热门角色不仅是灵感来源,更是你的效率助手。通过精挑细选的角色提示词,你可以快速生成高质量内容、提升创作灵感,并找到最契合你需求的解决方案。让创作更轻松,让价值更直接!
我们根据不同用户需求,持续更新角色库,让你总能找到合适的灵感入口。
生成合同中涉及特定数据类型的数据保护条款,确保法律严谨。
以下为一份可直接并入主服务合同或框架协议的数据保护附录(Data Protection Addendum/“本附录”)范本,适用于多业务线/多地区处理员工与客户个人信息(含敏感)并涉及跨境传输的情形。该范本采取“全球基线条款+地区附录+技术附件”的结构,确保在欧盟/英国/瑞士、中华人民共和国、美国(含加州)等主要法域的合规一致性与可执行性。请结合具体业务线(含各子服务/产品)、数据流程、技术架构与供应链分包情况,在附件中明确处理细节并完成必要的监管文件签署与备案。
数据保护附录(DPA) 版本号:[●];生效日:[●] 甲方:[●](可能为个人信息处理者/控制者) 乙方:[●](可能为受托处理者/处理者/服务提供商/承包商)
第一条 定义与适用范围 1.1 定义
1.2 适用业务范围 本附录适用于甲乙双方在主合同、框架协议、订单、工作说明书(SOW)、产品说明及其补充文件中约定的所有业务线与地区下的个人信息处理活动。各业务线的个人信息处理详情(包括数据主体类别、数据类型、处理目的、处理期限、接收方、跨境传输路径及安全措施等)应在附件一(处理说明)中分别列明,并与各SOW相互参照。
1.3 法律地位与优先顺序 如本附录与主合同其他条款不一致,以数据保护合规为目的之条款为优先;若涉及各法域强制性要求冲突,适用更高保护标准。欧盟/英国标准合同条款(SCC/IDTA/UK Addendum)及中国“个人信息出境标准合同”等经签署且生效者,在其适用范围内优先于本附录的一般性约定。
第二条 角色定位与合规基础 2.1 角色认定 各业务线的角色关系(控制者-处理者、共同控制者、处理者-分处理者、CPRA下的服务提供商/承包商等)由附件一逐项明确。若未明确,默认甲方为控制者/个人信息处理者,乙方为处理者/受托处理者。
2.2 合法性基础与透明度
2.3 目的限制与数据最小化 乙方仅按甲方书面指示、为附件一载明之特定目的处理,且实施数据最小化、必要性与比例性控制,不得出于自身或第三方利益进行额外处理(除非法律明确要求且已依法通知甲方)。
第三条 处理者义务(GDPR第28条等对标) 3.1 仅依指示处理;如法律强制要求,乙方应在法律允许范围内先行通知甲方。 3.2 保密义务:确保所有经授权的人员受保密约束,并接受定期隐私与安全培训。 3.3 安全措施:实施不低于行业最佳实践的技术与组织措施(详见附件二),包括但不限于加密(传输与静态)、访问控制、最小权限、密钥管理、网络隔离、日志与监控、漏洞管理、零信任/多因子认证、数据脱敏与伪匿名化、备份与灾难恢复、供应链安全与安全开发生命周期(SSDLC)。 3.4 分处理者:须经甲方事先书面批准(一般/具体审批),签署不低于本附录标准的书面协议并实现义务贯穿;乙方对分处理者的行为与不作为承担连带责任。乙方应维护并更新分处理者清单(附件三)并提供订阅式变更通知机制与合理异议权。 3.5 协助义务:乙方应协助甲方履行个人权利请求(访问、更正、删除、限制、携带、反对、撤回同意、不被自动化决策仅独立决定等)、数据保护影响评估(DPIA/PIPIA)、与监管机构的事前咨询、合规审计及记录保存义务。 3.6 记录与审计:乙方维护处理活动记录与安全文档;甲方或其独立审计方可在合理频率与时间内进行审计(含远程审计、报告审阅与现场审计),前提是不对乙方商业机密与其他客户数据造成不当影响。乙方可提供第三方合规报告以替代部分审计(如ISO/IEC 27001、ISO 27701、SOC 2 Type II)。 3.7 数据泄露通报:一经发现可能导致个人信息泄露、篡改、丢失、未经授权访问或使用等安全事件,乙方应“无不当延误”并在不迟于知悉后72小时内(或更短时限,如适用法域要求)向甲方通报初步事实、影响评估、已采取与拟采取的补救措施,并持续更新直至处置完成。甲方负责(除非法律另有要求或双方另行约定)对监管机构与数据主体的正式法定通知;乙方应提供必要协助。 3.8 数据境内存储与本地化:如法域要求本地存储或限制跨境传输(如中国关键信息基础设施运营者、重要数据或触发阈值时的数据出境限制),乙方应遵循并协助甲方合规实施。
第四条 跨境传输与政府访问请求 4.1 欧盟/英国/瑞士跨境机制
第五条 个人权利与自动化决策 5.1 乙方应建立流程以协助甲方在法定期限内响应员工与客户的权利请求;未经甲方书面同意,不直接回应数据主体,法律另有强制要求除外。 5.2 自动化决策与画像:涉及对个体权益有重大影响的自动化决策时,乙方应支持甲方履行透明度、解释权、拒绝或要求人工干预的权利(GDPR第22条、PIPL相关要求),并避免不合理差别对待。
第六条 数据保留、删除与返还 6.1 乙方仅在完成处理目的所必需期间保留个人信息,期满或协议终止时,按甲方选择删除或返还全部个人信息及其副本(法律另有强制保存要求的除外),并出具删除证明。 6.2 备份介质、日志与灾备站点的数据应同步执行删除或覆盖,确保可验证的不可逆销毁。
第七条 匿名化、去标识化与统计 在法律允许范围内,乙方可基于去标识化/匿名化数据进行统计与服务优化,但不得尝试重新识别或将其用于识别特定个体的目的,并确保该等处理不构成“个人信息处理”。匿名化/去标识化方法与控制点应在附件二说明。
第八条 CCPA/CPRA及同类州法下的契约要求(如适用) 8.1 若乙方在加州法律下构成“服务提供商”或“承包商”,乙方承诺:
第九条 责任与赔偿 9.1 乙方对违反本附录、适用法律或甲方书面指示而导致的损害承担相应责任;如涉及监管罚款、第三方索赔或数据主体损害赔偿,按双方主合同约定的责任限制与赔偿条款执行,但不适用于因乙方故意或重大过失导致的违法处理、数据泄露、擅自跨境传输、对个人权利的实质性侵害以及违反强制性数据传输机制承诺之情形(该等情形下的责任限制不适用或不低于法律允许的下限)。 9.2 任何一方的间接/后果性损失赔偿以主合同约定为准,但法律强制另有规定的,从其规定。
第十条 变更、存续与可分割 10.1 法律变更:如适用法律、监管指引或标准合同条款更新,双方应善意协商修订本附录及其附件,以维持合法性与可执行性。 10.2 本附录自生效日起存续至双方个人信息处理关系完全终止;涉及保密、安全事件处置、协助义务与责任条款在终止后继续有效。 10.3 条款如被认定无效或不可执行,不影响其他条款之效力;双方应以尽可能接近原意的条款替代。
附件一:处理说明(按业务线与地区列示) A. 业务线/产品名称与地区覆盖 B. 数据主体类别:员工(在职/候选人/离职/实习生)、客户(终端消费者/B端客户联系人)、供应商联系人等 C. 个人信息类型:基础身份、账户、联系方式、交易/订单、定位与设备标识、行为日志、通信内容;敏感信息(身份证件、金融账户、生物识别、健康、政治立场/宗教信仰/工会会员等,按法域定义勾选) D. 处理目的与法律基础:提供与运营服务、客户支持、计费结算、风控与反欺诈(在法域允许范围内)、合规审计、法定义务 E. 处理活动:收集、传输、存储、分析、画像/自动化决策(如有需特别标注) F. 保留期限与删除机制:明确期限或触发条件、归档与备份策略 G. 接收方与分处理者:名称、所在地、角色、处理活动简述 H. 跨境路径:数据来源地、存储地、访问地、传输机制(SCC模块/IDTA/UK Addendum/瑞士调整;中国路径:安全评估/认证/标准合同+备案) I. 权利请求与联系人:甲方与乙方的数据保护联系人/隐私邮箱 J. 特殊合规项:儿童/未成年人数据(如禁止或需额外同意)、员工监控类场景限制(透明度、必要性、工会/劳资程序要求)
附件二:安全与合规技术—组织措施(TOMs)
附件三:分处理者清单
附件四:跨境传输文件与地区附录 A. 欧盟/英国/瑞士数据传输
附件五:个人权利请求与联络窗口
实施与合规要点(供签署与落地时使用)
重要提示
Below is a modular Data Protection and IP Annex for a SaaS/App and IP transaction addressing user data, usage logs, and algorithmic outputs. It is structured for insertion into a Master Subscription Agreement, License Agreement, or Technology/IP Transaction Agreement. Bracketed selections and labeled alternatives (Alt A/B/C) provide negotiation fallbacks. References to GDPR, UK GDPR, and U.S. state privacy laws (including CPRA) are included. Parties should tailor defined terms, scope, and jurisdictional modules to their deal and regulatory footprint.
DATA PROTECTION AND INTELLECTUAL PROPERTY ANNEX This Data Protection and Intellectual Property Annex (Annex) is incorporated into and forms part of the [Master Subscription Agreement/Technology License and IP Transfer Agreement] (Agreement) between [Customer] and [Provider] (each a Party and together the Parties). Capitalized terms not defined in this Annex have the meaning given in the Agreement.
Defined Terms 1.1 Applicable Data Protection Laws means all laws, regulations, and regulatory guidance applicable to the processing of Personal Data under the Agreement, including, as applicable: (a) the EU General Data Protection Regulation 2016/679 (GDPR); (b) the UK GDPR and the Data Protection Act 2018; (c) the California Consumer Privacy Act as amended by the California Privacy Rights Act (collectively, CPRA), and other U.S. state privacy laws to the extent applicable (e.g., VCDPA, CPA, UCPA, CTDPA); and (d) any substantially similar laws in other jurisdictions. 1.2 Personal Data has the meaning set forth in Applicable Data Protection Laws and includes personal information under CPRA. 1.3 Customer Data means (a) Personal Data provided or made available by or on behalf of Customer to Provider in connection with the Services; (b) content, files, and records ingested into the Services by or for Customer; and (c) data collected from end users of Customer’s applications via the Services, excluding Provider Logs and Aggregated/Deidentified Data. 1.4 Provider Logs means telemetry, diagnostics, performance, and usage logs generated by the Services, which may include limited Personal Data (e.g., device identifiers, IP addresses, timestamps, event data). 1.5 Algorithm Outputs means the outputs, predictions, recommendations, inferences, generated content, and other results produced by the Services for Customer from Customer Data and/or Provider Materials. 1.6 Derived Data means data derived from processing of Customer Data or Algorithm Outputs that is transformed to remove direct identifiers and is used to develop or improve the Services or models, subject to Section 5 (Training/Improvements). 1.7 Deidentified Data and Aggregated Data mean data that meets the de-identification and/or aggregation standards under Applicable Data Protection Laws and cannot reasonably be used to identify an individual or Customer, directly or indirectly, provided the Provider maintains and complies with safeguards and commitments required by those laws. 1.8 Subprocessor means any third party engaged by Provider to Process Personal Data on behalf of Customer in connection with the Services. 1.9 Standard Contractual Clauses or SCCs means Module(s) of the European Commission’s Decision 2021/914 as updated or replaced, and the UK Addendum or IDTA as applicable.
Roles and Scope of Processing 2.1 Role. Option A (Processor Model): For Customer Data, Provider acts as a Processor (GDPR)/Service Provider (CPRA), and Customer acts as Controller/Business. Provider will Process Customer Data only on documented instructions from Customer, as set out in the Agreement and this Annex. Option B (Hybrid Model): (i) For Customer Data, Provider acts as Processor/Service Provider; and (ii) for Provider Logs, each Party acts as an independent Controller/Business. Provider will not combine Provider Logs with Customer Data except as strictly necessary to provide, secure, and support the Services. Option C (Controller-to-Controller): For Customer Data and Provider Logs, the Parties act as independent Controllers/Businesses, each determining its own purposes and means of Processing. [Note: This option materially changes obligations and is typically disfavored by customers for user data.]
2.2 Subject Matter and Duration. The subject matter, duration, nature, and purpose of Processing; types of Personal Data; and categories of Data Subjects are described in Schedule 1 (Data Processing Details).
2.3 Instructions. Provider shall Process Customer Data only (a) to provide, maintain, and support the Services; (b) to carry out documented instructions of Customer; and (c) as required by Applicable Law, in which case Provider shall inform Customer prior to Processing unless legally prohibited.
3.2 Customer Responsibilities. Customer is responsible for (a) establishing a lawful basis for Processing; (b) providing required notices and obtaining consents from Data Subjects as needed; (c) the accuracy, quality, and legality of Customer Data; and (d) configuring the Services in compliance with Applicable Data Protection Laws.
4.2 Audit and Certifications. Option A (Report-Only): Provider will provide, upon request and at least annually, (i) current SOC 2 Type II or ISO 27001 certificate, (ii) executive summary of penetration tests, and (iii) responses to a reasonable security questionnaire (no more than once annually). Option B (Onsite/Third-Party Audit): In addition to Option A, Customer may conduct an on-site audit or designate a mutually agreed independent auditor no more than once annually, subject to reasonable notice, confidentiality, and minimal business disruption. [Provider may charge reasonable fees for audits exceeding report review.] Option C (Escalation Right): If Provider’s report reveals material control failures not remedied within [60] days, Customer may suspend affected Processing or terminate the Agreement for cause.
4.3 Security Incident Notification. Provider shall notify Customer without undue delay and in any event within [48] hours after becoming aware of a Personal Data Breach affecting Customer Data, including details reasonably available to Provider. Provider will take reasonable steps to mitigate adverse effects and cooperate with Customer in required notifications. [Note: GDPR authority notification is “without undue delay and, where feasible, not later than 72 hours”; this clause is a contractual customer notification.]
5.2 Improvements and Feedback. Customer grants Provider a non-exclusive, worldwide, royalty-free license to use Feedback for any purpose. [Alt: assign Feedback; [Alt: license limited to Service improvement]]. Provider will not identify Customer as the source of Feedback without consent.
5.3 Training Rights (Use of Customer Data and Outputs to Improve Models). Option A (No Training by Default): Provider shall not use Customer Data or Algorithm Outputs to train, retrain, or fine-tune models for the benefit of Provider or third parties, except on documented instructions or with Customer’s prior written consent. Option B (Deidentified/Aggregated Training): Provider may use Deidentified Data and Aggregated Data derived from Customer Data or Outputs to develop and improve the Services and models, provided Provider: (i) maintains technical and organizational safeguards preventing reidentification; (ii) does not attempt to reidentify; (iii) does not use the data to target or profile Data Subjects; and (iv) complies with CPRA and similar laws’ deidentification requirements. Option C (Opt-Out Model): Provider may use Customer Data for model improvements unless Customer opts out via written notice or administrative controls. Provider shall provide a straightforward opt-out mechanism and honor it within [10] days.
5.4 Non-Attribution. Provider shall not use Customer’s name, trademarks, or Output content for external training datasets, benchmarks, or marketing without Customer’s prior written consent.
Provider Logs and Telemetry 6.1 Permitted Uses. Provider may Process Provider Logs to (a) deliver, maintain, support, and secure the Services; (b) measure and report on service performance and capacity; (c) detect, investigate, and prevent fraud, abuse, and security incidents; and (d) comply with law. Provider will not Sell or Share Personal Data within Provider Logs. 6.2 Minimization and Retention. Provider will collect the minimum Provider Logs reasonably necessary and retain them for no longer than [90/180/365] days unless (i) required by law, (ii) necessary to investigate security incidents, or (iii) longer retention is approved in writing by Customer. [Alt: tie retention to documented data retention schedule.] 6.3 Role Alternatives. See Section 2.1. If independent Controller model applies, each Party shall provide legally required notices and honor applicable Data Subject rights for its own Processing.
Subprocessors 7.1 Authorization. Option A (General Authorization): Customer authorizes Provider to engage Subprocessors listed at [URL/Schedule], subject to Provider’s obligations in this Section. Provider will provide at least [30] days’ notice of new Subprocessors and a mechanism to subscribe to updates. Customer may object on reasonable data protection grounds within [10] days; the Parties will work in good faith to resolve objections. Option B (Specific Authorization): Provider shall not appoint a Subprocessor without Customer’s prior written approval for each Subprocessor. 7.2 Flow-down. Provider shall impose data protection obligations on Subprocessors that are at least as protective as those set out in this Annex. Provider remains responsible for Subprocessors’ performance.
Data Subject Requests; Assistance; DPIAs 8.1 Assistance. Taking into account the nature of Processing, Provider shall provide reasonable assistance to Customer to respond to Data Subject requests (access, deletion, correction, portability, restriction, objection, opt-out of targeted advertising or sale/sharing under U.S. laws), and to fulfill Customer’s obligations regarding security, breach notifications, recordkeeping, and impact assessments (DPIAs) and prior consultations. 8.2 CPRA Service Provider Terms. Provider certifies it understands and will comply with the CPRA’s restrictions for Service Providers and Contractors. Upon Consumer request relayed by Customer, Provider shall assist in responding to requests as required by CPRA.
International Data Transfers 9.1 Transfer Mechanisms. Where Provider’s Processing of Customer Data involves a transfer to a country not recognized as providing an adequate level of protection under Applicable Data Protection Laws, the Parties agree the SCCs (and UK Addendum/IDTA) are incorporated by reference as follows: [insert SCC module mapping: Controller–Processor (Module 2) and/or Processor–Processor (Module 3)]. The Parties complete the SCCs’ Annexes using Schedule 1 and Schedule 2 to this Annex. 9.2 Supplementary Measures. Provider shall implement supplementary measures, where required by a transfer impact assessment, including encryption-in-transit and at-rest, access controls, and policies for responding to government access requests. 9.3 China and Other Jurisdictions. For transfers subject to the PRC Personal Information Protection Law (PIPL) or similar regimes requiring security assessments, certifications, or standard contracts, the Parties will execute the required instruments and cooperate to complete assessments or filings before transfer. [Note: specify which party leads assessments; consider data localization constraints.]
Retention and Deletion 10.1 Upon termination or expiration of the Agreement or upon Customer’s written request, Provider shall promptly delete or return Customer Data (at Customer’s option), unless retention is required by law. [Alt: deletion within [30] days; destruction certificate upon request.] 10.2 Backups. Provider may retain encrypted backups for up to [90] days, inaccessible to production systems, after which they are overwritten in the ordinary course.
Government and Third-Party Requests 11.1 Legal Process. Provider shall not disclose Customer Data to any government or third party without prior written notice to Customer, unless legally prohibited. If prohibited, Provider shall use reasonable efforts to obtain a waiver to notify Customer. Provider will challenge unlawful or overbroad requests to the extent reasonable. 11.2 Transparency. Upon request, Provider will provide a summary of the volume and type of legal demands received relating to Customer Data, to the extent lawful.
Confidentiality 12.1 Personnel and Subprocessors. Provider ensures that personnel and Subprocessors accessing Customer Data are bound by confidentiality obligations and have undergone appropriate training. 12.2 Conflicts. If a conflict exists between confidentiality terms in the Agreement and this Annex, the more protective standard for Customer Data applies.
Liability and Indemnities 13.1 Liability Allocation. Option A (Carve-Out): The liability cap in the Agreement does not apply to (i) Provider’s breach of Section 3.1 (Service Provider restrictions), (ii) unauthorized disclosure of Customer Data caused by Provider’s breach of this Annex, (iii) infringement of IP in Algorithm Outputs under Section 14, or (iv) willful misconduct. [Alt: carve-out solely for data breach direct damages; [Alt: super-cap at [2x–3x] fees.] 13.2 Indemnity. Option A (Provider Indemnity): Provider shall defend and indemnify Customer against third-party claims to the extent arising from Provider’s material breach of this Annex or Applicable Data Protection Laws, or from Subprocessor acts/omissions, resulting in unauthorized disclosure of Customer Data. Option B (Mutual Indemnity): Each Party indemnifies the other for its independent-controller Processing (if applicable) that violates Applicable Data Protection Laws and causes harm.
Intellectual Property; Infringement; Output Risk Allocation 14.1 Background IP. Each Party retains ownership of its Background IP. Provider retains ownership of Provider Materials, models, pre-trained weights, and service infrastructure. 14.2 Output Ownership and License. See Section 5.1 (Options A/B). The Parties acknowledge that protectability of AI-generated content may vary by jurisdiction; nothing herein guarantees registrability or enforceability of copyrights in Outputs. [Optional: Provider disclaims authorship of non-human-generated content; Customer represents it will ensure sufficient human authorship when seeking copyright protection.] 14.3 IP Indemnity for Outputs. Option A (Provider Indemnity): Provider shall defend and indemnify Customer for third-party claims alleging that Customer’s use of Algorithm Outputs, as generated by unmodified Services and in accordance with the Agreement, infringes third-party IP rights, excluding claims based on Customer Data, Customer’s prompts/instructions, or combination with non-Provider materials. Remedies may include modify/replace, procure rights, or refund pro rata fees. Option B (Limited Indemnity): Same as Option A, but excluding claims relating to text- or image-generation where Provider designates the feature as “experimental” or “beta”. 14.4 Moral Rights Waiver. To the extent permitted by law, Provider waives and will procure waivers of moral rights in Algorithm Outputs it could assert, limited to enabling Customer’s rights under Section 5.1.
Deidentified and Aggregated Data Commitments 15.1 Provider shall (a) maintain and implement technical controls and policies to prevent reidentification; (b) publicly commit to not reidentify Deidentified Data; and (c) contractually bind recipients to the same restrictions, consistent with CPRA and similar laws. 15.2 Provider will not attempt to or actually use Deidentified or Aggregated Data to single out or target any individual or Customer.
High-Risk Data and Sectoral Laws 16.1 Prohibited Data. Customer shall not submit special categories of data under GDPR, precise geolocation, biometric identifiers, or health/medical data unless expressly agreed in writing and subject to supplemental terms. 16.2 Sectoral Compliance. If the Parties agree to Process data regulated by sectoral laws (e.g., HIPAA, GLBA, FERPA), they will execute required addenda (e.g., BAA) before such Processing.
Order of Precedence If there is a conflict between this Annex and the Agreement, this Annex controls with respect to data protection, privacy, and Algorithm Outputs/IP allocation.
Schedule 1 – Data Processing Details (SCC Annex I; UK Addendum Part 1; CPRA Description) A. Parties
Schedule 2 – Security Measures (SCC Annex II)
Negotiation Playbook (Concise)
Signature Blocks By their duly authorized representatives, the Parties agree to this Annex as of the Effective Date of the Agreement.
[Customer] Name: Title: Date:
[Provider] Name: Title: Date:
Important Legal Notes
Please provide your preferred alternatives (e.g., 2.1 Option A/B, 5.1 Option A/B, 5.3 Option A/B/C) and any jurisdiction-specific requirements (EU/UK/US states/PRC) to finalize the Annex.
以下为可直接嵌入主合同的“数据保护专条”示范文本,适用于新增功能涉及个人信息采集、使用、共享、删除与留存,以及集成SDK并与第三方共享数据的合规场景。该专条以中华人民共和国法律为基本适用法(尤其《个人信息保护法》《数据安全法》《网络安全法》及其配套制度),兼顾监管部门发布的相关规范性文件及国家标准的通行做法。请结合具体业务流程、数据类型与系统架构进一步细化附件并完成内控落地。
一、定义与适用范围 1.1 定义
1.2 适用范围
二、角色与授权 2.1 角色划分
2.2 授权与指令
三、合法性基础与告知同意 3.1 处理基础
3.2 告知义务
3.3 记录保存
四、目的限定与数据最小化 4.1 目的限定
五、数据类型、留存与删除 5.1 数据类型
六、数据主体权利 6.1 权利保障
七、安全保障与技术组织措施 7.1 基线要求
八、SDK集成与第三方共享 8.1 SDK准入与告知
九、自动化决策与个性化推荐 9.1 合法合规
十、未成年人保护
十一、数据跨境提供 11.1 合规路径
十二、分包与转委托
十三、合规证明与审计配合
十四、保密与限制性使用
十五、责任与违约 15.1 责任承担
十六、终止后的数据处置
十七、通知与协作
十八、适用法律与争议解决
附件(示例结构,建议在落地时补充完整并随版本迭代更新) 附件一:数据清单与处理矩阵
附件二:SDK与第三方清单
附件三:个人信息保护影响评估(PIPIA)摘要
附件四:安全事件应急响应流程
附件五:数据留存与删除政策
合规提示(供合同外部实施时参考)
上述专条为框架性示范,建议在落地时由双方法务与技术、安全、产品团队联合梳理数据流与权限矩阵,结合具体场景对附件进行量化与可操作性补充,以满足监管可解释与内部可执行的双重要求。
用一套即取即用的专业提示词,让你在几分钟内生成可直接落入合同的数据保护条款:按数据类型与业务场景精准定制,自动贴合目标法域与行业规范,提供专业法务语气与多语言输出,覆盖关键合规模块(定义与范围、处理目的与合法依据、数据最小化与保留、跨境传输、安全措施、分处理方、数据主体权利、事故通报、审计与责任)。帮助法务、合规、采购与业务团队在供应商签约、SaaS上架、渠道合作、投标响应、并购尽调等场景快速交付高质量条款,减少往返修改与沟通成本,降低合规与谈判风险,提升签约成功率与速度。
用它为不同业务线和地区快速生成定制化数据保护条款,统一口径、控制风险,并缩短合同往返审核周期。
批量起草SaaS、APP、知识产权交易涉及的数据条款,附带谈判备选语句,提高出稿速度与修订质量。
将数据采集、使用、共享与删除要求落实到合同条款,协调研发与运营,保障新功能上线前可审可签。
将模板生成的提示词复制粘贴到您常用的 Chat 应用(如 ChatGPT、Claude 等),即可直接对话使用,无需额外开发。适合个人快速体验和轻量使用场景。
把提示词模板转化为 API,您的程序可任意修改模板参数,通过接口直接调用,轻松实现自动化与批量处理。适合开发者集成与业务系统嵌入。
在 MCP client 中配置对应的 server 地址,让您的 AI 应用自动调用提示词模板。适合高级用户和团队协作,让提示词在不同 AI 工具间无缝衔接。
免费获取高级提示词-优惠即将到期