Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names and registered addresses
2. Background: Context of the agreement and brief description of the security services required
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific duties
5. Term and Termination: Duration of the agreement, renewal terms, and conditions for termination
6. Payment Terms: Fees, payment schedule, invoicing procedures, and any additional costs
7. Service Provider Obligations: Key responsibilities of the security provider, including licensing, training, and quality standards
8. Client Obligations: Responsibilities of the client, including access, facilities, and information provision
9. Personnel Requirements: Qualifications, vetting, and training requirements for security staff
10. Compliance and Licensing: Compliance with Private Security Authority regulations and other applicable laws
11. Insurance and Liability: Insurance requirements, limitation of liability, and indemnification provisions
12. Confidentiality: Protection of confidential information and trade secrets
13. Data Protection: GDPR compliance and data handling procedures
14. General Provisions: Standard legal clauses including governing law, notices, and dispute resolution
1. Emergency Response Procedures: Specific procedures for emergency situations - include when security services involve emergency response
2. Equipment and Technology: Details of security equipment provision and maintenance - include when specific security equipment is part of the service
3. Key Performance Indicators: Specific performance metrics and reporting requirements - include for larger contracts requiring regular performance review
4. Subcontracting: Terms for engaging subcontractors - include when subcontracting may be necessary
5. Special Events Coverage: Provisions for special event security - include when service covers events
6. Force Majeure: Provisions for unforeseen circumstances - include for long-term contracts
7. Non-Compete: Restrictions on competitive activities - include when protecting client relationships is crucial
8. Assignment: Terms for transferring contract rights - include when relevant to client's corporate structure
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, posts, and patrol schedules
2. Schedule 2 - Rate Card: Detailed pricing structure including standard rates and special rates
3. Schedule 3 - Personnel Requirements: Specific qualifications, training requirements, and vetting procedures
4. Schedule 4 - Site Rules and Procedures: Site-specific security protocols and procedures
5. Schedule 5 - Equipment Inventory: List of security equipment provided and maintenance schedules
6. Schedule 6 - Reporting Templates: Standard forms for incident reporting and performance monitoring
7. Appendix A - Emergency Contact List: List of key contacts for both parties including emergency numbers
8. Appendix B - Required Licenses and Certifications: Copies or details of all required security licenses and certifications
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
