贵司业务模式、数据流向、组织架构与供应链分布进行定制,并与当地主体法律顾问复核。
- 涉及欧盟SCC、中国标准合同等必须以监管公布版本签署并完整填写附表方具有效力;本文仅作合同框架与引用安排,不替代标准文本。
- 各法域法规要点(非穷尽):GDPR第28、32、44-49条;CJEU Schrems II(C-311/18);UK GDPR与IDTA/UK Addendum;瑞士FADP;中国PIPL及数据出境配套规则与标准合同办法;美国CPRA与其他州隐私法;新加坡PDPA数据泄露通报指引;巴西LGPD与ANPD最新指南。请以最新生效版本与监管实践为准。

示例2

Below is a modular Data Protection and IP Annex for a SaaS/App and IP transaction addressing user data, usage logs, and algorithmic outputs. It is structured for insertion into a Master Subscription Agreement, License Agreement, or Technology/IP Transaction Agreement. Bracketed selections and labeled alternatives (Alt A/B/C) provide negotiation fallbacks. References to GDPR, UK GDPR, and U.S. state privacy laws (including CPRA) are included. Parties should tailor defined terms, scope, and jurisdictional modules to their deal and regulatory footprint.

DATA PROTECTION AND INTELLECTUAL PROPERTY ANNEX
This Data Protection and Intellectual Property Annex (Annex) is incorporated into and forms part of the [Master Subscription Agreement/Technology License and IP Transfer Agreement] (Agreement) between [Customer] and [Provider] (each a Party and together the Parties). Capitalized terms not defined in this Annex have the meaning given in the Agreement.

1. Defined Terms
1.1 Applicable Data Protection Laws means all laws, regulations, and regulatory guidance applicable to the processing of Personal Data under the Agreement, including, as applicable: (a) the EU General Data Protection Regulation 2016/679 (GDPR); (b) the UK GDPR and the Data Protection Act 2018; (c) the California Consumer Privacy Act as amended by the California Privacy Rights Act (collectively, CPRA), and other U.S. state privacy laws to the extent applicable (e.g., VCDPA, CPA, UCPA, CTDPA); and (d) any substantially similar laws in other jurisdictions.
1.2 Personal Data has the meaning set forth in Applicable Data Protection Laws and includes personal information under CPRA.
1.3 Customer Data means (a) Personal Data provided or made available by or on behalf of Customer to Provider in connection with the Services; (b) content, files, and records ingested into the Services by or for Customer; and (c) data collected from end users of Customer’s applications via the Services, excluding Provider Logs and Aggregated/Deidentified Data.
1.4 Provider Logs means telemetry, diagnostics, performance, and usage logs generated by the Services, which may include limited Personal Data (e.g., device identifiers, IP addresses, timestamps, event data).
1.5 Algorithm Outputs means the outputs, predictions, recommendations, inferences, generated content, and other results produced by the Services for Customer from Customer Data and/or Provider Materials.
1.6 Derived Data means data derived from processing of Customer Data or Algorithm Outputs that is transformed to remove direct identifiers and is used to develop or improve the Services or models, subject to Section 5 (Training/Improvements).
1.7 Deidentified Data and Aggregated Data mean data that meets the de-identification and/or aggregation standards under Applicable Data Protection Laws and cannot reasonably be used to identify an individual or Customer, directly or indirectly, provided the Provider maintains and complies with safeguards and commitments required by those laws.
1.8 Subprocessor means any third party engaged by Provider to Process Personal Data on behalf of Customer in connection with the Services.
1.9 Standard Contractual Clauses or SCCs means Module(s) of the European Commission’s Decision 2021/914 as updated or replaced, and the UK Addendum or IDTA as applicable.

2. Roles and Scope of Processing
2.1 Role.
Option A (Processor Model): For Customer Data, Provider acts as a Processor (GDPR)/Service Provider (CPRA), and Customer acts as Controller/Business. Provider will Process Customer Data only on documented instructions from Customer, as set out in the Agreement and this Annex.
Option B (Hybrid Model): (i) For Customer Data, Provider acts as Processor/Service Provider; and (ii) for Provider Logs, each Party acts as an independent Controller/Business. Provider will not combine Provider Logs with Customer Data except as strictly necessary to provide, secure, and support the Services.
Option C (Controller-to-Controller): For Customer Data and Provider Logs, the Parties act as independent Controllers/Businesses, each determining its own purposes and means of Processing. [Note: This option materially changes obligations and is typically disfavored by customers for user data.]

2.2 Subject Matter and Duration. The subject matter, duration, nature, and purpose of Processing; types of Personal Data; and categories of Data Subjects are described in Schedule 1 (Data Processing Details).

2.3 Instructions. Provider shall Process Customer Data only (a) to provide, maintain, and support the Services; (b) to carry out documented instructions of Customer; and (c) as required by Applicable Law, in which case Provider shall inform Customer prior to Processing unless legally prohibited.

3. Compliance Undertakings
3.1 Provider as Processor/Service Provider (where applicable). Provider shall:
(a) not Sell or Share Customer Data (as defined in CPRA) or use Customer Data for any purpose other than Business Purposes specified in the Agreement;
(b) not combine Customer Data with Personal Data received from other customers, except as permitted under CPRA for limited Service Provider purposes (e.g., detecting security incidents, protecting against illegal activity) or as expressly instructed by Customer;
(c) comply with all obligations of a Processor/Service Provider under Applicable Data Protection Laws and provide the certification required under CPRA that it understands and will comply with these restrictions.

3.2 Customer Responsibilities. Customer is responsible for (a) establishing a lawful basis for Processing; (b) providing required notices and obtaining consents from Data Subjects as needed; (c) the accuracy, quality, and legality of Customer Data; and (d) configuring the Services in compliance with Applicable Data Protection Laws.

4. Security and Breach Notification
4.1 Security Measures. Provider shall implement and maintain appropriate technical and organizational measures designed to protect Customer Data against unauthorized or unlawful Processing and accidental loss, destruction, or damage, as described in Schedule 2 (Security Measures). [Negotiate: references to ISO/IEC 27001; SOC 2 Type II; encryption at rest/in transit; access controls; secure SDLC; vulnerability management; pen testing.]

4.2 Audit and Certifications.
Option A (Report-Only): Provider will provide, upon request and at least annually, (i) current SOC 2 Type II or ISO 27001 certificate, (ii) executive summary of penetration tests, and (iii) responses to a reasonable security questionnaire (no more than once annually).
Option B (Onsite/Third-Party Audit): In addition to Option A, Customer may conduct an on-site audit or designate a mutually agreed independent auditor no more than once annually, subject to reasonable notice, confidentiality, and minimal business disruption. [Provider may charge reasonable fees for audits exceeding report review.]
Option C (Escalation Right): If Provider’s report reveals material control failures not remedied within [60] days, Customer may suspend affected Processing or terminate the Agreement for cause.

4.3 Security Incident Notification. Provider shall notify Customer without undue delay and in any event within [48] hours after becoming aware of a Personal Data Breach affecting Customer Data, including details reasonably available to Provider. Provider will take reasonable steps to mitigate adverse effects and cooperate with Customer in required notifications. [Note: GDPR authority notification is “without undue delay and, where feasible, not later than 72 hours”; this clause is a contractual customer notification.]

5. Use of Algorithm Outputs; Training and Improvements
5.1 Ownership and License to Outputs.
Option A (Customer Ownership): As between the Parties, Customer owns all right, title, and interest in Algorithm Outputs generated for Customer, excluding Provider Materials and underlying models. Provider assigns to Customer any rights it may obtain in such Outputs, subject to Provider’s reserved rights in Provider Materials.
Option B (License to Outputs): As between the Parties, Provider retains ownership in Algorithm Outputs; Provider grants Customer a perpetual, worldwide, irrevocable, royalty-free license to use, reproduce, display, distribute, and create derivative works of Algorithm Outputs for Customer’s internal and external business purposes.
Note: Jurisdictional limits may apply to IP protection of non-human-authored works; Parties should align on whether Outputs are protectable works and allocate risk accordingly.

5.2 Improvements and Feedback. Customer grants Provider a non-exclusive, worldwide, royalty-free license to use Feedback for any purpose. [Alt: assign Feedback; [Alt: license limited to Service improvement]]. Provider will not identify Customer as the source of Feedback without consent.

5.3 Training Rights (Use of Customer Data and Outputs to Improve Models).
Option A (No Training by Default): Provider shall not use Customer Data or Algorithm Outputs to train, retrain, or fine-tune models for the benefit of Provider or third parties, except on documented instructions or with Customer’s prior written consent.
Option B (Deidentified/Aggregated Training): Provider may use Deidentified Data and Aggregated Data derived from Customer Data or Outputs to develop and improve the Services and models, provided Provider: (i) maintains technical and organizational safeguards preventing reidentification; (ii) does not attempt to reidentify; (iii) does not use the data to target or profile Data Subjects; and (iv) complies with CPRA and similar laws’ deidentification requirements.
Option C (Opt-Out Model): Provider may use Customer Data for model improvements unless Customer opts out via written notice or administrative controls. Provider shall provide a straightforward opt-out mechanism and honor it within [10] days.

5.4 Non-Attribution. Provider shall not use Customer’s name, trademarks, or Output content for external training datasets, benchmarks, or marketing without Customer’s prior written consent.

6. Provider Logs and Telemetry
6.1 Permitted Uses. Provider may Process Provider Logs to (a) deliver, maintain, support, and secure the Services; (b) measure and report on service performance and capacity; (c) detect, investigate, and prevent fraud, abuse, and security incidents; and (d) comply with law. Provider will not Sell or Share Personal Data within Provider Logs.
6.2 Minimization and Retention. Provider will collect the minimum Provider Logs reasonably necessary and retain them for no longer than [90/180/365] days unless (i) required by law, (ii) necessary to investigate security incidents, or (iii) longer retention is approved in writing by Customer. [Alt: tie retention to documented data retention schedule.]
6.3 Role Alternatives. See Section 2.1. If independent Controller model applies, each Party shall provide legally required notices and honor applicable Data Subject rights for its own Processing.

7. Subprocessors
7.1 Authorization.
Option A (General Authorization): Customer authorizes Provider to engage Subprocessors listed at [URL/Schedule], subject to Provider’s obligations in this Section. Provider will provide at least [30] days’ notice of new Subprocessors and a mechanism to subscribe to updates. Customer may object on reasonable data protection grounds within [10] days; the Parties will work in good faith to resolve objections.
Option B (Specific Authorization): Provider shall not appoint a Subprocessor without Customer’s prior written approval for each Subprocessor.
7.2 Flow-down. Provider shall impose data protection obligations on Subprocessors that are at least as protective as those set out in this Annex. Provider remains responsible for Subprocessors’ performance.

8. Data Subject Requests; Assistance; DPIAs
8.1 Assistance. Taking into account the nature of Processing, Provider shall provide reasonable assistance to Customer to respond to Data Subject requests (access, deletion, correction, portability, restriction, objection, opt-out of targeted advertising or sale/sharing under U.S. laws), and to fulfill Customer’s obligations regarding security, breach notifications, recordkeeping, and impact assessments (DPIAs) and prior consultations.
8.2 CPRA Service Provider Terms. Provider certifies it understands and will comply with the CPRA’s restrictions for Service Providers and Contractors. Upon Consumer request relayed by Customer, Provider shall assist in responding to requests as required by CPRA.

9. International Data Transfers
9.1 Transfer Mechanisms. Where Provider’s Processing of Customer Data involves a transfer to a country not recognized as providing an adequate level of protection under Applicable Data Protection Laws, the Parties agree the SCCs (and UK Addendum/IDTA) are incorporated by reference as follows: [insert SCC module mapping: Controller–Processor (Module 2) and/or Processor–Processor (Module 3)]. The Parties complete the SCCs’ Annexes using Schedule 1 and Schedule 2 to this Annex.
9.2 Supplementary Measures. Provider shall implement supplementary measures, where required by a transfer impact assessment, including encryption-in-transit and at-rest, access controls, and policies for responding to government access requests.
9.3 China and Other Jurisdictions. For transfers subject to the PRC Personal Information Protection Law (PIPL) or similar regimes requiring security assessments, certifications, or standard contracts, the Parties will execute the required instruments and cooperate to complete assessments or filings before transfer. [Note: specify which party leads assessments; consider data localization constraints.]

10. Retention and Deletion
10.1 Upon termination or expiration of the Agreement or upon Customer’s written request, Provider shall promptly delete or return Customer Data (at Customer’s option), unless retention is required by law. [Alt: deletion within [30] days; destruction certificate upon request.]
10.2 Backups. Provider may retain encrypted backups for up to [90] days, inaccessible to production systems, after which they are overwritten in the ordinary course.

11. Government and Third-Party Requests
11.1 Legal Process. Provider shall not disclose Customer Data to any government or third party without prior written notice to Customer, unless legally prohibited. If prohibited, Provider shall use reasonable efforts to obtain a waiver to notify Customer. Provider will challenge unlawful or overbroad requests to the extent reasonable.
11.2 Transparency. Upon request, Provider will provide a summary of the volume and type of legal demands received relating to Customer Data, to the extent lawful.

12. Confidentiality
12.1 Personnel and Subprocessors. Provider ensures that personnel and Subprocessors accessing Customer Data are bound by confidentiality obligations and have undergone appropriate training.
12.2 Conflicts. If a conflict exists between confidentiality terms in the Agreement and this Annex, the more protective standard for Customer Data applies.

13. Liability and Indemnities
13.1 Liability Allocation.
Option A (Carve-Out): The liability cap in the Agreement does not apply to (i) Provider’s breach of Section 3.1 (Service Provider restrictions), (ii) unauthorized disclosure of Customer Data caused by Provider’s breach of this Annex, (iii) infringement of IP in Algorithm Outputs under Section 14, or (iv) willful misconduct. [Alt: carve-out solely for data breach direct damages; [Alt: super-cap at [2x–3x] fees.]
13.2 Indemnity.
Option A (Provider Indemnity): Provider shall defend and indemnify Customer against third-party claims to the extent arising from Provider’s material breach of this Annex or Applicable Data Protection Laws, or from Subprocessor acts/omissions, resulting in unauthorized disclosure of Customer Data.
Option B (Mutual Indemnity): Each Party indemnifies the other for its independent-controller Processing (if applicable) that violates Applicable Data Protection Laws and causes harm.

14. Intellectual Property; Infringement; Output Risk Allocation
14.1 Background IP. Each Party retains ownership of its Background IP. Provider retains ownership of Provider Materials, models, pre-trained weights, and service infrastructure.
14.2 Output Ownership and License. See Section 5.1 (Options A/B). The Parties acknowledge that protectability of AI-generated content may vary by jurisdiction; nothing herein guarantees registrability or enforceability of copyrights in Outputs. [Optional: Provider disclaims authorship of non-human-generated content; Customer represents it will ensure sufficient human authorship when seeking copyright protection.]
14.3 IP Indemnity for Outputs.
Option A (Provider Indemnity): Provider shall defend and indemnify Customer for third-party claims alleging that Customer’s use of Algorithm Outputs, as generated by unmodified Services and in accordance with the Agreement, infringes third-party IP rights, excluding claims based on Customer Data, Customer’s prompts/instructions, or combination with non-Provider materials. Remedies may include modify/replace, procure rights, or refund pro rata fees.
Option B (Limited Indemnity): Same as Option A, but excluding claims relating to text- or image-generation where Provider designates the feature as “experimental” or “beta”.
14.4 Moral Rights Waiver. To the extent permitted by law, Provider waives and will procure waivers of moral rights in Algorithm Outputs it could assert, limited to enabling Customer’s rights under Section 5.1.

15. Deidentified and Aggregated Data Commitments
15.1 Provider shall (a) maintain and implement technical controls and policies to prevent reidentification; (b) publicly commit to not reidentify Deidentified Data; and (c) contractually bind recipients to the same restrictions, consistent with CPRA and similar laws.
15.2 Provider will not attempt to or actually use Deidentified or Aggregated Data to single out or target any individual or Customer.

16. High-Risk Data and Sectoral Laws
16.1 Prohibited Data. Customer shall not submit special categories of data under GDPR, precise geolocation, biometric identifiers, or health/medical data unless expressly agreed in writing and subject to supplemental terms.
16.2 Sectoral Compliance. If the Parties agree to Process data regulated by sectoral laws (e.g., HIPAA, GLBA, FERPA), they will execute required addenda (e.g., BAA) before such Processing.

17. Order of Precedence
If there is a conflict between this Annex and the Agreement, this Annex controls with respect to data protection, privacy, and Algorithm Outputs/IP allocation.

Schedule 1 – Data Processing Details (SCC Annex I; UK Addendum Part 1; CPRA Description)
A. Parties
- Data Exporter/Controller/Business: [Customer details, contact, DPO if applicable]
- Data Importer/Processor/Service Provider: [Provider details, contact, DPO/Security Contact]
B. Description of Processing
- Subject matter: Provision of the Services under the Agreement.
- Duration: Term of the Agreement and any reasonable wind-down period.
- Nature and purpose: Hosting; data storage; compute; analytics; model inference; generation of Algorithm Outputs; customer support; security and incident response; billing.
- Categories of Data Subjects: Customer’s end users; employees; contractors; authorized users; consumers.
- Types of Personal Data: Identifiers (name, email, IP address, device ID); account credentials; usage data and telemetry; content supplied by users; support tickets; [optional: payment tokens (no PAN); logs].
- Sensitive Data: [None/limited as agreed—insert if applicable].
- Frequency of transfers: Continuous as necessary for service delivery.
- Subprocessing: As listed at [URL/Schedule].
C. Competent Supervisory Authority
- For EU SCCs: [Identify based on Customer’s establishment].
D. CPRA Required Terms
- Business purposes: service delivery, security, debugging, short-term transient use, analytics, internal research, quality assurance, and service improvement as permitted.
- Certification: Provider certifies compliance with CPRA Service Provider restrictions.

Schedule 2 – Security Measures (SCC Annex II)
- Organizational: Information security policy; governance; risk management; employee screening and confidentiality; security training.
- Access Controls: Role-based access; MFA for administrative access; least privilege; JIT access; periodic access reviews.
- Data Protection: Encryption in transit (TLS 1.2+); encryption at rest (AES-256 or equivalent); key management; secrets management.
- Application Security: Secure SDLC; code reviews; dependency scanning; SAST/DAST; change management; CI/CD hardening.
- Infrastructure: Network segmentation; firewalls/WAF; hardening baselines; vulnerability management; monthly patching cadence.
- Monitoring and Logging: Centralized logging; anomaly detection; SIEM; EDR; immutable audit logs.
- Continuity: Documented BCP/DR; RPO ≤ [24] hours; RTO ≤ [24] hours; geo-redundant backups; disaster recovery testing.
- Testing: Annual independent penetration tests; remediation tracking; third-party assessments (SOC 2 Type II/ISO 27001).
- Data Subject Rights Support: Administrative tools or processes to access, correct, delete, or export data.
- Subprocessor Security: Due diligence; contractual security obligations; ongoing monitoring.

Negotiation Playbook (Concise)
- Roles: Prefer Processor/Service Provider for Customer Data; consider hybrid (independent controller) only for limited telemetry with strong minimization and opt-outs.
- Outputs Ownership: Customer Ownership (Alt A) where Customer bears regulatory/commercial risk; Provider may seek License (Alt B). Address human authorship caveats.
- Training: Default “no training” (Alt A) or deidentified-only (Alt B). If Provider insists on opt-out (Alt C), require product-level controls and clear SLAs.
- Subprocessors: General authorization with notice and objection rights; ensure rapid remediation and exit if objection unresolved.
- Security/Audit: At minimum SOC 2 Type II or ISO 27001; report-based audit, with onsite only if material issues.
- Breach Notice: 48 hours customer notice; cooperate with DPIA and notifications; define mitigation and credit monitoring if high risk.
- International Transfers: SCCs + UK Addendum; supplementary measures; PIPL module if China data implicated.
- Liability: Carve-outs/super-cap for data breach and CPRA violations; IP indemnity for Outputs with exclusions for Customer prompts.
- Logs: Limit personal data in telemetry; retention ≤ 180 days; ban sale/sharing; clear role allocation.
- Deidentified/Aggregated Data: Adopt CPRA-compliant safeguards; non-reidentification commitments.

Signature Blocks
By their duly authorized representatives, the Parties agree to this Annex as of the Effective Date of the Agreement.

[Customer]
Name:
Title:
Date:

[Provider]
Name:
Title:
Date:

Important Legal Notes
- GDPR: Controller–Processor obligations, 72-hour supervisory authority notice, SCCs for cross-border transfers, DPIAs where high risk. 
- CPRA: Service Provider restrictions (no sale/sharing, use only for business purposes, assistance with consumer requests, deidentified data standards).
- UK: UK GDPR and UK Addendum/IDTA for transfers. 
- Outputs IP: Protection and authorship standards vary by jurisdiction; ensure risk allocation if registration or enforceability is sought.

Please provide your preferred alternatives (e.g., 2.1 Option A/B, 5.1 Option A/B, 5.3 Option A/B/C) and any jurisdiction-specific requirements (EU/UK/US states/PRC) to finalize the Annex.

示例3

以下为可直接嵌入主合同的“数据保护专条”示范文本,适用于新增功能涉及个人信息采集、使用、共享、删除与留存,以及集成SDK并与第三方共享数据的合规场景。该专条以中华人民共和国法律为基本适用法(尤其《个人信息保护法》《数据安全法》《网络安全法》及其配套制度),兼顾监管部门发布的相关规范性文件及国家标准的通行做法。请结合具体业务流程、数据类型与系统架构进一步细化附件并完成内控落地。

一、定义与适用范围
1.1 定义
- 个人信息:以电子或者其他方式记录的与已识别或者可识别的自然人有关的各种信息(以《个人信息保护法》定义为准)。
- 敏感个人信息:一旦泄露或者不当使用,容易导致自然人人身和财产安全受到危害或名誉、身心健康等受到损害的个人信息,包括但不限于精确定位、行踪轨迹、个人生物识别、未成年人信息、金融账户、健康医疗信息等。
- 处理/处理活动:对个人信息的收集、存储、使用、加工、传输、提供、公开、删除等。
- 受托处理:甲方作为个人信息处理者,委托乙方在甲方授权范围内开展的个人信息处理活动。
- SDK:由第三方提供、供本合同所涉应用程序集成的软件开发工具包(含相关库、插件、API、统计/广告/推送组件等)。
- 适用法律:中华人民共和国现行有效的与数据与个人信息保护相关的法律、行政法规、部门规章与规范性文件,包括但不限于《个人信息保护法》《数据安全法》《网络安全法》及国家网信部门相关办法与标准合同办法,以及与本业务类型相关的行业监管规定。

1.2 适用范围
- 本专条适用于甲方新增功能(“新增功能”)在设计、开发、测试、上线与运营维护阶段的全部数据处理活动,以及乙方受托处理与SDK集成相关的全部活动。
- 如涉及数据跨境提供,除中国法律外,亦应遵守接收方所在地的强制性数据保护要求,且以中国法的强制性规定为底线。

二、角色与授权
2.1 角色划分
- 甲方为新增功能所涉个人信息的个人信息处理者,依法对处理目的与方式作出决定并承担合规主责。
- 乙方系甲方受托的处理方,仅在甲方书面指令和本合同约定的目的、范围、方式内处理个人信息,不得超范围处理、转为自有目的处理或对外提供。

2.2 授权与指令
- 乙方应仅依据甲方书面指令开展处理活动;如乙方认为甲方指令可能违反适用法律,应立即书面提示并暂停执行,直至指令调整。
- 未经甲方事先书面同意,乙方不得再委托第三方或变更处理地点、重要系统或关键人员。

三、合法性基础与告知同意
3.1 处理基础
- 甲方与乙方应确保每一类处理活动均具有合法性基础,包括取得个人的单独同意/明示同意,或基于订立与履行合同所必需、法定职责或法定义务、应对突发公共卫生事件或紧急救助等法定情形。
- 对敏感个人信息、未成年人个人信息、个性化广告投放(含基于画像的推荐)、精确定位等,应取得单独同意,并提供可随时撤回的便捷机制。

3.2 告知义务
- 上线前,甲方应更新并在显著位置展示隐私政策和就近弹窗提示,清晰说明数据处理目的、方式、范围、保存期限、共享对象与类别、跨境情形、权利行使路径等。
- 乙方应协助甲方实现“就近、颗粒化、分场景”的二次告知与权限触发前提示,确保在权限首次启用前取得相应授权。

3.3 记录保存
- 甲乙双方应留存告知、同意与撤回同意记录及操作日志,保存期限不少于数据留存期届满后3年,或法律另有规定的从其规定。

四、目的限定与数据最小化
4.1 目的限定
- 仅为实现新增功能所必需之目的处理个人信息,新增或变更处理目的应经充分评估并补充取得同意。
4.2 数据最小化
- 严格遵循必要性原则,不得收集与功能无关的个人信息或频繁请求无关权限;默认关闭非必要功能与个性化推荐,提供显著的一键关闭入口。

五、数据类型、留存与删除
5.1 数据类型
- 甲方应编制数据清单(附件一)载明:数据字段、是否为敏感个人信息、处理目的、收集来源、使用场景、共享对象、跨境情况、安全分级与加密要求。
5.2 留存期限
- 个人信息仅在为实现处理目的所必需的最短期间内保存。法定或监管要求需更长保存的,从其规定;期满后应立即删除或匿名化。
5.3 删除与匿名化
- 出现以下任一情形,乙方应按甲方指令及时删除或匿名化:处理目的已实现或无法实现、保存期限届满、用户撤回同意或删除请求获准、合同终止或法律规定的其他情形。乙方应向甲方出具删除/匿名化证明与审计日志。

六、数据主体权利
6.1 权利保障
- 甲乙双方应提供渠道保障数据主体依法行使知情权、决定权、查询与复制权、更正与补充权、删除权、撤回同意权,以及依法定条件下的数据可携权与账号注销权。
6.2 响应期限
- 自收到权利请求起,双方应协同在法定或合同约定期限内完成处理并反馈;对被拒绝的请求应说明理由及救济途径。

七、安全保障与技术组织措施
7.1 基线要求
- 采用与风险相适应的技术与管理措施,包括但不限于:全链路加密(传输与存储)、访问控制与最小权限、双因素身份验证、数据脱敏/去标识化、密钥管理、代码安全审查、静态与动态安全测试、第三方组件合规审计、安全日志与留痕、漏洞修复与补丁管理、隔离与沙箱机制、灾备与业务连续性计划。
7.2 安全评估
- 涉及敏感个人信息、自动化决策、对外提供个人信息、将个人信息出境等高风险处理活动,甲方应开展并留存个人信息保护影响评估(PIPIA)及处理记录,乙方予以配合并提供必要资料。
7.3 安全事件管理
- 一旦发生或可能发生个人信息泄露、篡改、丢失、违法提供或不当使用等安全事件,乙方应在不超过24小时内先行通知甲方,并持续提供事件性质、涉及数据类别与规模、已采取与拟采取的补救措施、可能影响、监管通报与用户告知建议。甲方负责对监管与用户的外部通报,乙方不得擅自对外披露。

八、SDK集成与第三方共享
8.1 SDK准入与告知
- 甲方应建立SDK准入清单(附件二)与版本台账,载明SDK提供方、具体功能、收集字段、权限调用、数据传输目的地(含境外)、触发时机与停用机制。上线前完成合法性审查与最小化评估。
- 对广告、统计、推送、定位等类别SDK,应在首次调用前进行弹窗提示并取得相应同意或单独同意;未获得同意前不得收集或回传个人信息。
8.2 合同约束
- 甲方应与SDK提供方签署数据处理协议,明确:处理目的、范围、类型、期限、安全措施、不得转为自有目的、不得超范围收集、不得与其他数据进行非法关联、不得再转委托或对外提供,或需经甲方书面同意;发生安全事件的通知与配合义务;审计与监督权;终止后的数据返还与删除。
8.3 第三方共享
- 对任何第三方共享(含合作伙伴、云与外包服务商、广告平台、反作弊与风控服务商),须履行必要性论证与尽职调查,签署数据共享/受托处理协议,确保明确责任边界与合规要求;涉及敏感个人信息或画像类用途的,应取得单独同意并提供用户关闭与撤回机制。
8.4 监测与审计
- 乙方应提供对集成SDK和第三方接口的运行监控能力,定期输出权限调用、数据出站、异常请求与版本差异报告;甲方有权进行安全测试与合规审计,并要求整改或下线。

九、自动化决策与个性化推荐
9.1 合法合规
- 涉及个性化推荐、画像分析与自动化决策的,甲方应保障透明度、公平性与可解释性,不得实施不合理的差别待遇;用于营销目的的画像应支持关闭个性化推荐与撤回同意。
9.2 人工干预
- 对影响个人权利义务的自动化决策结果,甲方应提供申诉与人工复核途径。

十、未成年人保护
- 如新增功能面向未成年人(不满14周岁),在收集前应取得监护人同意,实施更严格的最小化与分级访问,避免精准画像与定向广告;乙方应协助实现年龄分级与监护人验证方案。

十一、数据跨境提供
11.1 合规路径
- 如存在向境外提供个人信息或由境外主体访问个人信息的情形,甲方应依法选择并完成相应合规路径:国家网信部门数据出境安全评估、个人信息保护认证、或签署标准合同并备案,并开展出境影响评估;乙方应配合提供必要信息与技术措施。
11.2 传输保障
- 对跨境传输实施端到端加密、访问分级、最小化传送、境外接收方安全承诺与审计接受、数据主体权利可实现性保障及政府访问请求的通知与合法性审查(法律禁止的除外)。

十二、分包与转委托
- 乙方不得未经甲方书面同意将个人信息处理活动分包或转委托;经同意的,乙方应与次级受托方签订不低于本专条标准的协议并对其行为承担连带责任。

十三、合规证明与审计配合
- 乙方应至少每12个月向甲方提供一次有效的安全与隐私合规证明材料(如内部合规报告、第三方测评或认证、渗透测试摘要等),并积极配合甲方或监管部门开展的检查、问询与取证工作。

十四、保密与限制性使用
- 除履行本合同之目的外,乙方不得出于广告、画像、数据交易等自有目的使用甲方提供或在履约中获取的任何个人信息或衍生数据;不得反向识别匿名化数据或将去标识化数据重新关联至特定个人。

十五、责任与违约
15.1 责任承担
- 因乙方违反本专条或适用法律导致甲方遭受监管处罚、行政/刑事责任、第三方索赔或名誉损害的,乙方应就由其过错引发的损失承担赔偿责任,包括合理的调查、合规整改与律师费用。
15.2 违约整改
- 发现不合规情形时,甲方有权要求乙方在合理期限内完成整改;逾期未改或情节严重的,甲方有权暂停相关接口、下线功能、解除合同并追究违约责任。

十六、终止后的数据处置
- 合同终止或处理目的消灭后,乙方应按甲方指令选择删除、返还或转为匿名化处理,并在完成后10个工作日内出具书面证明与审计日志;法律另有规定或经甲方另行确认的除外。

十七、通知与协作
- 双方指定数据保护联系人与通道,用于处理安全事件、权利请求、监管问询与日常合规沟通;联系方式变更应提前书面通知。

十八、适用法律与争议解决
- 本专条受中华人民共和国法律管辖并据其解释。发生争议时,双方应先行友好协商;协商不成的,提交主合同约定的争议解决机构处理。

附件(示例结构,建议在落地时补充完整并随版本迭代更新)
附件一:数据清单与处理矩阵
- 字段名称、是否敏感、来源、处理目的、合法性基础、权限触发点、共享对象、跨境情况、保存期限、加密等级、访问主体与操作角色。

附件二:SDK与第三方清单
- SDK名称/版本/提供方、数据收集范围、权限与调用频次、数据回传地址与国家/地区、加密与认证方式、合规路径(同意/单独同意)、停用/退出机制、最近一次安全评估日期与问题整改情况。

附件三:个人信息保护影响评估(PIPIA)摘要
- 场景描述、风险识别与严重性评定、缓解措施、遗留风险与接受理由、复评周期与责任人。

附件四:安全事件应急响应流程
- 分级标准、内部升级与外部通报时限、技术遏制与取证要求、对用户与监管的沟通模版、复盘与改进计划。

附件五:数据留存与删除政策
- 按数据类别列示留存期限、法定留存依据、到期清理流程、备份与日志保留策略。

合规提示(供合同外部实施时参考)
- 在中国境内开展App业务且涉及SDK集成,应重点对《个人信息保护法》《数据安全法》《网络安全法》与国家网信部门发布的移动互联网应用程序相关规定、数据出境标准合同办法(2023年施行)进行逐条比对;参照国家标准的信息安全与个人信息安全规范开展差距评估与整改。
- 若新增功能涉及“常见类型App必要个人信息范围”已明确限制的,请据此收敛字段与权限;若确需超出必要范围,须显著告知并取得单独同意,提供可随时关闭的机制及等价服务或合理替代方案。
- 如已存在或拟新增跨境传输路径(含远程访问),应尽早进行数据出境合规路径判定与出境前评估,预留备案、评估或认证周期并落实传输与境外接收方保障措施。

上述专条为框架性示范,建议在落地时由双方法务与技术、安全、产品团队联合梳理数据流与权限矩阵,结合具体场景对附件进行量化与可操作性补充,以满足监管可解释与内部可执行的双重要求。

适用用户

企业法务总监/合规负责人

用它为不同业务线和地区快速生成定制化数据保护条款,统一口径、控制风险,并缩短合同往返审核周期。

律所律师/外部法律顾问

批量起草SaaS、APP、知识产权交易涉及的数据条款,附带谈判备选语句,提高出稿速度与修订质量。

产品经理/数据治理负责人

将数据采集、使用、共享与删除要求落实到合同条款,协调研发与运营,保障新功能上线前可审可签。

采购与供应链经理

在供应商与处理方合同中嵌入委托处理、安全措施与违约责任,规范第三方合规,降低外包风险。

跨境业务负责人/BD

生成多语言且覆盖跨境传输要点的条款,支持与海外客户、合作伙伴的合规谈判与审核。

初创公司创始人/运营经理

以低成本获得可直接落地的合规条款文本,快速支撑首批客户签约与尽调材料准备。

解决的问题

用一套即取即用的专业提示词,让你在几分钟内生成可直接落入合同的数据保护条款:按数据类型与业务场景精准定制,自动贴合目标法域与行业规范,提供专业法务语气与多语言输出,覆盖关键合规模块(定义与范围、处理目的与合法依据、数据最小化与保留、跨境传输、安全措施、分处理方、数据主体权利、事故通报、审计与责任)。帮助法务、合规、采购与业务团队在供应商签约、SaaS上架、渠道合作、投标响应、并购尽调等场景快速交付高质量条款,减少往返修改与沟通成本,降低合规与谈判风险,提升签约成功率与速度。

特征总结

一键生成针对特定数据类型的保护条款,按行业与地区自动匹配合规要点。
围绕处理目的、合法基础与最小化原则,自动成文并明确各方权责与义务。
内置跨境传输、第三方委托与分包要求,可直接嵌入现有合同结构使用。
依据应用、注册与知识产权场景差异,生成贴合业务流程的专业化法律表述。
支持多语言法律写作风格输出,便于跨境谈判、对外审阅与监管沟通。
提供可选条款与谈判备选语句,降低沟通成本,显著提升签约成功率。
自动标注敏感数据与高风险环节,给出限额、脱敏、保留期等合规建议。
参数化填写企业信息与数据流向,一次设置,多项目快速复用与更新。
生成结构清晰的目录与引用指引,便于法务审校与内外部版本协同。
遵循正式法言法语与格式规范,减少反复打磨,快速通过内部评审。

如何使用购买的提示词模板

1. 直接在外部 Chat 应用中使用

将模板生成的提示词复制粘贴到您常用的 Chat 应用(如 ChatGPT、Claude 等),即可直接对话使用,无需额外开发。适合个人快速体验和轻量使用场景。

2. 发布为 API 接口调用

把提示词模板转化为 API,您的程序可任意修改模板参数,通过接口直接调用,轻松实现自动化与批量处理。适合开发者集成与业务系统嵌入。

3. 在 MCP Client 中配置使用

在 MCP client 中配置对应的 server 地址,让您的 AI 应用自动调用提示词模板。适合高级用户和团队协作,让提示词在不同 AI 工具间无缝衔接。

¥15.00元
平台提供免费试用机制,
确保效果符合预期,再付费购买!

您购买后可以获得什么

获得完整提示词模板
- 共 246 tokens
- 2 个可调节参数
{ 数据类型或上下文 } { 输出语言 }
自动加入"我的提示词库"
- 获得提示词优化器支持
- 版本化管理支持
获得社区共享的应用案例
限时免费

不要错过!

免费获取高级提示词-优惠即将到期

17
:
23
小时
:
59
分钟
:
59