Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names, licenses, and registration details
2. Background: Context of the security services requirement and brief overview of the parties' intentions
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided, including locations, timing, and specific duties
5. Term and Termination: Duration of the agreement, renewal terms, and conditions for termination
6. Payment Terms: Fee structure, payment schedule, and related financial terms
7. Security Personnel: Requirements for security staff, including qualifications, training, and compliance with UAE security regulations
8. Equipment and Uniforms: Specifications for security equipment, uniforms, and other materials to be used
9. Performance Standards: Service level agreements, quality metrics, and performance evaluation criteria
10. Compliance and Licensing: Obligations regarding UAE security regulations, permits, and licensing requirements
11. Insurance and Liability: Insurance requirements, liability limitations, and indemnification provisions
12. Confidentiality: Protection of confidential information and trade secrets
13. Force Majeure: Provisions for unforeseen circumstances and force majeure events
14. Governing Law and Jurisdiction: Specification of UAE law application and jurisdiction for dispute resolution
15. General Provisions: Standard contractual provisions including notices, amendments, and assignment rights
1. Electronic Surveillance: Required when CCTV or electronic monitoring services are included in the scope
2. Cash-in-Transit Services: Required when valuable asset transportation services are part of the agreement
3. Event Security: Required for contracts involving temporary or event-specific security services
4. Cybersecurity Services: Required when digital security services are included in the scope
5. Emergency Response: Required when the security service includes emergency response or crisis management
6. Key Holding Services: Required when key management services are part of the agreement
7. Training Requirements: Required when specific training programs or certifications are necessary
8. Subcontracting: Required when security services may be subcontracted to other providers
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, posts, and duty schedules
2. Schedule 2 - Rate Card: Detailed pricing structure including regular rates, overtime, and special services
3. Schedule 3 - Key Performance Indicators: Specific metrics and standards for measuring service performance
4. Schedule 4 - Equipment List: Detailed inventory of security equipment to be used
5. Schedule 5 - Site Plans: Maps and layouts of areas under security coverage
6. Schedule 6 - Standard Operating Procedures: Detailed procedures for regular and emergency situations
7. Appendix A - Required Licenses and Permits: Copies of all necessary UAE security licenses and permits
8. Appendix B - Insurance Certificates: Copies of required insurance policies and certificates
9. Appendix C - Personnel Qualifications: Required qualifications and certifications for security staff
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
