Templates Contracts Agreements DPA Short Form Transfer Addendum - California (Operational Compliance)

DPA Short Form Transfer Addendum - California (Operational Compliance)

Ready to Edit

DPA SHORT FORM TRANSFER ADDENDUM -- CALIFORNIA

Operational Compliance Format -- Article Numbering

Addendum Effective Date: [__/__/____]

Reference Agreement: [________________________________] dated [__/__/____] (the "Agreement")

Transferor (Business): [________________________________] ("Transferor")

Transferee (Service Provider / Contractor): [________________________________] ("Transferee")

This Addendum supplements the Agreement and establishes the operational compliance framework for all transfers of Personal Information involving California consumers under the CCPA/CPRA.


ARTICLE I: DEFINITIONS AND INTERPRETATION

1.1 "Personal Information" -- As defined in Cal. Civ. Code 1798.140(v), information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked to a particular consumer or household.

1.2 "Sensitive Personal Information" -- As defined in Cal. Civ. Code 1798.140(ae), including SSN/driver's license/passport numbers, account credentials with financial data, precise geolocation, racial or ethnic origin, religious beliefs, union membership, personal communication contents, genetic data, biometric data for identification, health data, sexual orientation, citizenship/immigration status, and neural data (per SB 1223).

1.3 "Business Purpose" -- As defined in Cal. Civ. Code 1798.140(e), including auditing, security, debugging, short-term transient use, performing services, internal research, and quality verification.

1.4 "Service Provider" -- As defined in Cal. Civ. Code 1798.140(ag).

1.5 "Contractor" -- As defined in Cal. Civ. Code 1798.140(j).

1.6 "Sale / Sell" -- As defined in Cal. Civ. Code 1798.140(ad).

1.7 "Share" -- As defined in Cal. Civ. Code 1798.140(ah); cross-context behavioral advertising.

1.8 "De-Identified Information" -- As defined in Cal. Civ. Code 1798.140(m).

1.9 "Verifiable Consumer Request" -- As defined in Cal. Civ. Code 1798.140(ak).

1.10 "Data Breach" -- Unauthorized access to or exfiltration, theft, or disclosure of nonencrypted and nonredacted Personal Information, per Cal. Civ. Code 1798.82 and 1798.150.


ARTICLE II: OPERATIONAL SCOPE

2.1 Transferee Role: ☐ Service Provider ☐ Contractor ☐ Third Party

2.2 Compliance Implementation Checklist:

☐ Written contract executed specifying Business Purposes (this Addendum)
☐ Transferee compliance certification obtained (Article VI)
☐ Privacy notice updated to reflect Transfer
☐ Data inventory completed (Exhibit C)
☐ Technical measures verified (Exhibit B)
☐ Subprocessor list reviewed and approved
☐ Consumer rights response process established
☐ Breach notification workflow documented
☐ Risk assessment completed (where required)
☐ Annual monitoring schedule established

2.3 Business Purposes.

(a) [________________________________]
(b) [________________________________]
(c) [________________________________]

2.4 PI Categories Checklist.

☐ Identifiers (name, email, phone, address, IP, account ID)
☐ Customer records (financial, insurance, medical, education)
☐ Protected classifications (age, race, gender, disability, veteran status)
☐ Commercial information (purchase records, consumption tendencies)
☐ Biometric information
☐ Internet/network activity (browsing, search, interaction history)
☐ Geolocation data
☐ Sensory data (audio, visual, thermal, olfactory)
☐ Professional/employment information
☐ Education information
☐ Inferences and profiles
☐ Sensitive Personal Information (complete Section 4.2 checklist)

2.5 Consumer Categories.

☐ Customers ☐ Employees ☐ Applicants ☐ End Users ☐ Business Contacts
☐ Children under 13 ☐ Children 13-15 ☐ Other: [________________________________]

2.6 Duration. Agreement term plus [____] day wind-down.


ARTICLE III: LEGAL BASIS AND COMPLIANCE FRAMEWORK

3.1 Transfer Classification.

☐ Disclosure for Business Purpose (not a Sale or Share)
☐ Sale (opt-out rights apply)
☐ Sharing for cross-context behavioral advertising (opt-out rights apply)

3.2 Statutory Contract Compliance Matrix (Cal. Civ. Code 1798.100(d); 11 CCR 7051):

Requirement Addendum Reference Status
Limited and specified purposes Article II, Section 2.3 ☐ Complete
Obligation to comply with CCPA/CPRA Article VI ☐ Complete
Right to monitor compliance Article XII ☐ Complete
Notification of inability to comply Article VI, Section 6.8 ☐ Complete
Right to stop and remediate Article VI, Section 6.9 ☐ Complete
Contractor certification Article VI, Section 6.4 ☐ Complete
Monitoring at least every 12 months Article XII, Section 12.1 ☐ Complete

3.3 International Transfer (if applicable).

☐ EU-US Data Privacy Framework
☐ SCCs Module [____]
☐ UK Addendum / IDTA
☐ Not applicable (domestic only)


ARTICLE IV: DATA CLASSIFICATION

4.1 Standard PI Elements:

Data Element Included CCPA Category
Full name ☐ Yes ☐ No Identifiers
Email address ☐ Yes ☐ No Identifiers
Phone number ☐ Yes ☐ No Identifiers
Physical address ☐ Yes ☐ No Identifiers
Date of birth ☐ Yes ☐ No Identifiers
IP address ☐ Yes ☐ No Identifiers / Internet Activity
Device identifiers ☐ Yes ☐ No Identifiers / Internet Activity
Cookies/tracking ☐ Yes ☐ No Internet Activity
Purchase history ☐ Yes ☐ No Commercial Information
Employment data ☐ Yes ☐ No Professional Information

4.2 Sensitive PI Checklist (Cal. Civ. Code 1798.140(ae)):

SPI Category Included Consumer Right to Limit
SSN/DL/Passport ☐ Yes ☐ No Cal. Civ. Code 1798.121
Financial account + credentials ☐ Yes ☐ No Cal. Civ. Code 1798.121
Precise geolocation ☐ Yes ☐ No Cal. Civ. Code 1798.121
Racial/ethnic origin ☐ Yes ☐ No Cal. Civ. Code 1798.121
Religious beliefs ☐ Yes ☐ No Cal. Civ. Code 1798.121
Union membership ☐ Yes ☐ No Cal. Civ. Code 1798.121
Communication contents ☐ Yes ☐ No Cal. Civ. Code 1798.121
Genetic data ☐ Yes ☐ No Cal. Civ. Code 1798.121
Biometric data ☐ Yes ☐ No Cal. Civ. Code 1798.121
Health information ☐ Yes ☐ No Cal. Civ. Code 1798.121
Sexual orientation ☐ Yes ☐ No Cal. Civ. Code 1798.121
Citizenship/immigration ☐ Yes ☐ No Cal. Civ. Code 1798.121
Neural data ☐ Yes ☐ No Cal. Civ. Code 1798.121

4.3 If any SPI is checked, complete the Enhanced Safeguards in Article VII, Section 7.8.


ARTICLE V: TRANSFEROR OPERATIONAL OBLIGATIONS

5.1 Pre-Transfer Compliance Checklist:

☐ Privacy policy updated per Cal. Civ. Code 1798.100(a) and 11 CCR 7011-7012
☐ Notice at or before collection provided (Cal. Civ. Code 1798.100(b))
☐ "Do Not Sell or Share" link published (if applicable)
☐ "Limit the Use of My Sensitive Personal Information" link published (if applicable)
☐ Opt-in consent obtained for minors under 16 (Cal. Civ. Code 1798.120(c)-(d))
☐ GPC/universal opt-out mechanism honored (Cal. Civ. Code 1798.135(e))
☐ Data minimization review completed
☐ Risk assessment completed (where required by CPPA regulations)
☐ Cybersecurity audit completed (where required, effective Jan. 1, 2026)

5.2 Data Quality. Transferor shall use commercially reasonable efforts to ensure accuracy and completeness of PI.

5.3 Opt-Out Forwarding. Transferor shall notify Transferee within [____] business days of receiving any consumer opt-out, right-to-limit, or deletion request affecting the Transfer.

5.4 Ongoing Monitoring Schedule:

Activity Frequency Responsible Party Last Completed
Privacy policy review Annually Transferor [__/__/____]
Data inventory update Annually Both Parties [__/__/____]
Risk assessment review Annually Transferor [__/__/____]
Subprocessor list review Quarterly Transferor [__/__/____]
Consumer rights process test Annually Both Parties [__/__/____]
Breach response drill Annually Both Parties [__/__/____]

ARTICLE VI: TRANSFEREE OPERATIONAL OBLIGATIONS

6.1 Prohibited Activities.

☐ The Transferee shall NOT Sell PI received under this Addendum.
☐ The Transferee shall NOT Share PI for cross-context behavioral advertising.
☐ The Transferee shall NOT retain, use, or disclose PI for purposes other than the Business Purposes.
☐ The Transferee shall NOT use PI outside the direct business relationship.
☐ The Transferee shall NOT combine PI with data from other sources (except as permitted).

6.2 Required Activities.

☐ Process PI only per documented instructions and specified Business Purposes.
☐ Maintain confidentiality of PI.
☐ Implement and maintain reasonable security (Cal. Civ. Code 1798.81.5(b)).
☐ Assist with verifiable consumer requests within 45-day timeline.
☐ Honor consumer right-to-limit for SPI.
☐ Recognize GPC signals (Cal. Civ. Code 1798.135(e); 11 CCR 7025).
☐ Cooperate with cybersecurity audits and risk assessments.

6.3 Compliance Certification Checklist:

Certification Item Confirmed
Understands CCPA/CPRA restrictions
Will not Sell or Share PI
Will comply with purpose limitations
Will notify if unable to meet obligations
Will permit monitoring and auditing
Will cooperate with consumer rights
Will maintain reasonable security
Will comply with breach notification

6.4 Contractor-Specific Certification (Cal. Civ. Code 1798.140(j)(1)). If the Transferee is classified as a Contractor, the Transferee hereby certifies that it understands the restrictions set forth in this Addendum and will comply with them.

Authorized Signatory: [________________________________]
Date: [__/__/____]

6.5 Confidentiality. All personnel with PI access bound by written confidentiality obligations.

6.6 SPI Processing Limits. Where consumers exercise the right to limit (Cal. Civ. Code 1798.121), Transferee shall restrict SPI Processing to uses that are necessary to perform the services or provide the goods requested by the consumer.

6.7 De-Identification Standards. Where Transferee de-identifies PI, it shall: (a) implement technical safeguards prohibiting re-identification; (b) implement business processes preventing inadvertent re-identification; (c) implement business processes preventing release of De-Identified Information; and (d) make no attempt to re-identify (Cal. Civ. Code 1798.140(m)).

6.8 Inability to Comply. Transferee shall notify Transferor promptly if it can no longer meet its CCPA/CPRA obligations.

6.9 Remediation. Upon notice under 6.8, Transferor may stop and remediate unauthorized use, suspend Transfer, and/or terminate this Addendum.


ARTICLE VII: TECHNICAL AND ORGANIZATIONAL MEASURES

7.1 Security Standard. Reasonable security per Cal. Civ. Code 1798.81.5(b). Failure to maintain constitutes a basis for the private right of action under Cal. Civ. Code 1798.150.

7.2 Encryption. TLS 1.2+ in transit; AES-256 at rest; separate key management with annual rotation.

7.3 Access Controls. RBAC; MFA for admin/remote access; quarterly reviews; unique credentials; no shared accounts.

7.4 Pseudonymization. Applied where feasible; De-Identified Information used where sufficient.

7.5 Network Security. Firewalls; IDS/IPS; endpoint protection; quarterly vulnerability assessments; annual penetration testing; critical patches within [____] days.

7.6 Logging. Access logging with identity, data, timestamp, and action; [____] month retention; tamper protection; automated alerting.

7.7 Physical Security. Badge access; visitor logs; surveillance; NIST SP 800-88 compliant disposal.

7.8 Enhanced SPI Safeguards. If SPI is Processed: field-level encryption; tokenization in non-production; real-time access alerts; segregated storage; annual SPI-specific PIA.

7.9 Security Operations Checklist:

Security Control Status Last Verified Next Review
TLS 1.2+ encryption ☐ Active ☐ Pending [__/__/____] [__/__/____]
AES-256 at-rest encryption ☐ Active ☐ Pending [__/__/____] [__/__/____]
MFA for admin access ☐ Active ☐ Pending [__/__/____] [__/__/____]
RBAC implementation ☐ Active ☐ Pending [__/__/____] [__/__/____]
Vulnerability scanning ☐ Active ☐ Pending [__/__/____] [__/__/____]
Penetration testing ☐ Active ☐ Pending [__/__/____] [__/__/____]
SIEM/monitoring ☐ Active ☐ Pending [__/__/____] [__/__/____]
Incident response plan ☐ Active ☐ Pending [__/__/____] [__/__/____]
Employee training ☐ Active ☐ Pending [__/__/____] [__/__/____]
Data backup/recovery ☐ Active ☐ Pending [__/__/____] [__/__/____]

ARTICLE VIII: CONSUMER RIGHTS OPERATIONS

8.1 Rights Response Workflow:

Step Action Responsible Timeline
1 Receive verifiable consumer request Transferor Day 0
2 Forward request to Transferee (if applicable) Transferor Within [____] days
3 Transferee searches for consumer's PI Transferee Within [____] days
4 Transferee provides results/confirmation Transferee Within [____] days
5 Transferor responds to consumer Transferor Within 45 days total
6 Extension notice (if needed) Transferor Before Day 45
7 Final response with extension Transferor Within 90 days total

8.2 Rights Coverage:

Consumer Right Citation Response Deadline Transferee Action
Right to Know 1798.100, .110, .115 45 days (+45) Provide data inventory
Right to Delete 1798.105 45 days (+45) Delete PI and notify subprocessors
Right to Correct 1798.106 45 days (+45) Correct inaccuracies
Right to Portability 1798.130(a)(2) 45 days Provide in machine-readable format
Right to Opt Out (Sale/Share) 1798.120 15 business days Cease Sale/Sharing
Right to Limit SPI 1798.121 Promptly Restrict SPI Processing
Right to Non-Discrimination 1798.125 Ongoing No adverse treatment

8.3 GPC Signal Handling. Transferee shall treat GPC signals as valid opt-out requests per 11 CCR 7025.

8.4 Authorized Agent Requests. Transferee shall process requests from authorized agents per 11 CCR 7063.

8.5 Minor Consumer Protections. For consumers known to be under 16, Transferee shall verify opt-in consent before any Sale or Sharing; for consumers under 13, parental consent is required.


ARTICLE IX: SUBPROCESSOR MANAGEMENT

9.1 Authorization: ☐ Specific ☐ General (with notice)

9.2 Notice Period: [____] days before engagement.

9.3 Objection Period: [____] days from notice.

9.4 Flow-Down Requirements Checklist:

☐ No Sale or Sharing of PI
☐ Purpose limitation
☐ No combining PI from other sources
☐ Confidentiality obligations
☐ Reasonable security measures
☐ Consumer rights cooperation
☐ Breach notification
☐ Audit rights
☐ Deletion upon termination
☐ CCPA/CPRA compliance certification

9.5 Subprocessor Approval Tracker:

Subprocessor Location Activity Approved Approval Date
[________________________________] [____] [________________________________] [__/__/____]
[________________________________] [____] [________________________________] [__/__/____]
[________________________________] [____] [________________________________] [__/__/____]

9.6 Liability. Transferee fully liable for subprocessor compliance.


ARTICLE X: DATA BREACH RESPONSE

10.1 Notification Timeline:

Step Action Deadline
1 Transferee detects/suspects breach Trigger event
2 Transferee notifies Transferor Within [____] hours
3 Transferee provides initial details With notification
4 Supplemental updates Every [____] hours
5 Transferor notifies affected consumers Most expedient time, without unreasonable delay
6 Transferor notifies CA AG (if 500+) Concurrent with consumer notice

10.2 Breach Response Checklist:

☐ Breach detected and contained
☐ Transferor notified within required timeframe
☐ Scope and affected categories identified
☐ SPI / financial data involvement assessed
☐ Law enforcement notification evaluated
☐ Consumer notification drafted (per Cal. Civ. Code 1798.82)
☐ AG notification prepared (if 500+ CA residents)
☐ Credit monitoring/identity protection arranged (if applicable)
☐ Root cause analysis initiated
☐ Remediation plan developed

10.3 Private Right of Action Exposure (Cal. Civ. Code 1798.150). Statutory damages: $100-$750 per consumer per incident for unauthorized access/exfiltration/theft/disclosure of nonencrypted and nonredacted PI due to failure to maintain reasonable security.

10.4 Indemnification. Transferee indemnifies Transferor for breach-related costs attributable to Transferee's security failures.


ARTICLE XI: DATA RETENTION AND DELETION

11.1 Retention Schedule:

Data Category Retention Period Legal Basis Deletion Method
[________________________________] [________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________] [________________________________]
[________________________________] [________________________________] [________________________________] [________________________________]

11.2 Deletion Process Checklist:

☐ Return/deletion election received from Transferor
☐ Primary data stores purged
☐ Backup systems identified
☐ Backup deletion scheduled (within [____] months)
☐ Subprocessors notified of deletion requirement
☐ Deletion certification prepared
☐ Certification delivered to Transferor (within [____] days)

11.3 Return. PI provided in structured, machine-readable format within [____] days.

11.4 Legal Hold. Retention permitted if legally required; Transferor notified; minimum data retained; protections continue.


ARTICLE XII: AUDIT AND MONITORING

12.1 Monitoring Schedule (11 CCR 7051(b) for Contractors):

Monitoring Activity Frequency Last Conducted Next Due
Automated compliance scan Quarterly [__/__/____] [__/__/____]
Manual policy review Annually [__/__/____] [__/__/____]
Technical security assessment Annually [__/__/____] [__/__/____]
Subprocessor audit Annually [__/__/____] [__/__/____]
Cybersecurity audit (CPPA regs) Annually (eff. 2026) [__/__/____] [__/__/____]

12.2 Evidence-Based Materials. SOC 2 Type II; ISO 27001; penetration test summary; security questionnaire; PIA documentation; training records.

12.3 On-Site Audit. [____] per year; [____] days notice; limited scope; NDA required; Transferor bears cost unless material non-compliance found.

12.4 CPPA Cooperation. Transferee cooperates with CPPA investigations and enforcement actions.

12.5 Remediation. Non-compliance remediated within [____] days.


ARTICLE XIII: CROSS-BORDER PROVISIONS

13.1 Interstate. CA law applies to CA consumer PI regardless of processing location.

13.2 International. Transfer mechanisms per Article III, Section 3.3; TIA required.

13.3 Data Localization: ☐ US only ☐ US + EEA/UK ☐ Specific: [________________________________] ☐ No restriction

13.4 Change Notice: [____] days prior to relocation.


ARTICLE XIV: LIABILITY AND INDEMNIFICATION

14.1 Mutual indemnification for breaches of this Addendum.

14.2 Transferee Special Indemnification:

(a) CPPA/AG fines from Transferee non-compliance;
(b) Cal. Civ. Code 1798.150 claims from security failures;
(c) Consumer notification and credit monitoring costs;
(d) CPPA investigation response costs.

14.3 Penalties: Up to $2,500/violation; $7,500/intentional violation or minor's PI; statutory damages $100-$750/consumer/incident.

14.4 Uncapped Liability: Unauthorized Sale/Sharing; willful misconduct; breaches of Article VI.


ARTICLE XV: TERM AND TERMINATION

15.1 Term. Coterminous with Agreement.

15.2 Breach Termination. Cure period: [____] days (immediate if incurable).

15.3 Inability Termination. Immediate upon Section 6.8 notice.

15.4 Survival. Articles I, VI, VII, VIII, X, XI, XII, XIV survive.


ARTICLE XVI: EXECUTION

TRANSFEROR (BUSINESS):

Signature: [________________________________]
Printed Name: [________________________________]
Title: [________________________________]
Organization: [________________________________]
Date: [__/__/____]

TRANSFEREE (SERVICE PROVIDER / CONTRACTOR):

Signature: [________________________________]
Printed Name: [________________________________]
Title: [________________________________]
Organization: [________________________________]
Date: [__/__/____]


EXHIBIT A: RISK ASSESSMENT SUMMARY

Factor Rating Notes
Security adequacy ☐ Low ☐ Med ☐ High [________________________________]
Consumer rights capability ☐ Low ☐ Med ☐ High [________________________________]
Subprocessor risk ☐ Low ☐ Med ☐ High [________________________________]
1798.150 exposure ☐ Low ☐ Med ☐ High [________________________________]
CPPA enforcement risk ☐ Low ☐ Med ☐ High [________________________________]
Data minimization ☐ Low ☐ Med ☐ High [________________________________]

Overall: ☐ Proceed ☐ Proceed with supplementary measures ☐ Do not proceed


EXHIBIT B: TECHNICAL MEASURES VERIFICATION

Control Implemented Verified By Date
TLS 1.2+ transit encryption ☐ Yes ☐ No [________________________________] [__/__/____]
AES-256 at-rest encryption ☐ Yes ☐ No [________________________________] [__/__/____]
RBAC ☐ Yes ☐ No [________________________________] [__/__/____]
MFA ☐ Yes ☐ No [________________________________] [__/__/____]
DLP ☐ Yes ☐ No [________________________________] [__/__/____]
SIEM ☐ Yes ☐ No [________________________________] [__/__/____]
Vulnerability scanning ☐ Yes ☐ No [________________________________] [__/__/____]
Pen testing ☐ Yes ☐ No [________________________________] [__/__/____]
Incident response plan ☐ Yes ☐ No [________________________________] [__/__/____]
SOC 2 Type II ☐ Yes ☐ No Expiry: [__/__/____]
ISO 27001 ☐ Yes ☐ No Expiry: [__/__/____]

EXHIBIT C: DATA INVENTORY

# Data Element Category Sensitive Source Purpose Retention Deletion Method
1 [________________________________] [____] [________] [________________________________] [________] [________________________________]
2 [________________________________] [____] [________] [________________________________] [________] [________________________________]
3 [________________________________] [____] [________] [________________________________] [________] [________________________________]
4 [________________________________] [____] [________] [________________________________] [________] [________________________________]
5 [________________________________] [____] [________] [________________________________] [________] [________________________________]

SOURCES AND REFERENCES

Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.
AI Legal Assistant
Ezel AI
Hi! Need help customizing this document? I can tailor every section to your specific case in minutes.

Insert Image

Insert Table

Watch Ezel in action (sample case)

All changes saved
Save
Export
Export as DOCX
Export as PDF
Generating PDF...
dpa_short_form_transfer_addendum_ca.pdf
Ready to export as PDF or Word
AI is editing...
Chat
Review

Customize this document with Ezel

  • Deep Legal Knowledge
    Understands case law, statutes, and legal doctrine specific to California.
  • Court-Ready Formatting
    Proper captions, certificates of service, and local rule compliance.
  • AI-Powered Editing on Your Timeline
    Edit as many times as you need. Tailor every section to your specific case.
  • Export as PDF & Word
    Download your finished document in professional PDF or DOCX format, ready to file or send.
Secure checkout via Stripe
Need to customize this document?

About This Template

A contract is a written record of what two or more parties agreed to and what happens if someone does not follow through. Clear language, defined terms, and clean signature blocks keep disputes small and enforceable. The most common mistakes in contracts come from vague promises, missing details about timing or payment, and skipping standard protective clauses like governing law and dispute resolution.

Important Notice

This template is provided for informational purposes. It is not legal advice. We recommend having an attorney review any legal document before signing, especially for high-value or complex matters.

Last updated: March 2026