Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names, registration numbers, and registered addresses
2. Background: Context of the agreement, including brief description of the client's security needs and the provider's qualifications and licenses
3. Definitions: Definitions of key terms used throughout the agreement, including technical security terms and contract-specific terminology
4. Services: Detailed description of the security services to be provided, including scope, locations, and hours of operation
5. Term and Commencement: Duration of the agreement, including start date, initial term, and renewal provisions
6. Provider Obligations: Key responsibilities of the security company, including licensing, training, uniforms, equipment, and quality standards
7. Client Obligations: Client's responsibilities, including access, facilities, information provision, and cooperation requirements
8. Personnel: Requirements for security staff, including qualifications, vetting, training, and conduct standards
9. Payment Terms: Fee structure, payment schedule, expenses, and review mechanisms
10. Insurance and Liability: Insurance requirements, limitation of liability, and indemnification provisions
11. Confidentiality and Data Protection: Obligations regarding confidential information and compliance with GDPR and Data Protection Act
12. Health and Safety: Health and safety requirements and compliance with relevant legislation
13. Termination: Grounds for termination, notice periods, and consequences of termination
14. General Provisions: Standard legal provisions including governing law, notices, force majeure, and dispute resolution
1. Emergency Response Procedures: Specific procedures for emergency situations - include when the contract covers emergency response services
2. Key Performance Indicators: Detailed performance metrics and reporting requirements - include when specific service levels are crucial
3. Equipment and Technology: Specifications for security equipment and technology - include when the contract includes provision of security systems
4. Subcontracting: Terms governing use of subcontractors - include when subcontracting may be needed
5. Training Requirements: Specific training standards and programs - include for specialized security services
6. Intellectual Property: IP rights and licenses - include when proprietary security systems or technology are involved
7. Change Control: Procedures for changing service requirements - include for long-term or complex contracts
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, including locations, hours, and specific duties
2. Schedule 2 - Fee Schedule: Detailed pricing structure, including base fees, additional services, and expense categories
3. Schedule 3 - Key Personnel: Details of key security staff and management contacts
4. Schedule 4 - Equipment Inventory: List of security equipment to be used or provided
5. Schedule 5 - Service Level Agreement: Specific performance metrics and service level requirements
6. Schedule 6 - Emergency Procedures: Detailed emergency response protocols and contact information
7. Appendix A - Required Licenses and Certifications: Copies of relevant security licenses and certifications
8. Appendix B - Insurance Certificates: Copies of required insurance policies and certificates
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
