Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Contract
1. Parties: Identification of the security service provider and the client, including their legal names, registration numbers, and addresses
2. Background: Context of the security services required and the basis for entering into the agreement
3. Definitions: Definitions of key terms used throughout the contract
4. Scope of Services: Detailed description of security services to be provided, including specific duties, coverage areas, and service hours
5. Term and Termination: Duration of the contract, renewal terms, and conditions for termination
6. Service Provider Obligations: Key responsibilities of the security company, including staffing, training, equipment, and quality standards
7. Client Obligations: Client's responsibilities, including access provision, information sharing, and cooperation requirements
8. Personnel Requirements: Qualifications, certifications, and requirements for security personnel, including compliance with Danish Security Company Act
9. Health and Safety: Safety protocols and compliance with Danish Working Environment Act
10. Fees and Payment Terms: Service fees, payment schedule, and terms in accordance with Danish Payment Act
11. Insurance and Liability: Insurance requirements, liability limitations, and indemnification provisions
12. Data Protection and Confidentiality: GDPR compliance, data handling procedures, and confidentiality obligations
13. Force Majeure: Circumstances excusing performance and related procedures
14. Governing Law and Jurisdiction: Confirmation of Danish law application and jurisdiction for disputes
1. Electronic Surveillance: Include when services involve CCTV or electronic monitoring systems
2. Armed Security Services: Include when armed security personnel are part of the service scope
3. Key Holding Services: Include when key holding and response services are required
4. Special Events Security: Include for contracts covering event security services
5. Cash Handling: Include when services involve cash transportation or handling
6. Subcontracting: Include when the security provider may need to subcontract certain services
7. Performance Metrics: Include when specific KPIs and performance measurement are required
8. Emergency Response Procedures: Include for high-risk locations or specific emergency response requirements
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, locations, and timing
2. Schedule 2 - Fee Schedule: Detailed pricing structure, rates, and payment terms
3. Schedule 3 - Key Personnel: List of key management contacts and their responsibilities
4. Schedule 4 - Equipment Inventory: List of security equipment to be used or provided
5. Schedule 5 - Operating Procedures: Detailed security procedures and protocols
6. Schedule 6 - Reporting Requirements: Templates and schedules for required reports
7. Appendix A - Insurance Certificates: Copies of required insurance policies
8. Appendix B - Licenses and Certifications: Copies of company and personnel licenses/certifications
9. Appendix C - Site Plans: Layout plans of security coverage areas
10. Appendix D - Emergency Procedures: Detailed emergency response protocols
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.