Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. 1. Event Overview: Basic details of the event including date, location, expected attendance, and event type
2. 2. Scope of Assessment: Defines the boundaries and limitations of the risk assessment
3. 3. Methodology: Explains the risk assessment approach and scoring system used
4. 4. Key Stakeholders: Lists all parties involved in event organization and their responsibilities
5. 5. Venue Assessment: Evaluation of the venue's suitability and inherent risks
6. 6. Crowd Management: Analysis of crowd-related risks and control measures
7. 7. Emergency Procedures: Emergency response plans and evacuation procedures
8. 8. Health and Safety Measures: General health and safety considerations and controls
9. 9. Security Assessment: Security risks and management procedures
10. 10. Risk Matrix: Detailed risk scoring and prioritization
11. 11. Control Measures: Specific actions and measures to mitigate identified risks
12. 12. Monitoring and Review: Procedures for ongoing risk monitoring and assessment updates
1. Food Safety Assessment: Required when food/beverages are being served at the event
2. Environmental Impact: Needed for outdoor events or events with significant environmental considerations
3. Noise Management: Required for events with music or significant sound elements
4. Transportation Management: Necessary for large events affecting local traffic
5. Weather Contingency: Required for outdoor events
6. Special Effects Assessment: Needed when pyrotechnics or special effects are planned
7. Child Protection Measures: Required when children are specifically involved in the event
8. Disability Access: Detailed accessibility considerations for events open to public
1. Schedule A: Site Plans: Detailed venue layouts, emergency exits, and key facilities
2. Schedule B: Emergency Contact List: Complete list of emergency contacts and chain of command
3. Schedule C: Risk Assessment Matrix: Detailed risk scoring tables and methodology
4. Schedule D: Incident Report Forms: Templates for reporting incidents during the event
5. Schedule E: Equipment Checklist: List of required safety and emergency equipment
6. Schedule F: Insurance Certificates: Copies of relevant insurance documentation
7. Appendix 1: Event Schedule: Detailed timeline of event activities
8. Appendix 2: Safety Briefing Materials: Materials for staff safety briefings
9. Appendix 3: Relevant Permits: Copies of all required permits and licenses
10. Appendix 4: Previous Incident Reports: If applicable, reports from similar previous events
Find the exact document you need
Community Event Risk Assessment
A Hong Kong-compliant risk assessment template for community events, addressing safety, crowd management, and emergency procedures under local regulations.
Employer Response To Grievance Letter
A formal employer's response to an employee grievance under Hong Kong employment law, detailing investigation findings and proposed resolutions.
Social Media Partnership Agreement
A Hong Kong law-governed agreement establishing terms and conditions for social media collaboration between partners, covering content creation, rights, and compliance requirements.
Social Media Consent Form
A Hong Kong-compliant consent form for organizations to use individual-provided content on social media platforms, adhering to local privacy laws and data protection requirements.
Business Shares Agreement
A Hong Kong law-governed agreement for the sale and transfer of company shares, detailing terms, conditions, and regulatory compliance requirements.
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
