Security Sharing Agreement Template for Malaysia

Create a bespoke document in minutes,  or upload and review your own.

4.6 / 5
4.8 / 5

Let's create your Security Sharing Agreement

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Get your first 2 documents free

Your data doesn't train Genie's AI

You keep IP ownership of your information

Key Requirements PROMPT example:

Security Sharing Agreement

"I need a Security Sharing Agreement for a syndicated loan facility where three Malaysian banks are providing financing to a property development company, with one bank acting as security agent; the agreement needs to include specific voting thresholds for enforcement decisions and a mechanism for adding new lenders."

Document background
The Security Sharing Agreement is essential in complex financing transactions where multiple creditors hold security interests over the same assets. This document type is commonly used in Malaysia for syndicated loans, project financing, and structured finance transactions where different classes of creditors need to establish their respective rights and priorities. The agreement ensures compliance with Malaysian securities laws and regulations, including the Capital Markets and Services Act 2007 and the Financial Services Act 2013. It typically includes detailed provisions for the appointment of a security trustee, enforcement procedures, voting mechanisms, and the distribution of enforcement proceeds. The document becomes particularly important in scenarios involving multiple facilities or different types of debt instruments secured against the same collateral.
Suggested Sections

1. Parties: Identification of all security holders and the security provider(s)

2. Background: Context of the security arrangement, including reference to underlying facilities and security documents

3. Definitions and Interpretation: Key terms used in the agreement and rules of interpretation

4. Security Sharing Principles: Core principles governing the sharing of security interests and ranking of claims

5. Priority and Subordination: Establishes the priority ranking of security interests and any subordination arrangements

6. Security Trust: Appointment of security trustee/agent and their powers and duties

7. Enforcement of Security: Process and conditions for enforcing security interests, including decision-making mechanisms

8. Application of Proceeds: Order of distribution of enforcement proceeds

9. Representations and Warranties: Standard representations by parties regarding their capacity and authority

10. Costs and Expenses: Allocation of costs related to the agreement and security enforcement

11. Termination: Circumstances and process for terminating the agreement

12. Governing Law and Jurisdiction: Applicable law and jurisdiction for dispute resolution

Optional Sections

1. Voting Arrangements: Detailed voting mechanisms for decision-making when multiple security holders are involved

2. Security Agent Provisions: Additional provisions regarding the appointment, removal, and liability of security agents

3. Intercreditor Provisions: Specific arrangements between different classes of creditors

4. Buy-out Rights: Rights of security holders to buy out others' interests in certain circumstances

5. New Party Accession: Mechanism for new parties to join the security sharing arrangement

6. Amendments and Waivers: Process for modifying the agreement or waiving rights

7. Information Sharing: Provisions for sharing information between security holders

Suggested Schedules

1. Security Assets Schedule: Detailed description of all assets subject to shared security interests

2. Form of Accession Deed: Standard form for new parties joining the agreement

3. Security Documents: List and copies of all relevant security documents

4. Notice Requirements: Forms and procedures for various notices under the agreement

5. Contact Details: Contact information for all parties and authorized representatives

6. Voting Procedures: Detailed procedures for voting on enforcement and other decisions

7. Priority Matrix: Detailed breakdown of priority rankings for different security interests

Authors

Alex Denne

Head of Growth (Open Source Law) @ Genie AI | 3 x UCL-Certified in Contract Law & Drafting | 4+ Years Managing 1M+ Legal Documents | Serial Founder & Legal AI Author

Relevant legal definitions
Clauses
Relevant Industries

Banking and Financial Services

Corporate Finance

Real Estate and Property Development

Infrastructure and Construction

Manufacturing

Energy and Resources

Telecommunications

Transportation and Logistics

Healthcare

Commercial Real Estate

Relevant Teams

Legal

Finance

Treasury

Risk Management

Compliance

Corporate Finance

Banking Operations

Credit Risk

Transaction Management

Security Administration

Relevant Roles

Chief Financial Officer

Legal Counsel

Finance Director

Treasury Manager

Corporate Finance Manager

Security Trustee

Facility Agent

Risk Manager

Compliance Officer

Transaction Manager

Senior Banker

Credit Risk Officer

Legal Director

Banking Operations Manager

Industries
Teams

Employer, Employee, Start Date, Job Title, Department, Location, Probationary Period, Notice Period, Salary, Overtime, Vacation Pay, Statutory Holidays, Benefits, Bonus, Expenses, Working Hours, Rest Breaks,  Leaves of Absence, Confidentiality, Intellectual Property, Non-Solicitation, Non-Competition, Code of Conduct, Termination,  Severance Pay, Governing Law, Entire Agreemen

Find the exact document you need

Sharing Agreement

A Malaysian law-governed agreement establishing terms for sharing resources, assets, or facilities between multiple parties.

find out more

Third Party Sharing Agreement

A Malaysian law-governed agreement establishing terms for secure data sharing between organizations, ensuring PDPA compliance and defining parties' rights and obligations.

find out more

Information Sharing Agreement

A Malaysian law-governed agreement establishing terms and protocols for secure information sharing between organizations, ensuring PDPA compliance.

find out more

Personal Data Sharing Agreement

A Malaysian law-governed agreement establishing terms for personal data sharing between organizations, ensuring PDPA 2010 compliance.

find out more

Data Exchange Agreement

A Malaysian law-governed agreement establishing terms for secure data exchange between parties, ensuring compliance with PDPA 2010.

find out more

Content Sharing Agreement

A Malaysian law-governed agreement establishing terms for content sharing and distribution between parties, including rights, permissions, and compliance requirements.

find out more

Security Sharing Agreement

A Malaysian law-governed agreement establishing rights and priorities among multiple security holders sharing common collateral, including enforcement mechanisms and trustee arrangements.

find out more

Download our whitepaper on the future of AI in Legal

By providing your email address you are consenting to our Privacy Notice.
Thank you for downloading our whitepaper. This should arrive in your inbox shortly. In the meantime, why not jump straight to a section that interests you here: https://www.genieai.co/our-research
Oops! Something went wrong while submitting the form.

Genie’s Security Promise

Genie is the safest place to draft. Here’s how we prioritise your privacy and security.

Your documents are private:

We do not train on your data; Genie’s AI improves independently

All data stored on Genie is private to your organisation

Your documents are protected:

Your documents are protected by ultra-secure 256-bit encryption

Our bank-grade security infrastructure undergoes regular external audits

We are ISO27001 certified, so your data is secure

Organizational security

You retain IP ownership of your documents

You have full control over your data and who gets to see it

Innovation in privacy:

Genie partnered with the Computational Privacy Department at Imperial College London

Together, we ran a £1 million research project on privacy and anonymity in legal contracts

Want to know more?

Visit our Trust Centre for more details and real-time security updates.