General Security Agreement Template for Denmark

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your General Security Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

General Security Agreement

Document background
The General Security Agreement is a fundamental document in Danish secured lending transactions, used when a party (the security provider) grants security interests over assets to secure obligations owed to another party (the secured party). This agreement is essential in various commercial contexts, from simple bilateral lending arrangements to complex multi-party financing transactions. The document must comply with Danish law requirements, particularly the Danish Securities Trading Act and Registration of Property Act, regarding the creation, perfection, and enforcement of security interests. It includes detailed provisions on the scope of security, perfection requirements, representations and warranties, covenants, and enforcement mechanisms. The agreement is typically used alongside other financing documents and may be adapted to cover various types of collateral, from tangible assets to financial instruments and receivables.
Suggested Sections

1. Parties: Identification of the secured party (security taker) and the grantor (security provider)

2. Background: Context of the security arrangement, including reference to any underlying obligations or facility agreements

3. Definitions and Interpretation: Definitions of key terms and interpretation rules used throughout the agreement

4. Grant of Security Interest: Core provision creating the security interest over the collateral

5. Collateral Description: Detailed description of the assets subject to the security interest

6. Secured Obligations: Definition and scope of the obligations being secured

7. Representations and Warranties: Grantor's confirmations regarding ownership, authority, and status of collateral

8. Perfection and Registration: Requirements and procedures for perfecting the security interest

9. Grantor's Covenants: Ongoing obligations of the grantor regarding the collateral

10. Enforcement: Rights and remedies of the secured party upon default

11. Power of Attorney: Appointment of secured party as attorney for specific purposes

12. Notices: Communication requirements and contact details

13. Assignment and Transfer: Rules regarding transfer of rights under the agreement

14. Governing Law and Jurisdiction: Confirmation of Danish law application and jurisdiction

Optional Sections

1. Further Assurance: Additional actions parties must take to perfect or maintain security - include when complex collateral is involved

2. Insurance: Insurance requirements for collateral - include when physical assets are part of security

3. Bank Accounts: Specific provisions for charged accounts - include when bank accounts form part of security

4. Intellectual Property: Specific provisions for IP rights - include when IP forms part of security

5. Release of Security: Conditions and process for releasing security - include when partial releases may be needed

6. Currency Conversion: Rules for currency conversion - include when multiple currencies are involved

7. Costs and Expenses: Allocation of costs - include when significant ongoing costs expected

8. Amendments and Waivers: Process for modifications - include when frequent updates expected

Suggested Schedules

1. Schedule of Collateral: Detailed listing and description of all assets subject to security

2. Perfection Requirements: Specific actions required to perfect security interest in different types of collateral

3. Form of Notice: Template notices to third parties regarding the security interest

4. Secured Party Details: Complete contact and payment details for the secured party

5. Registration Requirements: Specific requirements for registering security interests in different jurisdictions

6. Forms of Accession: Templates for additional parties joining the security arrangement

7. Existing Security Interests: List of permitted existing security interests over the collateral

Authors

Relevant legal definitions
Clauses
Relevant Industries
Relevant Teams
Relevant Roles
Industries
Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

Security Interest Contract

find out more

Security Deposit Agreement

find out more

Pledge Agreement

find out more

Security Interest Agreement

find out more

Collateral Account Control Agreement

find out more

Shareholder Agreement Transfer Of Shares

find out more

Title Transfer Collateral Agreement

find out more

Commercial Security Agreement

find out more

Stock Lending Agreement

find out more

Convertible Note Agreement

find out more

Security Loan Agreement

find out more

Master Repurchase Agreement

find out more

Intercreditor Agreement

find out more

Intellectual Property Security Agreement

find out more

Pledge Of Shares Agreement

find out more

Overnight Reverse Repurchase Agreement

find out more

Loan Collateral Agreement

find out more

Reverse Repurchase Agreement

find out more

Negative Pledge Agreement

find out more

Security Lending Agreement

find out more

Cash Collateral Agreement

find out more

Deposit Control Agreement

find out more

Stock Repurchase Agreement

find out more

General Security Agreement

find out more

Holding Deposit Contract

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: https://www.genieai.co/our-research
Oops! Something went wrong while submitting the form.

Genie’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; Genie’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our Trust Centre for more details and real-time security updates.