¶¶Òõ¶ÌÊÓÆµ

Security Employment Contract Template for Australia

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Security Employment Contract

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Security Employment Contract

"I need a Security Employment Contract for hiring an armed security supervisor to manage a team of 15 guards at our shopping center location, with the role starting March 1, 2025, including specific clauses for firearm handling and team management responsibilities."

Document background
The Security Employment Contract is essential for Australian organizations employing security personnel, ensuring compliance with both general employment law and specific security industry regulations. This contract should be used when engaging security staff in any capacity, whether for general security duties, specialized security operations, or security management roles. It incorporates requirements from the Security Industry Act, Fair Work Act, and relevant state legislation, while addressing industry-specific matters such as licensing, equipment handling, and confidentiality protocols. The document is particularly important given the regulated nature of the security industry in Australia and the need to clearly define roles, responsibilities, and compliance obligations for security personnel.
Suggested Sections

1. Parties: Identification of the employer and employee, including relevant license numbers and contact details

2. Background: Context of the employment relationship and acknowledgment of security industry requirements

3. Definitions: Key terms used throughout the contract, including industry-specific terminology

4. Term of Employment: Employment status (permanent/casual), start date, and probationary period details

5. Role and Duties: Position description, responsibilities, and security-specific obligations

6. Licensing and Compliance: Requirements to maintain necessary security licenses and comply with industry regulations

7. Hours of Work: Standard hours, shifts, roster arrangements, and overtime provisions

8. Remuneration: Base salary, allowances, penalty rates, and payment arrangements

9. Leave Entitlements: Annual, personal, long service and other leave entitlements

10. Work Health and Safety: Safety obligations, incident reporting, and risk management procedures

11. Confidentiality: Obligations regarding sensitive information, client data, and security protocols

12. Company Property: Requirements for handling uniforms, equipment, access cards, and other security assets

13. Termination: Notice periods, grounds for termination, and return of company property

14. Post-Employment Obligations: Ongoing confidentiality requirements and return of security credentials

Optional Sections

1. Location and Mobility: Include when the role requires work at multiple sites or potential relocation

2. Training Requirements: Include when specific security training or certifications are required for the role

3. Vehicle Use: Include when the role involves operating company vehicles for security patrols

4. Surveillance Operations: Include when the role involves operating surveillance equipment

5. Client Interaction Protocols: Include for roles with significant client-facing responsibilities

6. Firearm Requirements: Include for armed security positions only

7. International Travel: Include for roles involving international security operations

8. Emergency Response Duties: Include for roles involving emergency or crisis response responsibilities

Suggested Schedules

1. Schedule 1 - Position Description: Detailed outline of role responsibilities and performance expectations

2. Schedule 2 - Remuneration Details: Breakdown of salary package, allowances, and benefits

3. Schedule 3 - Site-Specific Requirements: Security protocols and requirements for specific work locations

4. Schedule 4 - Equipment List: Inventory of security equipment provided and maintenance requirements

5. Schedule 5 - Company Policies: Key workplace policies including security protocols and procedures

6. Appendix A - Security License Requirements: Current licensing requirements and maintenance obligations

7. Appendix B - Training Matrix: Required qualifications and ongoing training requirements

8. Appendix C - Incident Reporting Procedures: Forms and procedures for security incident reporting

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions


















































Clauses


































Relevant Industries

Security Services

Private Security

Corporate Security

Retail

Banking and Financial Services

Healthcare

Education

Government

Mining and Resources

Transport and Logistics

Entertainment and Events

Commercial Property

Critical Infrastructure

Manufacturing

Hospitality

Relevant Teams

Human Resources

Security Operations

Risk Management

Compliance

Legal

Operations

Training and Development

Asset Protection

Emergency Response

Control Room Operations

Facilities Management

Relevant Roles

Security Officer

Security Guard

Security Supervisor

Security Manager

Security Director

Control Room Operator

Security Systems Specialist

Mobile Patrol Officer

Armed Guard

Security Consultant

Site Security Manager

Loss Prevention Officer

Security Operations Manager

Security Coordinator

Security Analyst

Security Training Officer

Emergency Response Officer

Asset Protection Specialist

Industries










Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.