Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Parties: Identification of the security service provider and the client, including commercial registration details and Ministry of Interior license numbers
2. Background: Context of the security services requirement and brief description of the parties' business relationship
3. Definitions: Detailed definitions of terms used throughout the agreement, including specific security-related terminology
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific duties
5. Term and Renewal: Duration of the agreement and conditions for renewal or extension
6. Payment Terms: Fee structure, payment schedule, and invoicing requirements
7. Security Personnel: Requirements for security staff, including qualifications, training, and compliance with Saudization requirements
8. Equipment and Uniforms: Specifications for security equipment, uniforms, and other materials to be used
9. Compliance and Regulations: Commitment to comply with Saudi laws, Ministry of Interior regulations, and relevant security standards
10. Liability and Insurance: Allocation of risks, insurance requirements, and indemnification provisions
11. Confidentiality: Protection of confidential information and trade secrets
12. Termination: Grounds for termination, notice requirements, and consequences of termination
13. Force Majeure: Provisions for unforeseen circumstances affecting contract performance
14. Governing Law and Dispute Resolution: Confirmation of Saudi law application and dispute resolution mechanisms
1. Cash-in-Transit Services: Specific provisions for cash handling and transportation services, if applicable
2. Electronic Security Systems: Requirements for installation, maintenance, and monitoring of security systems, if included in scope
3. Special Events Security: Provisions for temporary or special event security services
4. VIP Protection: Specific requirements for executive or VIP protection services
5. Emergency Response Procedures: Detailed procedures for handling various types of security incidents
6. Key Performance Indicators: Specific performance metrics and reporting requirements
7. Training Requirements: Additional training requirements beyond mandatory certifications
8. Weapons Handling: Specific provisions for armed security services, if applicable and permitted
1. Schedule 1 - Service Locations: Detailed list of locations where security services will be provided
2. Schedule 2 - Pricing Schedule: Detailed breakdown of fees for different services and locations
3. Schedule 3 - Personnel Requirements: Specific qualifications, experience, and training requirements for security staff
4. Schedule 4 - Equipment Specifications: Detailed specifications for security equipment and uniforms
5. Schedule 5 - Standard Operating Procedures: Detailed procedures for routine security operations
6. Schedule 6 - Reporting Templates: Standard forms and templates for security reports and incidents
7. Schedule 7 - Key Personnel: List of key management and supervisory staff with their qualifications
8. Appendix A - Ministry of Interior Licenses: Copies of required security service licenses and permits
9. Appendix B - Insurance Certificates: Copies of required insurance policies and certificates
Find the document you need
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your data is private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
