Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Assignment Agreement
1. Parties: Identification of the Assignor and Assignee, including full legal names and registration details
2. Background: Context of the security assignment, including reference to any underlying obligations or agreements
3. Definitions: Definitions of key terms used throughout the agreement
4. Security Assignment: Core provision establishing the assignment and creation of security interest
5. Scope of Assignment: Detailed description of the assets being assigned as security
6. Representations and Warranties: Assignor's declarations regarding ownership, authority, and condition of assigned assets
7. Perfection Requirements: Steps required to perfect the security interest under Danish law
8. Assignor's Obligations: Ongoing obligations of the Assignor regarding the assigned assets
9. Events of Default: Circumstances constituting default under the agreement
10. Enforcement: Rights and procedures for enforcing the security interest
11. Governing Law and Jurisdiction: Confirmation of Danish law governance and jurisdiction
12. Notices: Communication procedures between parties
13. Execution: Signature blocks and execution requirements
1. Further Assurance: Additional actions parties may need to take to perfect or maintain the security - include when complex assets are involved
2. Security Asset Management: Provisions regarding management and maintenance of secured assets - include when ongoing asset management is required
3. Insurance: Requirements for insurance of assigned assets - include when physical assets are involved
4. Tax Provisions: Specific tax-related provisions - include when tax implications are significant
5. Assignment and Transfer: Rights to assign the agreement - include when transferability is important
6. Costs and Expenses: Allocation of costs - include when significant costs are anticipated
7. Priority Arrangements: Provisions regarding ranking of security - include when multiple security interests exist
1. Schedule 1 - Description of Assigned Assets: Detailed list and description of all assets subject to the security assignment
2. Schedule 2 - Perfection Requirements: Specific steps and requirements for perfecting the security interest
3. Schedule 3 - Form of Notice: Template notices required for perfection (e.g., notices to account debtors)
4. Schedule 4 - Existing Security Interests: List of any existing security interests affecting the assigned assets
5. Schedule 5 - Powers of Attorney: Forms of powers of attorney required for perfection or enforcement
6. Appendix A - Related Agreements: Copies or details of related agreements referenced in the main agreement
7. Appendix B - Corporate Authorizations: Copies of relevant corporate authorizations and board resolutions
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.