Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Service Level Agreement Security Company
1. Parties: Identification of the security service provider and the client
2. Background: Context of the agreement and general purpose of the security services
3. Definitions: Definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided
5. Service Levels: Specific performance metrics, response times, and service standards
6. Provider Obligations: Key responsibilities and duties of the security company
7. Client Obligations: Responsibilities and duties of the client
8. Personnel Requirements: Qualifications, training, and vetting requirements for security staff
9. Operational Procedures: Standard operating procedures and protocols
10. Monitoring and Reporting: Performance monitoring, reporting requirements, and review processes
11. Data Protection and Confidentiality: GDPR compliance and information security requirements
12. Pricing and Payment Terms: Fee structure, payment terms, and invoicing procedures
13. Insurance and Liability: Insurance requirements and liability allocation
14. Term and Termination: Duration of agreement and termination provisions
15. Force Majeure: Provisions for unforeseen circumstances and force majeure events
16. Governing Law and Jurisdiction: Specification of Danish law application and dispute resolution
1. Emergency Response Procedures: Specific procedures for emergency situations - include when emergency response is part of services
2. Equipment and Technology: Details of security equipment provided - include when physical security equipment is part of the service
3. Key Performance Indicators (KPIs): Detailed performance metrics - include for larger contracts with specific performance requirements
4. Transition Services: Procedures for service handover - include when taking over from previous provider
5. Special Event Services: Provisions for special event security - include if occasional event security is part of scope
6. Remote Monitoring Services: Specific provisions for remote monitoring - include if CCTV or remote monitoring is provided
7. Armed Security Services: Special provisions for armed security - include only if armed security is part of scope
8. Subcontracting: Terms for use of subcontractors - include if subcontracting will be permitted
1. Schedule 1 - Service Specifications: Detailed description of each security service to be provided
2. Schedule 2 - Service Levels and KPIs: Detailed performance metrics and measurement criteria
3. Schedule 3 - Price Schedule: Detailed pricing structure including standard and additional services
4. Schedule 4 - Site Specifications: Details of locations where services will be provided
5. Schedule 5 - Equipment Specifications: Details of security equipment to be used or provided
6. Schedule 6 - Personnel Requirements: Detailed staff qualifications, training, and vetting requirements
7. Schedule 7 - Operating Procedures: Detailed standard operating procedures and protocols
8. Schedule 8 - Reporting Templates: Standard formats for required reports and documentation
9. Appendix A - Insurance Requirements: Detailed insurance coverage requirements
10. Appendix B - Data Processing Agreement: GDPR-compliant data processing terms and conditions
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.