Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- What Is A Data Processor (In Australia)?
- What To Include In A Data Processing Agreement (DPA)
- Common Mistakes Small Businesses Make With Data Processors
- How To Explain Your Role To Customers And Clients
- Negotiating DPAs When You’re The Service Provider
- Negotiating DPAs When You’re Engaging A Processor
- Key Takeaways
Whether you’re a growing eCommerce brand, a health provider using cloud tools, or a SaaS startup powering other companies, you’re almost certainly handling personal information every day.
That means you’re either engaging data processors (think: cloud hosting, marketing platforms, payroll providers) or you are acting as a data processor for your clients.
Understanding what “data processor” means, how it compares to a “controller,” and what your legal and contractual obligations look like in Australia will help you manage risk, win bigger clients, and build trust with your customers.
In this guide, we’ll unpack the essentials in plain English and give you a practical checklist you can action today.
What Is A Data Processor (In Australia)?
“Data processor” is a term you’ll see in overseas frameworks like the EU’s General Data Protection Regulation (GDPR). A data processor processes personal data on behalf of another party (the “controller”), following the controller’s instructions.
Australia’s Privacy Act 1988 (Cth) doesn’t use the controller/processor labels. Instead, it talks about “APP entities” (agencies and organisations) and sets out the Australian Privacy Principles (APPs). Practically, though:
- A “controller” is like the business that determines why and how personal information is used (e.g. a retailer deciding to collect email addresses for marketing).
- A “data processor” is the service provider that handles that information under the retailer’s direction (e.g. an email marketing platform or outsourced customer support team).
Many Australian businesses play both roles. For example, you might be a controller for your customers’ data and a processor when you deliver services to B2B clients using their end-customer data.
Are You A Data Processor, A Controller - Or Both?
Working this out is the first step because it drives which obligations apply and what your contracts should say.
Signs You’re Acting As A Controller
- You decide what personal information to collect and why (e.g. sign-up forms, loyalty programs).
- You choose the tools you’ll use and set retention periods.
- You communicate directly with individuals about how you use their data (your notices, consent and opt-outs).
Signs You’re Acting As A Data Processor
- You process personal information strictly to provide services to your client.
- Your client gives the instructions (what to collect, how long to keep it, when to delete).
- You don’t re-use the information for your own purposes (e.g. your own marketing) without permission.
It’s common to be a controller for your own customer data, and a processor for data you handle on behalf of clients. If you’re a processor, you’ll generally be required to follow your client’s instructions under a Data Processing Agreement (DPA) and meet security and breach notification standards.
What Laws Apply To Data Processors In Australia?
If you’re an Australian business handling personal information, several legal layers may apply. Here’s the landscape in brief.
Privacy Act And The Australian Privacy Principles (APPs)
The Privacy Act (and its APPs) applies to most organisations with annual turnover of more than $3 million, and to some smaller organisations (for example, health service providers, those trading in personal information, and others under set criteria). Even if you’re under the threshold, larger customers will often contractually require you to meet APP-level privacy and security standards.
Key APP themes include being transparent, only collecting what you need, securing personal information, enabling access/correction, and restricting overseas disclosures unless certain safeguards are met.
Notifiable Data Breaches (NDB) Scheme
APP entities must assess and notify eligible data breaches to the Office of the Australian Information Commissioner (OAIC) and affected individuals. If you’re a processor and you experience or suspect a breach, your DPA will usually require you to promptly notify the controller and cooperate with investigations and notifications. Having a tested Data Breach Response Plan is a practical way to stay ready.
Cross-Border Disclosure Rules
If personal information will be stored or accessed overseas (including by sub-processors), APP 8 requires “reasonable steps” to ensure the overseas recipient does not breach the APPs. This is typically addressed through due diligence, contractual clauses and technical controls (such as encryption and access restrictions).
GDPR And Other Overseas Laws
You may also need to comply with the GDPR if you target or monitor individuals in the EU/UK, or if your enterprise clients require GDPR-grade standards in your contracts. Australian businesses often adopt GDPR-style clauses and processes because it’s become the benchmark for global privacy compliance. Where GDPR applies, a controller-processor DPA is mandatory and must include specific clauses (more on this below). If you’re in this boat, our GDPR Package can help you align your documents and practices.
Using Data Processors: How To Manage Vendor Risk
Most small businesses use third-party tools and service providers. Each one is a potential data processor. Good governance here reduces legal exposure and reassures customers.
1) Map Your Processors
Start with an inventory: web host, CRM, marketing platforms, helpdesk tools, payment gateways, file storage, analytics, payroll, contractors and agencies. Note the personal information each processes and whether any data leaves Australia.
2) Perform Due Diligence
- Security posture: certifications (e.g. ISO 27001), encryption at rest/in transit, access controls, vulnerability management.
- Privacy posture: data minimisation, deletion on request, sub-processor transparency, breach history.
- Location: where data is stored and accessed, including support teams and sub-processors.
3) Put The Right Contracts In Place
Your contracts should set clear limits on how the provider can use personal information, require appropriate security, restrict sub-processing without approval, and cover breach notification and assistance. For EU/UK-facing arrangements, ensure the DPA meets GDPR Article 28 standards.
4) Update Your Customer-Facing Documents
Tell customers what you do with their personal information. That transparency belongs in your Privacy Policy and in a concise Privacy Collection Notice (e.g. at sign-up). Be upfront about overseas disclosures and the types of third parties you use.
5) Manage The Lifecycle
Set reminders to review processor performance and compliance annually, and ensure data is returned or deleted at the end of the contract. Build this into offboarding checklists so nothing slips.
What To Include In A Data Processing Agreement (DPA)
Whether you’re the customer engaging a processor, or the service provider processing data for clients, a DPA is the backbone of privacy compliance and risk management.
Here are the clauses small businesses commonly need to see in a robust Data Processing Agreement:
- Scope And Instructions: A clear description of the services, types of personal information, data subjects and processing activities, and a requirement to act only on documented instructions.
- Confidentiality: Staff, contractors and sub-processors must be under appropriate confidentiality obligations.
- Security Measures: A baseline of technical and organisational measures (e.g. encryption, access controls, logging, secure development practices), often supplemented by an Information Security Policy.
- Sub-Processors: A process for approval (general or specific), transparency about the list of sub-processors, and flow-down of the same data protection obligations.
- Breach Notification: Timely notification of suspected or actual breaches, cooperation in investigations, and support with regulatory or customer notifications.
- Assistance With Requests: Reasonable help responding to access, correction, deletion or objection requests; also support with privacy impact assessments where needed.
- Return/Deletion Of Data: On termination, delete or return personal information (with certificates of deletion where appropriate) unless law requires retention.
- Audits And Evidence: Allow reasonable audits or provide compliance evidence (e.g. reports, certifications) without disrupting operations.
- International Transfers: Controls for any cross-border transfers, including contractual safeguards.
- Liability And Indemnities: Fair allocation of risk (especially for breaches arising from the other party’s instructions or failures), and appropriate caps that reflect the deal.
- Insurance: Maintaining appropriate cyber/privacy insurance cover and sharing proof on request.
If you process data for other businesses, build a DPA template into your standard terms so you can move quickly when procurement asks for it. If you engage processors, keep a playbook of your “must-have” clauses and where you can compromise.
Practical Steps To Stay Compliant (Checklist)
Here’s a straightforward, Australian-focused checklist you can use to tighten your privacy posture as a controller, as a processor, or both.
1) Get Your Public-Facing Documents Right
- Publish an accurate, easy-to-read Privacy Policy that covers what you collect, why, who you share it with, cross-border disclosures and how customers can exercise their rights.
- Use a concise Privacy Collection Notice at the point you collect information (e.g. forms, app onboarding) so people understand what’s happening at the time it matters.
2) Map Data Flows And Retention
- Document what you collect, where it’s stored, who accesses it, and the processors involved.
- Set retention and deletion rules by data category so you don’t keep information longer than necessary; our guide to data retention laws is a helpful starting point.
3) Lock In Your Vendor Controls
- Run due diligence on existing and new processors (security, privacy, breach history, location).
- Execute or update a Data Processing Agreement with each processor that touches personal information.
- Record sub-processors and keep change notifications on your radar.
4) Prepare For Incidents
- Adopt and test a Data Breach Response Plan, including an internal “playbook” and contact tree.
- Train your team to spot and escalate issues quickly (e.g. phishing, misdirected emails, lost devices).
5) Embed Security In Everyday Operations
- Roll out an Information Security Policy covering access control, passwords/MFA, device security, and vendor management.
- Limit access based on roles, implement encryption, and turn on logging/alerting for critical systems.
6) Align With Global Customers
- If you service overseas customers or process EU/UK data, align your contracts and processes with GDPR expectations. Where needed, consider our GDPR Package to streamline that alignment.
Common Mistakes Small Businesses Make With Data Processors
- Assuming “we’re under $3m so privacy doesn’t apply.” Even if the Privacy Act’s small business exemption applies, customers and enterprise clients will still expect strong privacy and security, and contracts will usually require it.
- Not checking where data really goes. Support centres, backups and analytics tools can create cross-border flows you didn’t intend. Map them and disclose appropriately.
- Letting “standard terms” slide. Big vendor standard terms often favour the vendor. Push for reasonable breach notification, deletion rights and sub-processor transparency-especially when you’re responsible to your own customers.
- Keeping personal information forever. Long retention means more risk. Set sensible retention periods and delete data you no longer need.
- No testing of incident response. The worst time to learn your plan doesn’t work is during a real breach. Run a table-top exercise to find gaps.
- Skipping updates as you grow. New tools, new markets and new data types mean your privacy posture should evolve. Set review reminders.
How To Explain Your Role To Customers And Clients
Clear communication builds trust. As a controller, explain in your customer-facing materials what you collect and why, who you share it with, and how people can contact you. That’s the job of your Privacy Policy and collection notices.
As a processor, be transparent with clients about your security program and sub-processors, and be ready to sign a DPA that reflects your actual practices. Many procurement teams will ask for evidence like policies, certifications, and incident processes-having these prepared speeds up onboarding and reduces pushback on contracts.
Negotiating DPAs When You’re The Service Provider
Start with a standard DPA that fairly allocates risk and reflects how your service actually works. Then decide in advance which points you can flex on and which are non-negotiable.
Hot-button issues to plan for include:
- Breach notification timing: find a workable window (e.g. without undue delay, usually within 24-72 hours of becoming aware) that allows you to investigate meaningfully before alarming customers.
- Audit rights: offer practical alternatives like third-party certifications or audit reports, with onsite audits reserved for serious incidents or regulatory requirements.
- Sub-processor approval: a general consent model with prior notice and an opportunity to object is common and more scalable than specific approvals for each vendor.
- Liability caps: align with your main agreement caps where possible, with reasonable carve-outs (e.g. wilful misconduct). Avoid unlimited liability for all privacy breaches across the board if it doesn’t reflect the deal value.
When you’re consistent across customers, your sales cycles shorten and your legal risk is easier to manage.
Negotiating DPAs When You’re Engaging A Processor
If you’re the controller, your goal is to get enough comfort that your processor won’t create unnecessary risk for your customers or your business. Focus on:
- Clear instructions and deletion on termination.
- Security commitments that match the sensitivity of data.
- Sub-processor visibility and change notifications.
- Prompt breach notification and cooperation.
- Assistance with access/deletion requests and investigations.
- Reasonable liability and insurance coverage.
If the vendor is unwilling to meet a baseline of privacy protections, consider alternatives. The reputational and legal costs of a privacy incident often dwarf any short-term savings.
Key Takeaways
- “Data processor” isn’t an Australian legal label, but it’s a useful way to describe service providers who handle personal information on your behalf-most small businesses will be a controller for some data and a processor for other data.
- Australian obligations come from the Privacy Act and APPs, the Notifiable Data Breaches scheme, and contractual commitments; if you target EU/UK individuals or work with global clients, expect GDPR-style standards.
- Map your processors, run due diligence, and lock in a fit-for-purpose Data Processing Agreement with each provider that touches personal information.
- Be transparent with customers through a clear Privacy Policy and collection notices, and keep a living record of your data flows and retention rules.
- Prepare for incidents with a tested Data Breach Response Plan and embed practical security measures via an Information Security Policy.
- Getting your privacy foundations right will win trust, speed up enterprise sales, and reduce your legal and reputational risk.
If you’d like a consultation on data processor obligations and privacy compliance for your business, you can reach us at 1800 730 617 or team@sprintlaw.com.au for a free, no-obligations chat.







