Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
If your business uses cloud software, outsources support, or shares customer data with service providers, you’ll likely be asked to sign (or provide) a Data Processing Addendum (DPA). It can feel technical at first glance, but it’s really about setting clear, legally sound rules for how your vendors handle personal information on your behalf.
Putting the right DPA in place is a smart way to reduce risk, meet your privacy obligations in Australia, and keep enterprise clients confident in your processes. In this guide, we break down what a DPA is, when you need one, what to include, and practical steps to roll it out with your suppliers and customers.
By the end, you’ll know exactly how a DPA fits alongside your Privacy Policy and other contracts-and how we can help you get it right from day one.
What Is A Data Processing Addendum (And Do You Need One)?
A Data Processing Addendum (also called a Data Processing Agreement) is a contract between a “controller” of personal data (that’s usually you, the business deciding why and how data is used) and a “processor” (your service provider that processes the data on your instructions).
In Australia, the Privacy Act 1988 (Cth) and the Australian Privacy Principles (APPs) don’t use the exact “controller/processor” language, but the concept still applies. If you’re an APP entity sharing personal information with a vendor to perform services-like hosting, CRM, marketing automation, or support-you’re expected to take reasonable steps to ensure they protect that information adequately. A DPA is one of the most effective ways to do that.
You’ll typically see DPAs as a schedule or add-on to your main services agreement. They set the rules for security, confidentiality, permitted uses, sub-processing, data breach handling and deletion at the end of the engagement.
If you deal with EU/UK personal data, a DPA becomes essential to meet the General Data Protection Regulation (GDPR). Even if you don’t, Australian regulators and enterprise customers increasingly expect to see a DPA for good privacy governance.
If you need a tailored document, consider putting a dedicated Data Processing Agreement in place for your business relationships.
When Do Australian Businesses Need A DPA?
Not every supplier relationship needs a DPA. The key question is whether your vendor processes personal information on your behalf, under your instructions, as part of providing services.
Common examples where a DPA is recommended:
- Cloud infrastructure and hosting providers storing your customer data.
- Customer support platforms that access user accounts and tickets.
- Email/SMS marketing tools sending communications to your contact lists.
- Payment gateways, subscription billing, and analytics tools.
- Outsourced back-office teams (data entry, KYC checks, customer success).
Where you might not need a DPA: truly independent third parties using data for their own purposes (not your instructions), professional advisers with their own confidentiality obligations (e.g. lawyers), or suppliers who never touch personal information at all. That said, borderline scenarios are common-so it’s best to assess each vendor carefully.
Also consider contract asymmetry. Large vendors may insist on their standard DPA. That’s common-and it’s fine provided it meets your obligations and risk appetite. We often help clients review vendor DPAs and negotiate key points like liability caps, audit rights and data breach notice timeframes.
What Should A Data Processing Addendum Include?
The DPA should be practical, clear and aligned with both Australian requirements and any foreign regimes you may trigger. At a minimum, cover the following areas.
Roles, Scope And Instructions
- Define the parties’ roles (controller/processor) and the categories of personal information involved.
- State that the processor will only process personal information on your documented instructions and for the defined purposes.
- Require the processor to notify you if they believe an instruction breaches applicable laws.
Security Measures
- Set a baseline security standard (e.g. “appropriate technical and organisational measures”) and, where possible, list controls such as encryption, access controls, logging, and secure development practices.
- Require staff confidentiality commitments and regular security training.
Sub-Processors
- Allow sub-processing only with your general or specific authorisation.
- Require the processor to impose equivalent obligations on any sub-processor.
- Provide a mechanism to object to new sub-processors where they present added risk.
Data Breach Notification
- Set prompt notice timeframes if there’s unauthorised access or disclosure of personal information (for example, within 24-72 hours of becoming aware).
- Require the processor to cooperate with your investigation, mitigation and notifications under the Notifiable Data Breaches scheme.
It’s wise to align your DPA with your internal incident playbook and a formal Data Breach Response Plan.
International Data Transfers
- Identify if data will be stored or accessed from outside Australia.
- Address safeguards for overseas disclosures (e.g. ensuring substantially similar protection, or using appropriate transfer mechanisms if GDPR applies).
Assistance With Individual Rights And Compliance
- Require the processor to assist you in handling access or correction requests, complaints and regulator enquiries.
- Include cooperation obligations for privacy impact assessments, audits or compliance reviews.
Return And Deletion
- On contract end, require the processor to securely delete or return all personal information-subject to any lawful retention obligations.
- Obtain deletion certificates or logs, where appropriate.
Audit And Accountability
- Set reasonable audit rights or accept industry-standard reports (e.g. SOC 2, ISO 27001 certificates) as evidence of controls.
- Require timely remediation of identified gaps.
Liability And Indemnities
- Align the DPA’s liability terms with your main agreement, or set a clear cap that reflects the risk profile of the processing.
- Consider specific indemnities for breaches of the DPA’s core privacy and security obligations.
Documentation And Records
- Require the processor to keep records of processing activities relevant to your data and make them available on request, within reason.
How Does A DPA Fit With Your Other Documents?
Think of your DPA as one piece of your broader privacy and contracts toolkit. Each document has a role, and they should be consistent with each other.
- Privacy Policy: The external statement to customers explaining what you collect, why, and how you handle personal information.
- Privacy Collection Notice: A short notice that accompanies forms or sign-ups to tell people how their data will be used at the point of collection.
- Main Services Agreement: Your commercial contract with the processor (or your customer, if you’re the processor) that sets pricing, deliverables and general liability. The DPA sits underneath it and governs data handling.
- Website Terms and Conditions: The rules for users of your site or app-make sure the privacy, security, and acceptable use components align with your DPA obligations.
- Security Playbooks: Internal policies like an Information Security Policy and incident response procedures that operationalise the commitments in your DPA.
If you market to EU/UK residents or offer services in the EU, consider aligning with GDPR standards using our GDPR Package so your DPA, privacy notices and data transfer wording are consistent.
Step-By-Step: How To Put A DPA In Place With Vendors
Here’s a simple process you can follow with each supplier that touches personal information.
1) Map Your Data And Vendors
List where personal information sits across your stack: CRM, billing, analytics, support, backups and file storage. Note who hosts it, where it’s stored (including any overseas locations) and what each vendor does with it.
This gives you the baseline for your risk assessment and the scope section of each DPA.
2) Decide Whose DPA To Use
If you’re the customer, you can propose your DPA or review the vendor’s standard DPA. Large SaaS providers will usually insist on theirs; smaller vendors may accept yours. Either way, focus on the key risk points-security, sub-processors, breach notice, deletion and liability.
If you are the service provider, have a standard DPA ready that you can attach to your customer agreements. This speeds up sales cycles and presents a mature privacy posture.
3) Check For Consistency With Your Core Contracts
Make sure the DPA doesn’t conflict with the master services agreement. If the main contract caps liability at a certain level, the DPA should work with that (or clearly set out any exceptions tied to privacy breaches). Ensure term, termination, audit rights and dispute resolution are consistent.
4) Align The DPA With Your Privacy Program
There’s no point promising encryption, deletion tooling or 24-hour breach notifications if your systems and team can’t deliver. Align your DPA promises with your actual processes and, where needed, uplift your internal controls and documentation.
It’s common to update your Privacy Policy, collection notices, and internal playbooks at the same time so everything matches and staff are trained on the new processes.
5) Pay Attention To International Transfers
If any processing happens offshore, ensure the DPA addresses overseas disclosures under the Privacy Act and any additional safeguards if GDPR applies. This often includes listing data locations, naming sub-processors and setting transfer safeguards.
6) Finalise, Execute And Store
Once terms are agreed, sign the DPA along with the master agreement. Store signed copies, keep a central register of processors, and diarise reviews-especially when adding new features, regions or sub-processors.
7) Operationalise And Review Annually
Train your team on the obligations that impact them (e.g. support deletion workflows, marketing suppression lists, incident reporting). Review your vendor list and DPAs annually or when your business model changes.
Common Questions About DPAs (From Small Business Owners)
Do Australian Laws Actually Require A DPA?
The Privacy Act doesn’t name “DPA” specifically, but you must take reasonable steps to protect personal information you disclose to third parties. For many relationships, a DPA is the most practical way to demonstrate those steps and set clear obligations for processors. If you handle EU/UK data, a DPA is a de facto requirement under GDPR.
What If My Vendor Refuses My DPA?
That’s common with large SaaS providers. Review their DPA carefully. Many are reasonable and industry-standard. Where there are gaps (e.g. very long breach notice times or broad rights to add sub-processors without notice), negotiate where you can or decide if the risk is acceptable given their security certifications and reputation.
Do I Need DPAs With Australian Government Agencies?
If you supply to government, you’ll often see privacy and security terms embedded directly in the contract (with additional laws for “contracted service providers”). You may still see an addendum, but the obligations will be tailored to the agency’s framework. Expect stricter audit, data residency and deletion requirements.
How Does A DPA Interact With Marketing Laws?
A DPA sets rules for processing personal information. It doesn’t replace your obligations under other regimes like spam and consumer law. For instance, ensure your campaigns comply with email marketing laws and the Australian Consumer Law when promoting products or services.
What About Data Retention?
Your DPA should ensure processors don’t keep data longer than necessary, and that they delete or return data at the end of the contract. This should align with your broader approach to data retention laws in Australia and your own policy on how long you hold different records.
Practical Tips To Keep Your DPA Program Simple
- Start with your highest-risk vendors (hosting, billing, identity, support). Get DPAs sorted there first.
- Standardise your approach-use a base DPA and a short playbook for negotiable points (e.g. breach notice windows, audit options).
- Keep a central list of processors, sub-processors and data locations. Update it when you add software or change providers.
- Make sure your public-facing documents are consistent-if your site or app collects personal information, your Website Terms and Conditions and Privacy Policy should reflect how data actually flows to vendors.
- Test your processes-actually run a deletion request from end to end, and simulate a security incident using your Data Breach Response Plan.
Key Takeaways
- A Data Processing Addendum is a contract that sets clear rules for how your vendors handle personal information on your behalf.
- In Australia, a DPA helps you meet Privacy Act obligations to take reasonable steps when disclosing personal information to third parties, and it’s essential if GDPR applies.
- Core clauses cover scope and instructions, security, sub-processors, breach notification, international transfers, assistance with individual rights, deletion, audits and liability.
- Make sure your DPA aligns with your Privacy Policy, website terms and internal security processes, so you’re promising only what you can deliver.
- Roll out DPAs using a simple process: map data flows, choose the right template, align with your main contracts, and operationalise through training and annual reviews.
- Keep your broader compliance in sync-marketing, retention and incident response should match what your DPA requires in practice.
If you’d like help drafting or reviewing a Data Processing Addendum for your Australian business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.








