Your data doesn't train 勛圖窪蹋's AI
You keep IP ownershipof your docs
1. Parties: Identification of the security service provider and the client, including their legal status and registration details
2. Background: Context of the agreement and brief description of the parties' intention to enter into a security services arrangement
3. Definitions: Detailed definitions of key terms used throughout the agreement
4. Scope of Services: Detailed description of security services to be provided, including locations, hours, and specific duties
5. Term and Commencement: Duration of the agreement and conditions for commencement
6. Provider's Obligations: Detailed responsibilities of the security service provider, including licensing, training, and compliance requirements
7. Client's Obligations: Responsibilities and obligations of the client, including access, information provision, and cooperation
8. Personnel Requirements: Specifications for security personnel, including qualifications, training, and conduct requirements
9. Fees and Payment Terms: Detailed fee structure, payment schedule, and related financial terms
10. Insurance and Liability: Insurance requirements and allocation of liability between parties
11. Confidentiality: Obligations regarding confidential information and data protection
12. Compliance with Laws: Obligation to comply with Qatar laws, particularly security services regulations
13. Termination: Grounds and procedures for termination of the agreement
14. Dispute Resolution: Procedures for resolving disputes, including jurisdiction and applicable law
1. Equipment and Uniforms: Details of security equipment and uniform requirements, used when the provider supplies these items
2. Performance Metrics: Specific KPIs and performance standards, included when detailed monitoring is required
3. Emergency Procedures: Specific procedures for emergency situations, included for high-risk security operations
4. Technology and Systems: Details of security systems and technology requirements, included when electronic security systems are part of the service
5. Subcontracting: Terms governing the use of subcontractors, included when subcontracting may be necessary
6. Force Majeure: Provisions for unforeseen circumstances, particularly relevant in high-risk security contexts
7. Non-Compete: Restrictions on competitive activities, included when protecting client relationships is crucial
1. Schedule 1: Service Specifications: Detailed breakdown of security services, posts, and duty requirements
2. Schedule 2: Fee Schedule: Detailed breakdown of fees, rates, and payment terms
3. Schedule 3: Key Personnel: Details of key security personnel and their qualifications
4. Schedule 4: Equipment List: Inventory of security equipment to be used
5. Schedule 5: Standard Operating Procedures: Detailed operational procedures and protocols
6. Schedule 6: Performance Standards: Specific KPIs and service level requirements
7. Schedule 7: Emergency Response Procedures: Detailed procedures for various emergency scenarios
8. Appendix A: Required Licenses and Certifications: Copies of necessary Qatar security services licenses and certifications
9. Appendix B: Insurance Certificates: Copies of required insurance policies and certificates
Find the document you need
勞梗紳勳梗s Security Promise
勛圖窪蹋 is the safest place to draft. Heres how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 勞梗紳勳梗s AI improves independently
All data stored on 勛圖窪蹋 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
