Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Recipient Details: Full name, title, and address of the recipient (security service provider)
2. Reference Line: Contract reference number, date, and title of the original security contract
3. Notice of Termination: Clear statement of intent to terminate the contract, citing the relevant termination clause from the original contract
4. Effective Date: Specific date when the termination becomes effective, considering any notice period requirements
5. Outstanding Obligations: Statement regarding any pending payments, services, or obligations that need to be fulfilled by either party
6. Return of Property: Requirements for returning any equipment, access cards, uniforms, or other company property
7. Confidentiality Reminder: Reminder of ongoing confidentiality obligations post-termination
8. Contact Information: Details of who to contact for transition arrangements and final settlement
9. Signature Block: Proper signature line including name, title, and company details of the sender
1. Reason for Termination: Include when there's a specific breach or cause for termination that needs to be documented
2. Transition Plan: Required when there's a need for detailed handover procedures or transition to a new security provider
3. Final Settlement Terms: Include when there are specific financial settlements or adjustments to be documented
4. Legal Reservations: Include when there's a need to reserve legal rights or address potential disputes
5. Non-Disparagement Clause: Include in sensitive terminations to maintain professional conduct post-termination
6. Reference Provision: Include when agreeing to provide or receive references for security personnel
1. Equipment Inventory: List of all security equipment and property to be returned
2. Outstanding Payments Schedule: Detailed breakdown of any pending payments or financial settlements
3. Handover Checklist: Detailed list of tasks and responsibilities for the transition period
4. Contact List: Key personnel contacts for handover and transition period
Find the document you need
Confidentiality Non Disclosure Agreement
A Hong Kong law-governed confidentiality agreement protecting sensitive information shared between parties during business relationships and negotiations.
Client Risk Assessment Form
A regulatory-compliant risk assessment form for evaluating client profiles in Hong Kong's financial services sector, meeting HKMA and SFC requirements.
Synthetic Letter Of Credit
A Hong Kong law-governed document establishing the terms and conditions for a Synthetic Letter of Credit, combining traditional LC mechanics with synthetic elements.
Ceiling Leakage Complaint Letter
A formal complaint letter under Hong Kong law addressing ceiling leakage issues and requesting remedial action from responsible parties.
Security Contract Termination Letter
A Hong Kong law-governed letter formally terminating a security services contract, addressing notice periods, settlements, and transition arrangements.
Information Security Audit Policy
A policy document outlining information security audit requirements and procedures for organizations in Hong Kong, aligned with PDPO and local regulations.
Security Loan Agreement
A Hong Kong law-governed agreement establishing terms for temporary transfer of securities between parties, including collateral arrangements and regulatory compliance requirements.
Physical Power Purchase Agreement
Hong Kong-governed agreement for physical electricity sale and purchase between generator and offtaker, addressing technical, operational, and commercial terms.
Law Firm Partnership Agreement
A Hong Kong law-governed agreement establishing the partnership structure and operational framework for a law firm, detailing partner rights, obligations, and management arrangements.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
