Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names and addresses
2. Background: Context of the agreement and brief description of the parties' intentions
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific duties
5. Term and Renewal: Duration of the agreement and conditions for renewal
6. Payment Terms: Fees, payment schedule, invoicing procedures, and payment methods
7. Security Personnel Requirements: Qualifications, licensing, training, and conduct requirements for security staff
8. Equipment and Uniforms: Specifications for security equipment and uniform requirements
9. Standard Operating Procedures: Basic procedures for regular security operations and reporting
10. Compliance with Laws: Commitment to comply with relevant security industry regulations and laws
11. Insurance and Liability: Insurance requirements and allocation of liability between parties
12. Confidentiality: Protection of confidential information and trade secrets
13. Termination: Conditions and procedures for terminating the agreement
14. General Provisions: Standard legal provisions including notices, amendments, and governing law
1. Emergency Response Procedures: Detailed procedures for handling emergency situations - include when specific emergency response protocols are required
2. Technology and Surveillance Systems: Requirements for electronic security systems - include when electronic surveillance is part of the service
3. Special Events Security: Procedures for handling special events - include when occasional event security is required
4. Key Control: Procedures for managing keys and access devices - include when key management is part of the service
5. Vehicle Patrol Services: Requirements for mobile patrol services - include when mobile patrols are required
6. Subcontracting: Terms for engaging subcontractors - include when subcontracting may be necessary
7. Training Requirements: Specific training requirements beyond standard licensing - include when specialized training is needed
8. Performance Metrics: Specific KPIs and performance evaluation criteria - include when detailed performance monitoring is required
1. Schedule A - Service Locations: Detailed list of all locations where security services are to be provided
2. Schedule B - Rate Sheet: Detailed breakdown of all rates, including regular hours, overtime, and special services
3. Schedule C - Post Orders: Specific instructions for each security post or position
4. Schedule D - Required Qualifications: Detailed list of required certifications, training, and experience for security personnel
5. Schedule E - Equipment Inventory: List of all equipment to be provided and maintained
6. Schedule F - Reporting Forms: Templates for all required security reports and logs
7. Appendix 1 - Emergency Contact List: List of emergency contacts and escalation procedures
8. Appendix 2 - Security Policies: Client's specific security policies and procedures
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
