Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the security service provider and the client, including full legal names, registration details, and addresses
2. Background: Context of the agreement and brief description of the client's security needs and provider's qualifications
3. Definitions: Definitions of key terms used throughout the agreement, including technical security terminology
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific security measures
5. Service Provider Obligations: Key responsibilities of the security provider, including licensing, personnel qualifications, and compliance requirements
6. Client Obligations: Client's responsibilities, including access provision, information sharing, and cooperation requirements
7. Personnel Requirements: Specifications for security staff, including qualifications, training, and vetting requirements as per German regulations
8. Data Protection and Confidentiality: GDPR compliance measures and confidentiality obligations
9. Liability and Insurance: Liability limitations, indemnification provisions, and required insurance coverage
10. Fees and Payment Terms: Service fees, payment schedule, and terms including compliance with German minimum wage requirements
11. Term and Termination: Contract duration, renewal terms, and termination conditions
12. Force Majeure: Provisions for unforeseen circumstances and their impact on service delivery
13. Governing Law and Jurisdiction: Confirmation of German law application and jurisdiction for disputes
14. Notices: Communication procedures and contact details for official notices
15. Execution: Signature blocks and execution requirements
1. Armed Security Services: Include when armed security personnel are required, addressing Weapons Act compliance
2. Electronic Surveillance: Include for CCTV and electronic monitoring services, with specific data protection provisions
3. Key Holding Services: Include when key holding and alarm response services are part of the scope
4. Special Events Security: Include for temporary or event-specific security services
5. Vehicle Patrol Services: Include when mobile patrol services are part of the scope
6. Emergency Response Procedures: Include for high-risk locations requiring specific emergency protocols
7. Subcontracting: Include if the security provider may need to subcontract certain services
8. Performance Metrics: Include when specific KPIs and performance measurements are required
9. Training Requirements: Include when specific client-required training is needed beyond standard qualifications
1. Schedule 1 - Service Specifications: Detailed breakdown of security services, including post orders and specific duties
2. Schedule 2 - Fee Schedule: Detailed pricing structure, including regular rates and special rates for additional services
3. Schedule 3 - Site Details: Specific information about each secured location, including maps and access points
4. Schedule 4 - Equipment Inventory: List of security equipment provided or maintained by either party
5. Schedule 5 - Key Personnel: Details of key security staff and management contacts
6. Schedule 6 - Operating Procedures: Standard operating procedures and post orders
7. Schedule 7 - Compliance Certificates: Copies of relevant licenses, certifications, and insurance certificates
8. Schedule 8 - Emergency Procedures: Detailed emergency response protocols and evacuation procedures
9. Appendix A - Incident Report Templates: Standard forms for security incident reporting
10. Appendix B - Performance Review Forms: Templates for service quality assessment and performance reviews
Is a Security Contract Agreement legally binding under German law?
Do I need a lawyer to draft a Security Contract Agreement in Germany?
Can I operate security services in Germany without a proper contract agreement?
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
