Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Security Sharing Agreement
"I need a Security Sharing Agreement for a syndicated loan facility where three Malaysian banks are providing financing to a property development company, with one bank acting as security agent; the agreement needs to include specific voting thresholds for enforcement decisions and a mechanism for adding new lenders."
1. Parties: Identification of all security holders and the security provider(s)
2. Background: Context of the security arrangement, including reference to underlying facilities and security documents
3. Definitions and Interpretation: Key terms used in the agreement and rules of interpretation
4. Security Sharing Principles: Core principles governing the sharing of security interests and ranking of claims
5. Priority and Subordination: Establishes the priority ranking of security interests and any subordination arrangements
6. Security Trust: Appointment of security trustee/agent and their powers and duties
7. Enforcement of Security: Process and conditions for enforcing security interests, including decision-making mechanisms
8. Application of Proceeds: Order of distribution of enforcement proceeds
9. Representations and Warranties: Standard representations by parties regarding their capacity and authority
10. Costs and Expenses: Allocation of costs related to the agreement and security enforcement
11. Termination: Circumstances and process for terminating the agreement
12. Governing Law and Jurisdiction: Applicable law and jurisdiction for dispute resolution
1. Voting Arrangements: Detailed voting mechanisms for decision-making when multiple security holders are involved
2. Security Agent Provisions: Additional provisions regarding the appointment, removal, and liability of security agents
3. Intercreditor Provisions: Specific arrangements between different classes of creditors
4. Buy-out Rights: Rights of security holders to buy out others' interests in certain circumstances
5. New Party Accession: Mechanism for new parties to join the security sharing arrangement
6. Amendments and Waivers: Process for modifying the agreement or waiving rights
7. Information Sharing: Provisions for sharing information between security holders
1. Security Assets Schedule: Detailed description of all assets subject to shared security interests
2. Form of Accession Deed: Standard form for new parties joining the agreement
3. Security Documents: List and copies of all relevant security documents
4. Notice Requirements: Forms and procedures for various notices under the agreement
5. Contact Details: Contact information for all parties and authorized representatives
6. Voting Procedures: Detailed procedures for voting on enforcement and other decisions
7. Priority Matrix: Detailed breakdown of priority rankings for different security interests
Authors
Account Bank
Accession Deed
Additional Creditor
Administration
Affiliate
Agent
Ancillary Facility
Authorisation
Available Commitment
Business Day
Charged Property
Claim
Commitment
Creditor
Debt Document
Default
Enforcement Action
Enforcement Date
Enforcement Notice
Event of Default
Facility Agreement
Finance Document
Finance Party
Financial Indebtedness
Guaranteed Obligations
Insolvency Event
Intercreditor Agreement
Legal Reservation
Liabilities
Majority Creditors
Material Adverse Effect
Original Creditor
Payment
Permitted Security
Principal Agreement
Priority
Proceedings
Receiver
Recovery
Secured Assets
Secured Obligations
Secured Party
Security
Security Agent
Security Document
Security Interest
Security Period
Security Provider
Security Trust
Senior Creditor
Subordinated Creditor
Transaction Security
Trust Property
Voting Rights
Appointment of Security Agent
Declaration of Trust
Security Sharing
Priority Rights
Subordination
Enforcement
Application of Proceeds
Power of Attorney
Decision Making
Representations and Warranties
Payment Provisions
Information Sharing
Agency Provisions
Accession
Assignment and Transfer
Amendments and Waivers
Costs and Expenses
Indemnities
Notices
Calculations and Certificates
Partial Invalidity
Remedies and Waivers
Counterparts
Governing Law
Dispute Resolution
Confidentiality
Further Assurance
Banking and Financial Services
Corporate Finance
Real Estate and Property Development
Infrastructure and Construction
Manufacturing
Energy and Resources
Telecommunications
Transportation and Logistics
Healthcare
Commercial Real Estate
Legal
Finance
Treasury
Risk Management
Compliance
Corporate Finance
Banking Operations
Credit Risk
Transaction Management
Security Administration
Chief Financial Officer
Legal Counsel
Finance Director
Treasury Manager
Corporate Finance Manager
Security Trustee
Facility Agent
Risk Manager
Compliance Officer
Transaction Manager
Senior Banker
Credit Risk Officer
Legal Director
Banking Operations Manager
Find the exact document you need
Sharing Agreement
A Malaysian law-governed agreement establishing terms for sharing resources, assets, or facilities between multiple parties.
Third Party Sharing Agreement
A Malaysian law-governed agreement establishing terms for secure data sharing between organizations, ensuring PDPA compliance and defining parties' rights and obligations.
Information Sharing Agreement
A Malaysian law-governed agreement establishing terms and protocols for secure information sharing between organizations, ensuring PDPA compliance.
Personal Data Sharing Agreement
A Malaysian law-governed agreement establishing terms for personal data sharing between organizations, ensuring PDPA 2010 compliance.
Data Exchange Agreement
A Malaysian law-governed agreement establishing terms for secure data exchange between parties, ensuring compliance with PDPA 2010.
Content Sharing Agreement
A Malaysian law-governed agreement establishing terms for content sharing and distribution between parties, including rights, permissions, and compliance requirements.
Security Sharing Agreement
A Malaysian law-governed agreement establishing rights and priorities among multiple security holders sharing common collateral, including enforcement mechanisms and trustee arrangements.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.