Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Employment Contract
"I need a Security Employment Contract for hiring armed security guards for our corporate headquarters in Lagos, Nigeria, including specific provisions for weapons handling, advanced security clearance requirements, and 24/7 shift patterns starting from March 2025."
1. Parties: Identification of the employer (security company) and the employee (security personnel), including full legal names and addresses
2. Background: Context of the employment relationship and brief description of the security company's operations
3. Definitions: Key terms used throughout the contract, including security-specific terminology
4. Appointment and Term: Details of the position, employment status (permanent/temporary), and commencement date
5. Duties and Responsibilities: Specific security-related duties, reporting structure, and performance expectations
6. Working Hours and Shifts: Regular working hours, shift patterns, and overtime arrangements
7. Compensation and Benefits: Salary, allowances, overtime rates, and other benefits
8. Leave Entitlements: Annual leave, sick leave, public holidays, and other authorized absences
9. Confidentiality and Non-Disclosure: Obligations regarding confidential information and security protocols
10. Health and Safety: Safety protocols, equipment usage, and emergency procedures
11. Code of Conduct: Expected behavior, professional standards, and disciplinary procedures
12. Termination: Grounds for termination, notice periods, and termination procedures
13. Governing Law: Confirmation of Nigerian law as governing law and jurisdiction
1. Housing Provision: Terms regarding accommodation if provided by the employer
2. Specialized Training: Requirements for specific security certifications or training programs
3. Vehicle Usage: Terms for use of company vehicles during security operations
4. Weapons Handling: Protocols for carrying and using authorized weapons if applicable
5. International Assignment: Terms for deployment to international locations if applicable
6. Performance Bonuses: Structure of performance-based incentives if offered
7. Non-Compete Clause: Restrictions on working for competitors after employment ends
8. Insurance Coverage: Additional insurance provisions beyond statutory requirements
1. Schedule 1 - Job Description: Detailed description of security role and responsibilities
2. Schedule 2 - Compensation Structure: Detailed breakdown of salary components and benefits
3. Schedule 3 - Shift Patterns: Details of rotating shifts and duty roster system
4. Schedule 4 - Equipment List: Inventory of security equipment provided by employer
5. Schedule 5 - Standard Operating Procedures: Detailed security protocols and procedures
6. Schedule 6 - Training Requirements: List of mandatory training and certification requirements
7. Appendix A - Code of Conduct: Detailed behavioral guidelines and professional standards
8. Appendix B - Emergency Procedures: Detailed emergency response protocols
Authors
Security Services
Facility Management
Private Security
Corporate Security
Risk Management
Property Management
Retail Security
Industrial Security
Hospitality Security
Banking Security
Human Resources
Legal
Security Operations
Risk Management
Compliance
Operations
Facility Management
Administration
Security Guard
Security Officer
Security Supervisor
Security Manager
Chief Security Officer
Security Coordinator
Site Security Manager
Security Operations Manager
Security Shift Leader
Security Control Room Operator
Armed Security Guard
Security Patrol Officer
Security Risk Manager
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.