Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Employment Contract
"I need a Security Employment Contract for hiring an armed security supervisor to manage a team of 15 guards at our shopping center location, with the role starting March 1, 2025, including specific clauses for firearm handling and team management responsibilities."
1. Parties: Identification of the employer and employee, including relevant license numbers and contact details
2. Background: Context of the employment relationship and acknowledgment of security industry requirements
3. Definitions: Key terms used throughout the contract, including industry-specific terminology
4. Term of Employment: Employment status (permanent/casual), start date, and probationary period details
5. Role and Duties: Position description, responsibilities, and security-specific obligations
6. Licensing and Compliance: Requirements to maintain necessary security licenses and comply with industry regulations
7. Hours of Work: Standard hours, shifts, roster arrangements, and overtime provisions
8. Remuneration: Base salary, allowances, penalty rates, and payment arrangements
9. Leave Entitlements: Annual, personal, long service and other leave entitlements
10. Work Health and Safety: Safety obligations, incident reporting, and risk management procedures
11. Confidentiality: Obligations regarding sensitive information, client data, and security protocols
12. Company Property: Requirements for handling uniforms, equipment, access cards, and other security assets
13. Termination: Notice periods, grounds for termination, and return of company property
14. Post-Employment Obligations: Ongoing confidentiality requirements and return of security credentials
1. Location and Mobility: Include when the role requires work at multiple sites or potential relocation
2. Training Requirements: Include when specific security training or certifications are required for the role
3. Vehicle Use: Include when the role involves operating company vehicles for security patrols
4. Surveillance Operations: Include when the role involves operating surveillance equipment
5. Client Interaction Protocols: Include for roles with significant client-facing responsibilities
6. Firearm Requirements: Include for armed security positions only
7. International Travel: Include for roles involving international security operations
8. Emergency Response Duties: Include for roles involving emergency or crisis response responsibilities
1. Schedule 1 - Position Description: Detailed outline of role responsibilities and performance expectations
2. Schedule 2 - Remuneration Details: Breakdown of salary package, allowances, and benefits
3. Schedule 3 - Site-Specific Requirements: Security protocols and requirements for specific work locations
4. Schedule 4 - Equipment List: Inventory of security equipment provided and maintenance requirements
5. Schedule 5 - Company Policies: Key workplace policies including security protocols and procedures
6. Appendix A - Security License Requirements: Current licensing requirements and maintenance obligations
7. Appendix B - Training Matrix: Required qualifications and ongoing training requirements
8. Appendix C - Incident Reporting Procedures: Forms and procedures for security incident reporting
Authors
Security Services
Private Security
Corporate Security
Retail
Banking and Financial Services
Healthcare
Education
Government
Mining and Resources
Transport and Logistics
Entertainment and Events
Commercial Property
Critical Infrastructure
Manufacturing
Hospitality
Human Resources
Security Operations
Risk Management
Compliance
Legal
Operations
Training and Development
Asset Protection
Emergency Response
Control Room Operations
Facilities Management
Security Officer
Security Guard
Security Supervisor
Security Manager
Security Director
Control Room Operator
Security Systems Specialist
Mobile Patrol Officer
Armed Guard
Security Consultant
Site Security Manager
Loss Prevention Officer
Security Operations Manager
Security Coordinator
Security Analyst
Security Training Officer
Emergency Response Officer
Asset Protection Specialist
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.