| Starting point | A static addendum with recycled Article 28 wording and generic schedules. | A guided first draft built around the actual service, real roles, real data categories and real transfer route. | Supplier paper or customer paper that already contains live wording, assumptions and negotiation history. |
| Best when | The processing is unusually simple, low risk and genuinely close to the assumptions the template makes. | You need to build the right DPA from zero or replace weak precedent before the deal hardens. | The wording already exists and the real question is what risk, mismatch or leverage point already sits in the paper. |
| Main weakness | It cannot decide whether the supplier is really a processor, whether remote access triggers transfer analysis or whether the schedule is operationally usable. | It still needs human checking where the role split is unclear, the data is high risk or the wider contract pack is heavily negotiated. | It does not build a clean first draft from nothing. It tests what is already on the table. |
| Output | A shell document that usually needs heavy reworking before it reflects the real processing. | An editable first draft with clearer clause logic around schedules, security, sub processors, transfers, audits and exit. | An issue list, risk explanation and likely redline agenda for the wording that already exists. |
| Typical next step | Manual patching, internal guesswork or solicitor redrafting after avoidable time has already been lost. | Internal approval, commercial alignment, negotiation and escalation only where the real exposure justifies it. | Accept, amend, negotiate or escalate if the current paper is structurally wrong or commercially too one sided. |
| Right Vordex route | Useful background only, not the destination. | DPA Generator UK. | Contract Risk Check, with SaaS or service agreement review where the DPA sits inside a wider wrapper. |