Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the security service provider and the client, including full legal names, registration numbers, and registered addresses
2. Background: Context of the agreement, brief description of the client's security needs and the provider's services
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. Scope of Services: Comprehensive description of security services to be provided, including locations, hours, and specific duties
5. Term and Commencement: Duration of the agreement and start date of services
6. Provider's Obligations: Detailed responsibilities of the security service provider, including licensing, training, and service standards
7. Client's Obligations: Responsibilities of the client, including access, facilities, and information provision
8. Personnel Requirements: Specifications for security personnel, including qualifications, vetting, and conduct requirements
9. Fees and Payment Terms: Detailed fee structure, payment schedule, and invoicing procedures
10. Insurance and Liability: Insurance requirements and allocation of liability between parties
11. Confidentiality: Obligations regarding confidential information and data protection
12. Termination: Conditions and procedures for agreement termination, including notice periods
13. Force Majeure: Provisions for unforeseen circumstances affecting service delivery
14. Governing Law and Jurisdiction: Specification of Maltese law as governing law and jurisdiction for disputes
1. Equipment and Technology: Details of security equipment and technology to be used, include when services involve electronic security systems
2. Key Performance Indicators: Specific performance metrics and reporting requirements, include for large-scale or complex security operations
3. Business Continuity: Procedures for maintaining services during disruptions, include for critical security operations
4. Subcontracting: Terms for engaging subcontractors, include when subcontracting may be necessary
5. Environmental Policy: Environmental requirements and commitments, include for clients with specific environmental concerns
6. Anti-Corruption: Specific anti-corruption and compliance provisions, include for international clients or high-risk operations
7. Data Processing Agreement: Detailed GDPR compliance provisions, include when extensive personal data processing is involved
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, posts, patrol routes, and specific duties
2. Schedule 2 - Fee Schedule: Detailed pricing structure, including regular rates, overtime, and special services
3. Schedule 3 - Key Personnel: Details of key security personnel assigned to the contract
4. Schedule 4 - Equipment Inventory: List of security equipment to be used or provided
5. Schedule 5 - Standard Operating Procedures: Detailed procedures for routine and emergency situations
6. Schedule 6 - Performance Metrics: Specific KPIs and measurement criteria
7. Appendix A - Incident Report Templates: Standard forms for reporting security incidents
8. Appendix B - Emergency Contact List: List of emergency contacts for both parties
9. Appendix C - Site Plans: Relevant site layouts and security positions
Find the exact document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it

.png)