Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names, registration details, and addresses
2. Background: Context of the agreement and brief description of the client's security needs and provider's qualifications
3. Definitions: Definitions of key terms used throughout the agreement, including technical security terminology
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific security measures
5. Service Provider Obligations: Key responsibilities of the security provider, including licensing, personnel qualifications, and compliance requirements
6. Client Obligations: Client's responsibilities, including access provision, information sharing, and cooperation requirements
7. Personnel Requirements: Specifications for security staff, including qualifications, training, and vetting requirements as per German regulations
8. Data Protection and Confidentiality: GDPR compliance measures and confidentiality obligations
9. Liability and Insurance: Liability limitations, indemnification provisions, and required insurance coverage
10. Fees and Payment Terms: Service fees, payment schedule, and terms including compliance with German minimum wage requirements
11. Term and Termination: Contract duration, renewal terms, and termination conditions
12. Force Majeure: Provisions for unforeseen circumstances and their impact on service delivery
13. Governing Law and Jurisdiction: Confirmation of German law application and jurisdiction for disputes
14. Notices: Communication procedures and contact details for official notices
15. Execution: Signature blocks and execution requirements
1. Armed Security Services: Include when armed security personnel are required, addressing Weapons Act compliance
2. Electronic Surveillance: Include for CCTV and electronic monitoring services, with specific data protection provisions
3. Key Holding Services: Include when key holding and alarm response services are part of the scope
4. Special Events Security: Include for temporary or event-specific security services
5. Vehicle Patrol Services: Include when mobile patrol services are part of the scope
6. Emergency Response Procedures: Include for high-risk locations requiring specific emergency protocols
7. Subcontracting: Include if the security provider may need to subcontract certain services
8. Performance Metrics: Include when specific KPIs and performance measurements are required
9. Training Requirements: Include when specific client-required training is needed beyond standard qualifications
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, including post orders and specific duties
2. Schedule 2 - Fee Schedule: Detailed pricing structure, including regular rates and special rates for additional services
3. Schedule 3 - Site Details: Specific information about each secured location, including maps and access points
4. Schedule 4 - Equipment Inventory: List of security equipment provided or maintained by either party
5. Schedule 5 - Key Personnel: Details of key security staff and management contacts
6. Schedule 6 - Operating Procedures: Standard operating procedures and post orders
7. Schedule 7 - Compliance Certificates: Copies of relevant licenses, certifications, and insurance certificates
8. Schedule 8 - Emergency Procedures: Detailed emergency response protocols and evacuation procedures
9. Appendix A - Incident Report Templates: Standard forms for security incident reporting
10. Appendix B - Performance Review Forms: Templates for service quality assessment and performance reviews
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
