¶¶Òõ¶ÌÊÓÆµ

Security Employment Contract Template for Malaysia

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Security Employment Contract

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Security Employment Contract

"I need a Security Employment Contract for hiring security guards to work across our chain of retail malls in Kuala Lumpur, starting March 2025, with specific provisions for rotating shifts and CCTV monitoring duties."

Document background
The Security Employment Contract is essential for establishing clear employment terms between security service providers and their personnel in Malaysia. This document is used when hiring security officers, guards, and related personnel, ensuring compliance with Malaysian employment laws, particularly the Employment Act 1955 and Private Security Services Industry Act 1971. It covers crucial aspects such as duties, working hours, compensation, benefits, security clearance requirements, and operational protocols. The contract is designed to protect both employer and employee interests while maintaining professional standards in the security services industry. It includes specific provisions for security-related responsibilities, confidentiality requirements, and emergency response procedures, making it distinct from standard employment contracts.
Suggested Sections

1. Parties: Identification of the employer company and the security personnel employee

2. Background: Context of the employment relationship and brief description of the security services role

3. Definitions: Key terms used throughout the contract including specific security-related terminology

4. Appointment and Duration: Terms of employment, position title, employment status (permanent/contract), and commencement date

5. Duties and Responsibilities: Detailed description of security officer's roles, responsibilities, and reporting structure

6. Working Hours and Shifts: Regular working hours, shift patterns, overtime arrangements, and rest periods

7. Remuneration and Benefits: Base salary, allowances, overtime rates, and statutory benefits

8. Leave Entitlements: Annual, medical, and other types of leave as per Employment Act

9. Security Clearance and Licensing: Requirements for maintaining necessary security licenses and clearances

10. Confidentiality and Non-Disclosure: Obligations regarding confidential information and security protocols

11. Code of Conduct: Expected behavior, uniform requirements, and professional standards

12. Health and Safety: Workplace safety requirements and protocols

13. Termination: Conditions and procedures for contract termination by either party

14. Governing Law: Specification of Malaysian law as governing law and jurisdiction

Optional Sections

1. Probationary Period: Terms of initial probation period if applicable

2. Performance Reviews: Schedule and criteria for performance evaluations

3. Training Requirements: Specific training programs and certifications required

4. Special Assignments: Terms for special security assignments or events

5. Vehicle Usage: Terms for use of company vehicles if provided

6. Insurance Coverage: Additional insurance coverage beyond statutory requirements

7. Non-Compete Clause: Restrictions on working for competitors after employment

8. Relocation Terms: Terms for potential deployment to different locations

9. Technology and Equipment Usage: Rules for using security equipment and technology systems

Suggested Schedules

1. Schedule 1: Compensation Structure: Detailed breakdown of salary components and benefits

2. Schedule 2: Shift Patterns: Detailed shift schedules and rotation patterns

3. Schedule 3: Equipment List: List of equipment provided and maintenance responsibilities

4. Schedule 4: Standard Operating Procedures: Detailed security procedures and protocols

5. Schedule 5: Training Requirements: Required certifications and training programs

6. Appendix A: Code of Conduct: Detailed behavioral guidelines and professional standards

7. Appendix B: Emergency Procedures: Emergency response protocols and procedures

8. Appendix C: Reporting Templates: Standard forms and reports to be used

Authors

Alex Denne

Head of Growth (Open Source Law) @ ¶¶Òõ¶ÌÊÓÆµ | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions




































Clauses






























Relevant Industries

Security Services

Retail

Commercial Real Estate

Banking and Financial Services

Manufacturing

Hospitality

Healthcare

Education

Transportation and Logistics

Construction

Mining and Resources

Government Facilities

Relevant Teams

Human Resources

Legal

Operations

Security Operations

Risk Management

Compliance

Training and Development

Administration

Emergency Response

Facility Management

Relevant Roles

Security Guard

Security Officer

Security Supervisor

Chief Security Officer

Security Manager

Security Coordinator

Control Room Operator

Security Systems Specialist

Security Trainer

Site Security Manager

Security Operations Manager

Emergency Response Officer

Industries








Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

No items found.

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: /our-research
Oops! Something went wrong while submitting the form.

³Ò±ð²Ô¾±±ð’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our for more details and real-time security updates.