Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Employment Contract
"I need a Security Employment Contract for hiring security guards to work across our chain of retail malls in Kuala Lumpur, starting March 2025, with specific provisions for rotating shifts and CCTV monitoring duties."
1. Parties: Identification of the employer company and the security personnel employee
2. Background: Context of the employment relationship and brief description of the security services role
3. Definitions: Key terms used throughout the contract including specific security-related terminology
4. Appointment and Duration: Terms of employment, position title, employment status (permanent/contract), and commencement date
5. Duties and Responsibilities: Detailed description of security officer's roles, responsibilities, and reporting structure
6. Working Hours and Shifts: Regular working hours, shift patterns, overtime arrangements, and rest periods
7. Remuneration and Benefits: Base salary, allowances, overtime rates, and statutory benefits
8. Leave Entitlements: Annual, medical, and other types of leave as per Employment Act
9. Security Clearance and Licensing: Requirements for maintaining necessary security licenses and clearances
10. Confidentiality and Non-Disclosure: Obligations regarding confidential information and security protocols
11. Code of Conduct: Expected behavior, uniform requirements, and professional standards
12. Health and Safety: Workplace safety requirements and protocols
13. Termination: Conditions and procedures for contract termination by either party
14. Governing Law: Specification of Malaysian law as governing law and jurisdiction
1. Probationary Period: Terms of initial probation period if applicable
2. Performance Reviews: Schedule and criteria for performance evaluations
3. Training Requirements: Specific training programs and certifications required
4. Special Assignments: Terms for special security assignments or events
5. Vehicle Usage: Terms for use of company vehicles if provided
6. Insurance Coverage: Additional insurance coverage beyond statutory requirements
7. Non-Compete Clause: Restrictions on working for competitors after employment
8. Relocation Terms: Terms for potential deployment to different locations
9. Technology and Equipment Usage: Rules for using security equipment and technology systems
1. Schedule 1: Compensation Structure: Detailed breakdown of salary components and benefits
2. Schedule 2: Shift Patterns: Detailed shift schedules and rotation patterns
3. Schedule 3: Equipment List: List of equipment provided and maintenance responsibilities
4. Schedule 4: Standard Operating Procedures: Detailed security procedures and protocols
5. Schedule 5: Training Requirements: Required certifications and training programs
6. Appendix A: Code of Conduct: Detailed behavioral guidelines and professional standards
7. Appendix B: Emergency Procedures: Emergency response protocols and procedures
8. Appendix C: Reporting Templates: Standard forms and reports to be used
Authors
Security Services
Retail
Commercial Real Estate
Banking and Financial Services
Manufacturing
Hospitality
Healthcare
Education
Transportation and Logistics
Construction
Mining and Resources
Government Facilities
Human Resources
Legal
Operations
Security Operations
Risk Management
Compliance
Training and Development
Administration
Emergency Response
Facility Management
Security Guard
Security Officer
Security Supervisor
Chief Security Officer
Security Manager
Security Coordinator
Control Room Operator
Security Systems Specialist
Security Trainer
Site Security Manager
Security Operations Manager
Emergency Response Officer
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.