Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
- Overview
Practical Steps And Common Mistakes
- Step 1: Map The Personal Information Involved
- Step 2: Define Permitted Uses Clearly
- Step 3: Set Out Security Obligations In Plain Language
- Step 4: Deal With Privacy Breaches Properly
- Step 5: Control Subcontracting And Overseas Transfers
- Step 6: Set Retention, Return, And Deletion Rules
- Step 7: Align The Schedule With The Rest Of Your Documents
- Common Mistakes Founders Make
- Key Takeaways
If your business shares customer, staff, or supplier data with a software provider, marketing platform, payroll service, or outsourced support team, a data processing schedule can stop a lot of problems before they start. Many New Zealand businesses sign a master services agreement and assume privacy is already covered, copy overseas clauses that do not fit local law, or leave key points vague, such as who must notify whom after a data incident. That is where founders often get caught.
A good data processing schedule sets out exactly how personal information will be handled, what each party is allowed to do with it, and what happens if something goes wrong. It matters whether you are selling online, using cloud tools, outsourcing admin, or contracting with enterprise customers who expect privacy terms before they sign. This guide explains what a data processing schedule is, when you are likely to need one, what it should include for a New Zealand business, and the practical mistakes to avoid before you sign a contract.
Overview
A data processing schedule is usually an attachment or schedule to a broader commercial agreement. It records the rules for handling personal information where one party processes data for another, and it helps both sides line up their contract with the Privacy Act 2020 and day to day business reality.
- Who is disclosing personal information and who is processing it
- What types of personal information are involved, and for what business purposes
- Whether the processor can use subcontractors or overseas service providers
- What security standards, access controls, and retention periods apply
- Who handles privacy requests, complaints, and breach notifications
- What happens when the services end, including return or deletion of data
- Whether the schedule matches your privacy policy, customer terms, and internal practices
What Data Processing Schedule Means For New Zealand Businesses
A data processing schedule is the contract document that spells out the privacy and data handling rules between businesses. In practical terms, it is where you define who can touch the data, why they can use it, and what limits apply.
For many startups and SMEs, this issue appears when a customer asks for a vendor contract, a software platform sends over standard terms, or an enterprise procurement team requires privacy wording before onboarding you. You may not call it a data processing schedule every time. It could also be labelled a data processing addendum, privacy schedule, or information handling schedule. The label matters less than the content.
Under New Zealand law, personal information is broadly any information about an identifiable individual. That can include:
- Customer names, email addresses, phone numbers, and delivery details
- Employee payroll records, leave information, and emergency contacts
- User account details, IP addresses, and support tickets where a person can be identified
- Health or wellbeing information, if your business works in a sensitive sector
- Supplier contact details where an individual is named
If your business collects that information and another provider handles it on your behalf, your contract should say what the provider can and cannot do. If you are the provider handling information for your client, the schedule should also protect you by making the scope of your role clear.
Why the Schedule Matters Commercially
The main risk is not just regulatory. A vague privacy clause can create customer disputes, delay sales, and leave your business exposed after a security incident.
Here are the commercial reasons founders care about this document:
- Enterprise customers often will not sign without clear data handling terms
- Investors and due diligence reviewers look for privacy risk in contracts
- Security incidents become harder to manage when responsibilities are unclear
- Overseas vendors may try to shift too much risk onto a small New Zealand business
- Your public privacy statements can conflict with your actual supplier arrangements if the contract is silent
How It Fits With The Privacy Act 2020
The Privacy Act 2020 does not say every business must have a document called a data processing schedule. What it does require is that businesses handle personal information lawfully, keep it secure, use it for proper purposes, and be open about what they are doing.
A schedule helps turn those legal obligations into practical contract terms. It can support compliance with core privacy expectations, such as:
- Collecting and using personal information for identified purposes
- Taking reasonable safeguards against loss, misuse, and unauthorised access
- Allowing correction or access requests to be handled properly
- Not retaining information longer than necessary
- Managing disclosure outside New Zealand with proper safeguards where relevant
- Responding quickly where a privacy breach may have caused, or is likely to cause, serious harm
This does not mean a schedule replaces internal privacy processes. Your business still needs working systems, staff training, sensible access controls, and accurate external statements. The contract is only one part of the privacy picture.
Who Is The Controller And Who Is The Processor?
New Zealand law does not always use overseas terminology in the same way, but the commercial distinction is still useful. One party usually decides why the personal information is collected and what it is used for. The other party handles it to provide a service.
For example, if you run an online retail business and engage a customer support platform, you will usually decide why customer data is collected. The provider processes that data so it can deliver support services to you. Your schedule should reflect that allocation.
That distinction gets messy when a service provider wants to use the information for its own analytics, product improvement, or marketing. This is where founders should slow down before they sign a contract. If the provider wants wider rights, the schedule should say so clearly and you need to decide whether that fits your privacy promises and risk appetite.
When This Issue Comes Up
A data processing schedule usually comes up at contract stage, but the legal risk often starts earlier. If you are choosing systems, outsourcing work, or preparing to onboard a major client, this is the point to get the privacy position straight before you spend money on setup.
When You Buy Software Or Cloud Services
SaaS tools commonly process personal information for email marketing, CRM, payroll, support, booking systems, analytics, and document storage. Many vendors provide standard global terms, but those terms may be broad, difficult to negotiate, or written around foreign privacy laws.
Common pressure points include:
- Very wide rights to use your data for the vendor’s internal purposes
- Weak commitments on breach notification timing
- Automatic approval for overseas sub-processors without much visibility
- Deletion terms that allow long retention after termination
- Indemnities or liability caps that do not reflect the real privacy risk
When A Client Sends You Procurement Terms
If your business provides tech, admin, marketing, HR support, or other business services, your client may send a data processing schedule for you to sign. This is common where you handle customer records, employee information, or platform user data.
The schedule may be reasonable, but founders often accept clauses that are hard to comply with in practice. For example, a client may require immediate breach reporting, prohibit all subcontractors, or require deletion of backups in a way your systems do not support. The contract should match how your business actually operates.
When You Outsource Operational Functions
Outsourcing payroll, customer support, virtual assistance, fulfilment, bookkeeping, or IT management can involve steady flows of personal information. Even if the provider is trusted and local, you still need written rules on access, security, and use.
This is especially relevant where outsourced staff can see:
- Employee records
- Customer account histories
- Complaint files
- Sensitive support messages
- Payment-adjacent information
When Information Goes Overseas
Cross border data flows are common even for small New Zealand businesses. A local company can still be using overseas servers, overseas support teams, or global sub-processors without realising it.
If personal information will be disclosed outside New Zealand, you need to understand where it is going, who will access it, and what contractual protection applies. The answer may affect your privacy policy, any privacy collection notice you give customers, your customer commitments, and your risk review before you sign.
When You Are Raising Capital Or Selling The Business
Privacy documentation gets more attention during due diligence. If your contracts do not clearly deal with data handling, investors or buyers may treat that as a gap in governance.
A missing or poor schedule will not automatically kill a deal, but it can lead to extra questions, remediation work, and price or timing pressure at the worst possible moment.
Practical Steps And Common Mistakes
A useful data processing schedule is specific, workable, and consistent with your business model. The best approach is to map what data moves through your business first, then draft the schedule around those real workflows.
Step 1: Map The Personal Information Involved
You need a clear picture of what information is actually being processed. A generic phrase like “customer data” is often too vague.
Your contract should identify:
- The categories of individuals involved, such as customers, employees, contractors, or end users
- The categories of information involved, such as contact details, account records, support logs, or payroll information
- The purposes for which the information is processed
- Whether any sensitive or higher risk information is included
- The expected duration of processing
This helps both parties assess security expectations, internal access needs, and what should happen at the end of the relationship.
Step 2: Define Permitted Uses Clearly
The schedule should say the processor may only use personal information for agreed service purposes, unless the parties clearly agree otherwise. This is one of the most important protections in the document.
Problems usually arise where a service provider wants to use data for:
- Product development
- Benchmarking
- Internal analytics
- Marketing to the customer’s users
- Training AI or automated systems
Those uses are not always inappropriate, but they should not be hidden in broad boilerplate. If your business is the customer, check whether those rights fit what you have told individuals in your privacy policy. If your business is the service provider, make sure your rights are realistic and transparent.
Step 3: Set Out Security Obligations In Plain Language
You do not need pages of technical jargon to create a useful security clause. You do need enough detail to show what standard is expected.
A schedule often covers matters such as:
- Access controls and least privilege access
- Password and authentication requirements
- Encryption in transit and at rest, where appropriate
- Staff confidentiality obligations
- Logging and monitoring
- Secure disposal or deletion processes
- Incident response procedures
If you are a smaller business, avoid promising security measures you cannot actually maintain. Overpromising in the contract is a common mistake. It creates legal risk even before any privacy issue occurs.
Step 4: Deal With Privacy Breaches Properly
The schedule should make breach reporting practical and fast. Everyone wants prompt notice, but the exact wording matters.
A strong clause usually addresses:
- What counts as a security incident or privacy breach for contractual purposes
- How quickly the processor must notify the customer
- What information must be included in the notification
- Who leads external communications
- Who decides whether individuals or the Privacy Commissioner need to be notified
- What cooperation is required during investigation and remediation
New Zealand businesses should be careful with absolute promises such as “immediate notice” or “notice within one hour” unless that is operationally realistic. A clause that nobody can comply with is not a good clause. It also helps to have a workable data breach response plan behind the contract.
Step 5: Control Subcontracting And Overseas Transfers
If the processor uses third party providers, the schedule should say whether that is allowed and on what conditions. This is where hidden risk often sits.
Before you sign, check:
- Whether subcontractors need prior approval or only prior notice
- Whether the processor remains fully responsible for sub-processors
- Where data will be stored or accessed
- Whether overseas disclosures require additional contractual safeguards
- Whether the current vendor list is complete and current
For many founders, this is the first time they realise their provider stack includes multiple overseas providers. That is not necessarily a deal breaker, but it should be visible and assessed.
Step 6: Set Retention, Return, And Deletion Rules
When the contract ends, the data should not sit in limbo. The schedule should say what happens to personal information, backups, and copies held by service providers.
Typical options include:
- Return of the data to the customer in an accessible format
- Secure deletion after a defined transition period
- Limited retention where required by law or genuine operational necessity
- Special treatment for backup archives, if immediate deletion is not possible
This point matters before you migrate systems or change vendors. If the contract is silent, exits can become messy and expensive.
Step 7: Align The Schedule With The Rest Of Your Documents
A data processing schedule should not sit on its own. It needs to match your other legal and operational documents.
Review it alongside:
- Your main services agreement or software agreement
- Your customer terms and conditions
- Your privacy policy
- Your internal privacy and security processes
- Your employment contracts or contractor confidentiality obligations
- Your incident response plan
This is where businesses often find contradictions. For example, the contract may promise deletion within 7 days, while your operations team keeps standard backups for 90 days. Or your privacy policy may say data stays in New Zealand, while your vendor schedule reveals overseas hosting.
Common Mistakes Founders Make
Most issues come from haste, copied wording, or poor visibility of actual data flows. Here are the mistakes that come up most often:
- Signing global boilerplate without checking whether it fits New Zealand privacy obligations
- Using broad definitions that accidentally permit more data use than intended
- Failing to identify all sub-processors and overseas disclosures
- Promising technical controls the business does not actually have
- Leaving breach response obligations vague
- Ignoring end of contract deletion and transition steps
- Assuming the privacy policy alone solves the problem
- Letting sales teams agree to customer privacy terms without legal review or contract review
If your business is growing quickly, put a repeatable review process in place before you sign customer or supplier agreements. That will save time as procurement demands become more common.
FAQs
Do all New Zealand businesses need a data processing schedule?
No. But if another business processes personal information for you, or you process it for a client, a written schedule is often the safest and most practical way to set the rules.
Is a privacy policy the same as a data processing schedule?
No. A privacy policy explains to individuals how your business handles their personal information. A data processing schedule is a contract between businesses that allocates rights, restrictions, and responsibilities around processing.
Can I just use a supplier’s overseas template?
Sometimes, but only after checking whether it fits your actual services, data flows, and New Zealand legal context. Overseas templates often include assumptions about foreign law, broad data usage rights, or operational promises that do not reflect your business.
What if our provider stores data outside New Zealand?
You should identify where the data goes, who can access it, and what protections apply. Cross border handling is common, but it should be contractually documented and consistent with your privacy statements and risk settings.
Who should draft or review the schedule?
That depends on the risk and complexity of the arrangement. For important supplier deals, enterprise customer contracts, or higher risk personal information, legal review is usually worthwhile before you sign.
Key Takeaways
- A data processing schedule sets the contract rules for how one business handles personal information for another.
- It matters when you use software providers, outsource functions, handle client data, or send information overseas.
- A good schedule should cover permitted use, security, subcontractors, breach response, retention, and end of contract deletion or return.
- The document should match your privacy policy, commercial agreement, and actual operational practices.
- Founders often get into trouble by signing broad overseas boilerplate or agreeing to obligations the business cannot meet in practice.
- Legal review is especially useful before you sign major supplier terms, enterprise customer procurement documents, or contracts involving sensitive information.
If your business is dealing with data processing schedule and wants help with privacy clauses, supplier contracts, customer procurement terms, and data handling obligations, you can reach us on 0800 002 184 or team@sprintlaw.co.nz for a free, no-obligations chat.





