Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Details of the security service provider and the client organization
2. Background: Context of the agreement and brief description of parties' business relationship
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided
5. Term and Termination: Duration of the agreement and conditions for termination
6. Service Provider's Obligations: Responsibilities of the security agency including personnel, training, and compliance requirements
7. Client's Obligations: Responsibilities of the client including access, facilities, and cooperation
8. Personnel Requirements: Qualifications, vetting, and requirements for security staff
9. Fees and Payment Terms: Pricing, payment schedule, and related terms
10. Compliance and Licenses: Regulatory compliance requirements under PSARA and other applicable laws
11. Insurance and Liability: Insurance requirements and allocation of risks
12. Confidentiality: Protection of confidential information and trade secrets
13. Indemnification: Mutual indemnification obligations
14. Force Majeure: Provisions for unforeseen circumstances and acts of God
15. Dispute Resolution: Process for resolving disputes between parties
16. Governing Law: Applicable law and jurisdiction
17. General Provisions: Standard boilerplate clauses including notices, amendments, and assignment
1. Electronic Surveillance: Required when CCTV or electronic monitoring is part of the services
2. Special Events Security: Include when security services for special events are contemplated
3. Cash Management: Required when cash handling or transportation services are included
4. Data Protection: Include when handling sensitive personal or business data
5. Emergency Response Procedures: Required for high-risk facilities or special security requirements
6. Key Performance Indicators: Include when specific performance metrics are to be measured
7. Training Requirements: Required when specialized training or certifications are needed
8. Subcontracting: Include when subcontracting of services may be permitted
1. Schedule A - Service Locations: List and details of all locations where security services will be provided
2. Schedule B - Personnel Deployment Plan: Detailed staffing requirements, shifts, and posting locations
3. Schedule C - Rate Card: Detailed breakdown of charges for different types of services and personnel
4. Schedule D - Standard Operating Procedures: Detailed procedures for regular security operations
5. Schedule E - Equipment and Uniforms: Specifications for security equipment and uniform requirements
6. Schedule F - Reporting Formats: Templates for daily, weekly, and monthly reporting
7. Schedule G - Contact Details: Key personnel contact information for both parties
8. Schedule H - Training Requirements: Detailed training requirements and certification needs
9. Appendix 1 - Compliance Certificates: Copies of PSARA license and other regulatory certifications
10. Appendix 2 - Insurance Certificates: Copies of required insurance policies
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
