TekCare Secure Service Agreement

Size: px
Start display at page:

Download "TekCare Secure Service Agreement"

Transcription

1 Severity This ( Service Agreement ) is incorporated into the Quote executed by TekLinks and Customer for TekCare Secure Services and sets forth the specific terms and conditions under which TekLinks shall supply the TekCare Secure Services described herein to Customer. The general terms applicable to such Services are contained in the Master Services Agreement ( MSA ) incorporated into the Quote by reference. Capitalized terms used but not defined herein shall have the meanings set forth in the MSA. 1.0 Terminology Administrative Access: Access given to individuals or systems to perform system administrator functions that is a level above the access given to a User. In a traditional Microsoft Windows environment, members of the local administrators, domain administrators and enterprise administrators groups have Administrative Access. In a traditional UNIX or Linux environment, Users with root level access or Administrative Access. In an application environment, Users with Super-User or system administrator roles and responsibilities have Administrative Access. Customer Premises: The physical address for which Customer has requested TekLinks Services, as identified in the Quote. Customer Premises Equipment: Equipment that TekLinks has deployed at Customer Premises to enable Services. Data Center: The physical space within the TekLinks facility that houses the Back-End Infrastructure used to provide Services. Device: Customer servers, routers, switches, firewall, VPN or other legacy device owned or provided by Customer and under management by TekLinks. Legacy devices no longer eligible for Service include PBX systems and MARS security monitoring devices. Equipment: Servers, desktop computers, routers, switches and other equipment deployed to provide or enable a Service. Equipment may be owned or leased by TekLinks or Customer. Field Engineer: An engineer capable of providing Hands-On Field Support for Incidents. Firewall: The Customer firewall through which Services are received. Front-End Infrastructure: Front-end, User-side servers, desktop computers, routers, switches, other Equipment, application software and operating software deployed to allow Users to access the Service. Hands-On Field Support: Support provided by a Field Engineer on site at Customer s location in response to a request for support that cannot be handled by Remote Support. Impact: The effect an Incident is having on the Customer Organization. Impact, for the purpose of TekLinks support, is measured in three levels: Low More of an irritation than a stoppage; Medium Business is degraded, but there is a reasonable workaround; High Major business processes are stopped. Incident: A problem or outage adversely affecting the Service or Customer s or its Users ability to access and use the Service. Incident Priority: The priority assigned to a support request for an Incident. TekLinks is the sole party responsible for assigning the Incident Priority for Customer support requests. Incident Priorities are assigned based on the Impact and Severity rating derived directly from Customer input. The following Incident Priorities correspond to the following response levels: 1 Emergency Response; 2 - Urgent Response; and 3 - Normal Response, as the same are more fully described in Section 10.4 hereof. Impact HIGH MEDIUM LOW HIGH MEDIUM LOW Managed: Hosted Exchange Services for which TekLinks maintains administrative control over the Front- End Infrastructure and Customer has non-administrative, User-level access. TekLinks is responsible for applying TekLinks Public Version: 12/31/2013 Page 1 of 12

2 any and all patches, firmware updates, and "fixes" as deemed necessary. Managed Service includes monitoring, maintaining event logs, up-to-date antivirus and infrastructure-level system backups for the purpose of Service availability and disaster recovery of the Back- End Infrastructure and the Front-End Infrastructure only. This does not include User-data or applicationdata backups. Maintenance is coordinated with Customer via a scheduled monthly Maintenance Window (as defined in Section 6.5 hereof). Managed Change: A change to Device configuration performed by TekLinks. Monitored: Hosted Exchange Services for which TekLinks monitors the Service and/or Customer s Front- End Infrastructure based on alert thresholds dictated by Customer. Customer is responsible for providing a list of what is to be monitored and a list of individuals to whom alerts should be delivered. TekLinks communicates results to Customer s designated contacts on a scheduled basis. TekLinks does not take action on alerts generated by monitoring. Non-Administrative Access: Access given to individuals or systems not authorized to perform system administrator functions. Access control permissions are granted based on an individual s specific job functions and responsibilities and limited to only what is required to perform the job. Non-Administrative Access is the same as User-level access. Organization: A set of Users of Service defined by Customer. An Organization typically includes every employee of an individual company obtaining Service. Operating System: The base software running on Customer Device. Remote Support: Support Services that are provided remotely via the Help Desk, telephone or support (as opposed to on-site at Customer s location). DR Resources: Disaster recovery Equipment and software resources allocated to Customer under a TekCloud Service Agreement. Service: The TekLinks TekCare Secure Services described herein. Service Components: The components necessary for TekLinks to deliver a Service, including without limitation, any part of the Back-End Infrastructure or, if Managed by TekLinks, the Front-End Infrastructure, electrical power, cooling capacity, rack space, and due to a failure of a system, Device, operating system, or Service which is Managed or under the direct control of TekLinks. This does not apply to planned system downtime or scheduled Maintenance Windows. Severity: The level, degree or scope of Impact an incident is having on the Customer Organization. Severity, for the purpose of TekLinks support, is measured in three levels: Low One User or small group of Users is affected; Medium Department or large group of Users is affected; High Entire Organization is affected. User: An individual authorized by Customer to utilize the Service. VPN: The Customer Virtual Private Network receiving Service. 2.0 Service Description 2.1 General TekCare Secure Service is a suite of add-on options and support Services that are offered to assist Customer with Monitoring, intrusion detection, active protection, vulnerability assessment, and incident Management of security events on its network. 2.2 Levels and Offerings TekCare Secure Active Watch TekCare Secure Active Watch Service provides 24x7 Managed Monitoring and proactive support of Threat Manager by a security analyst. The Service includes identification, verification, and recommendation for remediation action on alerts received from a TekCare Secure Service Active Watch Appliance TekCare Secure Active Watch Appliance TekCare Secure Active Watch Appliance is required to provide TekCare Secure Active Watch Service TekCare Secure Log Manager TekCare Secure Log Manager Service is a cloud-based solution that provides collection, aggregation, reporting, and alerting log sources and includes up to 1 year of storage TekCare Secure Log Review TekCare Secure Log Review Service provides 24x7 Managed daily log review by a security analyst. The Service includes identification, verification, and Service Outage: A condition in which a User is completely deprived of a Service (or multiple Services) recommendation for remediation action on incident TekLinks Public Version: 12/31/2013 Page 2 of 12

3 trends found from a TekCare Secure Log Manager solution. The Service also includes integrated review and case management capabilities that allow Customer to track and report on incident trends across Customer s entire enterprise, extending into the Services hosted outside of the Customer Premises. Built-in workflow and case management tools provide an auditable trail of any suspicious findings and give a historical perspective of Customer s entire security and compliance operations TekCare Secure Threat Manager TekCare Secure Threat Manager Service is a cloudbased intrusion-detection, vulnerability scanning, and alerting solution. The Service is able to protect Customer network against both internal and external threats, no matter how fragmented the architecture TekCare Secure Setup TekCare Secure Setup Service includes setup and configuration, shipping, and onboarding for the number of needed devices. 2.3 Availability Dependencies Service availability may be restricted to a certain geographic footprint. TekLinks shall be the sole party responsible for determination of availability. Past availability of Service shall not be considered grounds for future availability of Service. TekLinks reserves the right to limit Service availability in the event that necessary Service Components are either unavailable or unattainable at a reasonable cost to TekLinks. 3.0 Service Features 3.1 Common Features Customer is responsible for configuring Log Sources, Collection Policies, Log Correlation Policies, Saved Views/Reports, Blocking Policies, Scans, Manually Generated Incidents, Alerts and Cases in the Services User Interface. Customer will install and configure Equipment for the purpose of enabling the Services including but not limited to appliances, network taps, Firewalls, routers, switches, and Operating Systems. Customer is also responsible for configuring settings found in the Services User Interface. Customer acknowledges and agrees that Customer is solely responsible for the tasks and responsibilities set forth herein regardless of the actual or perceived assistance or recommendations provided by TekLinks. Customer and TekLinks may agree separately in writing with respect to the provision of Monitoring or professional services related to Customer's responsibilities set forth herein; provided, however, that if such Monitoring or professional services are provided by an Affiliate of TekLinks, and not TekLinks directly, Customer acknowledges and agrees that such Monitoring or professional services are separate and apart and not related to the Services provided pursuant to this Service Agreement. 3.2 TekCare Secure Active Watch Features Features defined in this Section are applicable to TekCare Secure Active Watch Service packages, as described below. TekCare Secure Active Watch Service provides 24x7 integrated Managed security Services, to include Monitoring and proactive support of Threat Manager by a security analyst. TekLinks Public Version: 12/31/2013 Page 3 of 12 GIAC-Certified Security Analysts and Researchers 24x7 State-of-the-Art Security Operations Center Trained Experts in Technologies Monitoring, Analysis and Expert Guidance Capabilities Customized Alerting and Escalation Procedures 3.3 TekCare Secure Log Manager Features Features defined in this Section are applicable to TekCare Secure Log Manager Service packages, as described below Log Collection Choice of physical (single- or multi-tenant) or virtual appliance Choice of agentless or Windows agent log collection Windows Event Logs o Windows System Event Log o Windows Security Event Log o Windows Application Event Log o Microsoft Exchange Server Application Logs SYSLOGs o Unix, Linux Server Logs o Most Network Device Logs (e.g., routers, switches, and Firewalls) o Database Logs Flat/Text Files

4 o o o o o Log Parsing Web Servers Logs (e.g., Apache, IIS) Windows ISA Server Logs DNS and DHCP Server Logs Homegrown Application Logs Exchange Message Tracking Logs New Parsers and Parsing Rules Updated Monthly Parsing Set Consolidated from Multiple Sources o Security Research Team o Customer Requests o Open Source, Third-Party Collaboration Real-Time Parsing Updates to Log Management System Event Correlation & Notification Custom and Out-of-the-Box Correlation Rules o Designed to Detect Suspicious Activity o Automatic Alerts Sent When Rule Is Triggered o PCI-Specific Rules to Comply with Requirement 10.6 of the PCI Data Security Standard Analysis & Reporting Dozens of Dashboards and Reports Available Out-of-the-Box Common Vulnerability Scoring System (CVSS) to Assess Risks Audit-Ready Reports Single Web-Based Console for Entire Environment o User Management and Administration o Dashboards and Drill-Down Analysis o Report Scheduling, Creation and Review Compliance Support SSAE 16 Type II Verified Data Centers Provided by a PCI Level 2 Audited Vendor Provided by a PCI Approved Scanning Vendor (ASV) Indefinite Storage and Archival of Incident Analysis and Cases Support for Multiple Compliance Mandates o PCI DSS 2.0, HIPAA, SOX, GLBA, CoBIT 3.4 TekCare Secure Log Review Features Features defined in this Section are applicable to TekCare Secure Log Review Service packages, as described below. TekCare Secure Log Review Service provides 24x7 integrated Managed daily log review of TekCare Log Manager by a security analyst. TekLinks Public Version: 12/31/2013 Page 4 of 12 GIAC-Certified Security Analysts and Researchers 24x7 State-of-the-Art Security Operations Center Trained Experts in Technologies Monitoring, Analysis and Expert Guidance Capabilities Customized Alerting and Escalation Procedures 3.5 TekCare Secure Threat Manager Features Features defined in this Section are applicable to TekCare Secure Threat Manager Service packages, as described below Threat Signatures and Rules 45,000+ IDS Signature Database; Weekly Signature Updates Rule Set Consolidated from Multiple Sources o Security Research Team o Emerging Threats o Open Source, Third-Party Collaboration Real-Time Signature Updates to Expert System Vulnerability Assessment Unlimited Internal and External Scans PCI DSS 2.0 Compliant External Scanning Broad Scanning Capabilities o Network Infrastructure o Server Infrastructure o Business Critical Applications Intrusion Detection Advanced Network Traffic and Payload Visibility o Web Technologies (IPv6, Ajax, SQL Injection) o Detect SSL-Based Intrusion Traffic Signature and Activity-Based Correlation Patented Threat Scenario Modeling

5 3.5.4 Analysis & Reporting Dozens of Dashboards and Reports Available Out-of-the-Box Custom Reporting Capabilities Common Vulnerability Scoring System (CVSS) to Assess Risks Audit-Ready Reports Single Web-Based Console for Entire Environment o User Management and Administration o Dashboards and Drill-Down Analysis o Report Scheduling, Creation and Review o Scan Scheduling and Results Review Compliance Support Provided by a PCI Approved Scanning Vendor (ASV) Provided by a PCI Level 2 Audited Vendor Support for Multiple Compliance Mandates o PCI DSS 2.0, HIPAA, SOX, GLBA, CoBIT o 6-Month Storage of all Raw IDS Event Data o SSAE 16 Type II Verified Data Centers o Indefinite Storage and Archival of Incident Analysis and Cases 3.6 Equipment Failure/Hardware Replacement TekLinks is responsible for the maintenance and/or replacement of failed Service infrastructure hardware and other TekLinks-owned Equipment. In the event of a failure of hardware or hardware components provided by TekLinks, TekLinks will provide replacement hardware or hardware components. Where available, TekLinks will provide replacement hardware from TekLinks inventory. If replacement hardware is not available in TekLinks inventory, TekLinks will arrange for replacement hardware with the vendor or supplier. 3.7 Limitations 3.8 Exceptions 4.0 Service Options The following options may be added to TekCare Secure Services. Description of Service options herein in no way entitles Customer to feature, unless specified by Teklinks and Customer in the signed Quote or signed evaluation of a Service Change request. Separate Service Agreements may apply to such options. Options described below may have additional cost associated with them. Options described below may not be compatible with all variants of the TekCare Secure Service. 4.1 TekCare Secure Log Manager Options Custom Parsing Rule Creation and Editing Custom Reporting Capabilities 4.2 TekCare Secure Threat Manager Options Custom Rule Creation and Editing 4.3 TekCare Management If Customer has TekCare server Management and/or TekCare device Management Services, TekCare Secure Management Service provides 24X7 Managed response to alerts generated by TekCare Secure Threat Manager or TekCare Secure Active Watch. For protected Devices or nodes under TekCare Management, TekLinks will make configuration changes as needed to rectify security threats. TekCare Management is a prerequisite for this Service option. See TekCare Service Agreement, at for details on options for Management of servers and Devices. 4.4 Field Support Hands-On Field Support TekLinks will be responsible for notifying Customer that Remote Support is not possible or feasible for a reported Incident and that the request for support will be classified as a Hands-On Field Support Incident. After such notification Customer has the right to request that all further troubleshooting or work on request be halted and that the ticket be closed. Tickets so closed will not be subject to further charge. If the Customer does not request a halt to all troubleshooting and/or work relating to Hands-On Field Support, then Customer assumes all responsibility for the escalation of the support request to Hands-On Field Support Incident status. TekLinks Public Version: 12/31/2013 Page 5 of 12

6 Each Hands-On Field Support Incident shall have a minimum of one (1) hour of TekLinks time included. No free Hands-On Field Support Incident are included within this tier of Service. Hands-On Field Support is available at hourly, block, or emergency rates. Hands-On Field Support includes no warranty or representation with respect to support other than as included in the MSA. TekLinks expressly disclaims any warranties related to hardware replacement, software replacement, vendor warranties, vendor support calls, programming assistance, project management and additional product features On-Demand Mitigation If Customer does not have TekCare Management on Monitored Devices, TekLinks Field Support will make configuration changes as needed to rectify security threats on a per-request basis. Customer is responsible for communicating specific details of the request to TekLinks, and the response will be treated as a Hands- On Field Support Incident. 5.0 Service Delivery 5.1 General It is Customer s responsibility to ensure that TekLinks is able to access Device. This includes but is not limited to port filtering, Firewalling, Ethernet switches, Ethernet cabling, hardware configuration, and Operating Systems. 5.2 Installation Upon receipt of a signed Quote, TekLinks will contact Customer to complete the on-boarding form. Customer is responsible for providing on-boarding information in order for Service delivery to proceed. Once TekLinks obtains shipping information, TekLinks will notify Customer and schedule installation date. Equipment is provisioned by a third-party vendor. Upon receipt of Equipment, TekLinks or Customer works with third-party vendor to install and configure the Equipment. Third-party vendor notifies TekLinks or Customer that Equipment is functional and receiving alerts. TekLinks notifies Customer that Service delivery is complete and provides transition information to Customer support. If additional configuration work is required due to limitations of the Customer network or other server/application requirements, TekLinks reserves the right to bill Customer at its then current hourly rates. TekLinks is NOT responsible for and will not be obligated to provide any support of or assistance in configuration, installation, administration, troubleshooting, maintenance or repair of any Customer Equipment and software, or integration of such Equipment and software into the Customer network beyond that previously defined. 5.3 Service Upgrades & Modifications TekLinks may use other methods to provide Customer with equivalent Service. TekLinks reserves the right to replace a Service with equivalent or upgraded Service at any time during the Term of this Agreement. TekLinks will make an effort to coordinate any such Service change with Customer prior to such change. If TekLinks is unable to coordinate an acceptable time for a Service change with Customer TekLinks reserves the right to make such a Service change during a scheduled Maintenance Window. 6.0 Service Support 6.1 Authorized Contacts TekLinks provides reliable and secure Managed Services by requiring that all Technical Support and information requests come only from Customer s documented Authorized Contacts. Customer shall provide an Authorized Contact List which will contain at minimum one primary Administrative/Billing Contact and one Emergency IT contact, and may contain as many Authorized Contacts as desired. The Authorized Contact List will include the name, address and phone number for each Authorized Contact. The Administrative/ Billing Contact and Emergency IT contact are authorized to request Service Changes and to change the Authorized Contact List. The Emergency IT Contact will receive emergency maintenance or Service-related correspondence from TekLinks. Requests for configuration information or Service Changes are accepted only from Authorized Contacts via , fax or phone. Customer is responsible for ensuring Authorized Contact information is accurate and requesting any updates that are needed. 6.2 Support/Helpdesk Customer must contact TekLinks Technical Support to report Service Incidents. TekLinks Technical Support will be available twenty-four (24) hours per day; seven (7) days per week; three hundred sixty-five days (365) days per year as follows: The Support/Helpdesk is staffed Monday through Friday 7:30 a.m. to 6:00 p.m. (central). Support after such hours is available for Emergency and Urgent Priority Incidents. TekLinks Public Version: 12/31/2013 Page 6 of 12

7 TekLinks Technical Support provides support for network Monitoring, trouble ticket resolution, and fault isolation up to the termination point of TekLinks Equipment. TekLinks Technical Support will accept Incident support calls from any Customer representative. Requests for Service Changes or information are accepted from any Authorized Contact per conditions and procedures described elsewhere in this Service Agreement. TekLinks will not perform any requested activity which may cause Service disruption or perform any Service Changes unless request is initiated by an Authorized Contact. TekLinks reserves the right to delay response on support tickets opened by anyone other than the Authorized Contact. Communication between Customer and TekLinks not initiated by an Authorized Contact will not be subject to SLA remedies. All communications with Customer will be in the English language. This feature is intended to support standard functionality of TekLinks Services. Remote Support services are available via telephone and . When possible, TekLinks will use the Remote Support feature to resolve Customer reported Incidents. TekLinks shall be the sole party responsible for defining when Remote Support is not possible or feasible. Remote Support: Remote Support is available Monday through Friday 7:30 a.m. to 6:00 p.m. (central). Remote Support of Devices requires Telnet, SSH, or SNMP connectivity to the Device being supported. Remote Support of servers and desktops requires web browser and Internet connectivity to the Device being supported. After-Hours Support: Support outside the Remote Support hours ( After-Hours Support ) is available for Emergency and Urgent Priority Incidents. TekLinks shall be the sole party responsible for defining which issues shall be classified as Emergency or Urgent Priority Incidents based on the Severity and Impact described by the Customer when reporting the Incident. Hands-On Field Support: Any onsite repair of hardware is the responsibility of the manufacturer during any warranty period. If requested by Customer, TekLinks can assign a Hands-On Field Support service request to a TekLinks Field Engineer as set forth in Section 4.2 hereof. 6.3 Moves, Adds, and Changes 6.4 Remote Hands 6.5 Maintenance Maintenance windows for disruptive work to Service will be limited to Sunday mornings from 1:00 a.m. 6:00 a.m. (central) ( Maintenance Window ) with no requirement of notification to Customer prior to maintenance. During the Maintenance Window, all standard maintenance and planned minor changes to the Service are performed. TekLinks will attempt to schedule all planned major changes which may result in Service interruption ( Planned Major Changes ) during the weekly Maintenance Window, except in cases where impact to Service will be minimized by alternate scheduling. Planned Major Changes will be posted to the online maintenance calendar two (2) weeks in advance of scheduling. The TekLinks Maintenance Calendar is available online at colo.teklinks.com. Service SLAs do not apply during Maintenance Windows and Planned Major Changes. TekLinks reserves the right to perform emergency support or network maintenance as needed outside the weekly Maintenance Window, in which case TekLinks will make a reasonable effort to notify the Customer if feasible under the circumstances. Any such maintenance will be considered emergency maintenance. All Service SLAs will apply during such emergency maintenance. Customer is responsible for reviewing the TekLinks Maintenance Calendar weekly for current information regarding scheduled maintenance. Customer is responsible for maintaining an up-to-date Authorized Contact List with TekLinks. TekLinks will not be held responsible for maintenance notifications missed due to an out-of-date Authorized Contact List. Customer is responsible for notifying TekLinks in writing if it requests that disruptive maintenance be performed outside of the Maintenance Windows. 6.6 Backup and Recovery TekLinks Public Version: 12/31/2013 Page 7 of 12

8 6.7 Notifications If requested by Customer in writing, TekLinks will notify Customer within fifteen (15) minutes of a Service Outage via notification. Customer is responsible for providing up to two (2) addresses for Service Outage notifications. For Services which include alerting and notification options, Customer is responsible for designating the Authorized Contacts who are to receive notifications. For protected Devices also covered under TekCare Management Service agreements, the notifications will also be sent to TekLinks support personnel in tandem with designated Customer Authorized Contacts. 6.8 Support Limitations TekLinks Technical Support is not responsible for end- User support of issues not directly related to Service. This includes (but is not limited to) Customer Front-End Infrastructure and operating systems, Customer Equipment, or Customer application support. 7.0 Billing 7.1 Service Activation Date Billing for the Service will begin on the Service Activation Date. The Service Activation Date shall be the earlier to occur of: 1) The date on which Service is activated on the first newly contracted Customer Device by TekLinks. 2) Ninety (90) days after the date on which this Agreement is signed by Customer. Customer is responsible for ensuring TekLinks has the ability to install any necessary software or Equipment necessary to deliver Services in a timely fashion. 7.2 Billing and Payment Terms Billing and payment terms are set forth in Section X, Billing and Payment Terms, of the MSA. 8.0 Customer Requirements 8.1 General Customer s general obligations for Service are set forth in Section VI, Customer Responsibilities, of the MSA 8.2 Equipment Equipment Requirements TekLinks requires Customer to maintain a suitable standard of Equipment that sufficiently supports the normal operation of the Services. TekLinks reserves the right to cancel Service, or portions of the Service, if the Equipment is deemed to be faulty or inadequate Equipment Configuration TekLinks will configure and deliver the Customer Premises Equipment necessary to enable the Services. Customer is responsible for installing the Customer Premises Equipment and the configuration of any other Equipment necessary for the purpose of enabling the Services including but not limited to network taps, Firewalls, routers, switches, and Operating Systems, unless otherwise provided for by separate written agreement between the parties. Customer is responsible for all Equipment configuration changes not specifically outlined herein. Customer is responsible for any Equipment modifications necessary at Customer Premises to accommodate the Service outlined herein Hardware Loan Subject to the terms and conditions of the Agreement, TekLinks is loaning to Customer the Customer Premises Equipment for the purpose of enabling the Services. The Customer Premises Equipment is loaned, not sold, to Customer, for use solely during the Term of the Agreement and will remain the property of TekLinks. Customer will use a reasonable degree of care to maintain and protect the Customer Premises Equipment. Customer will not modify, disassemble, decompile, reverse engineer, rent, lease, loan, transfer, or copy the Customer Premises Equipment (including any software or firmware that is part of the Customer Premises Equipment). Customer assumes all risk of loss, damage, theft, or destruction of the Customer Premises Equipment while it is in Customer's possession or control or that of its agents, including any carrier, and Customer will reimburse TekLinks for any costs of repair or replacement of the Customer Premises Equipment. Customer will keep the Customer Premises Equipment free of all security interests, liens, and other encumbrances. 8.3 Escalation Information Customer is responsible for providing up-to-date escalation information and notifying TekLinks of any changes that might affect escalation procedures. TekLinks Public Version: 12/31/2013 Page 8 of 12

9 8.4 Protected Networks Customer must provide network diagrams to TekLinks for all networks segments for which Threat Manager and Active Watch Services are deployed (collectively, Protected Networks ). Additionally, Customer must configure its Protected Networks so that Services can be fully deployed on the Protected Networks and ensure that intrusion monitoring and vulnerability assessment are fully operational. TekLinks will not be in breach of any of its obligations under this Agreement to the extent Customer fails to comply with its obligations under this Agreement. 9.0 Service Conditions Conditions to TekLinks performance of Services for Customer are set forth in Section II.B, Service Conditions, of the MSA Service Level Agreements 10.1 General TekLinks will be the sole party to determine whether TekLinks has met the SLAs specified herein. Customer must at all times cooperate with TekLinks in testing, determining, and verifying that a qualifying Service Outage has occurred SLA Credit Request Process and Limitations In order to receive any of the SLA credits specified herein for Service (each, a Service Credit ), an Authorized Contact must immediately notify TekLinks Technical Support of an Incident within the TekLinks Service that results in the inability of the Customer to access Service ( Service Outage ). A Service Outage does not include an outage that occurs during scheduled Maintenance Windows or Planned Major Changes. TekLinks Technical Support will investigate the reported Service Outage and assign a Trouble Ticket number. Once TekLinks determines that a substantiated Service Outage that could qualify Customer for the Service Credit has occurred ( Verifiable Trouble Ticket ), then Customer may request a Service Credit within thirty (30) days after the event giving rise to the Service Credit by contacting TekLinks Technical Support and asking for a Service Credit escalation. A Verifiable Trouble Ticket must accompany Customer s request for any Service Credit. Service Credits should appear on Customer s bill for the Service within two (2) billing cycles, after such Service Credit has been approved by TekLinks. In any calendar year, Customer s aggregated Service Credits may not exceed, for any Service, three (3) months worth of the monthly Service Fee for the affected Service. In any billing month Service Credits may not exceed, for any Service, fifty percent (50%) of the monthly Service Fee for the affected Service. For purposes of calculating Service Credits, the monthly Service Fee shall mean the monthly recurring charge for such Service, but excluding, in all cases, (i) any monthly recurring fees for the Service options (e.g., domain name hosting or Service); (ii) all one-time charges; and (iii) any monthly recurring charge for Equipment for such Service ( MRC ). Service Credits are exclusive of any applicable taxes charged to the Customer or collected by TekLinks SLA Exclusions Global SLA Exclusions SLAs do not apply and TekLinks is not responsible for failure to meet an SLA resulting from: TekLinks Public Version: 12/31/2013 Page 9 of 12 Misconduct of Customer or Users of Service Failure or deficient performance of power, Equipment, services or systems not provided by TekLinks Delay caused or requested by Customer Service interruptions, deficiencies, degradations or delays due to any access lines, cabling or Equipment provided by third parties Service interruptions, deficiencies, degradations or delays during any period in which TekLinks or its representatives are not afforded access to the premises where access lines associated with Service are terminated or TekLinks Equipment is located Service interruptions, deficiencies, degradations or delays during any period when a Service Component is removed from Service for maintenance, replacement, or rearrangement purposes or for the implementation of a Customer order or by Customer staff Customer s election to not release a Service Component for testing and/or repair and to continue using the Service Component Force Majeure Events, as described in Section XV, Force Majeure, of the MSA. Failure of Customer to provide suitable secure environment for on premise Devices including but not limited to: secure mounting/racking,

10 appropriate cooling and air handling, security from theft, loose wires bundled neatly, etc. Failure to adhere to TekLinks recommended configurations on unmanaged equipment. Over 30 day past due balance on any billing or Service with TekLinks In addition, Service Credits do not apply (a) if Customer is entitled to other available credits, compensation or remedies under Customer s Service Agreement for the same Service interruption, deficiency, degradation or delay, (b) for Service interruptions, deficiencies, degradations or delays not reported by Customer to TekLinks, (c) where Customer reports an SLA failure, but TekLinks does not find any SLA failure, and (d) when Service is dependent upon other Service with lower SLA. If Customer elects to use another provider or method to restore Service during the period of interruption, Customer must pay the charges for the alternative Service used Service SLA Exclusions 10.4 SLA Classifications and s Availability Service Availability SLAs apply only when Service is completely unavailable due to an Incident. After Customer opens a Trouble Ticket on the Service issue, TekLinks Technical Support will classify the issue. If TekLinks Technical Support determines that Customer Service is 100% unavailable, the issue will be categorized as a Service Availability issue and all SLA remedies applicable to Service Availability will apply. Any SLA remedies not specifically defined as Service Availability SLAs will not apply. 99.9% Failure to meet the goal qualifies Customer for a Service credit of up to 1 month of MRC Performance Service Performance SLAs apply if Service is available in a degraded state. After Customer opens a Trouble Ticket on a Service Incident, TekLinks Technical Support will classify the Incident. If TekLinks Technical Support determines that Customer Service is available albeit with performance degradation, the Incident will be categorized as a Service Performance Incident and all SLA remedies applicable to Service Performance will apply. Any SLA remedies not specifically defined as Service Performance SLAs will not apply. Service Performance SLA credits will not be given if Service Availability SLA credits are requested on the same Incident. There are no Service Performance SLA s with this Service. N/A Other N/A Other SLAs apply whenever a SLA goal has not been met. Other Service Credits will qualify for consideration even when Service Availability or Service Performance Service Credits are requested against the same Customer Incident Initial Incident Response If Customer has an Agreement for Active Watch Appliance, Log Manager appliance, or Threat Manager appliance, the Initial Response SLA goal is measured from the time an Incident is first reported to TekLinks by the Customer until TekLinks responds to such Incident with an initial or phone call. Resolution of the Incident will not be considered to be part of this Initial Response SLA goal. 4 hours Failure to meet the goal does not qualify Customer for any Service Credit Incident Resolution / Service Repair Objective If Customer has an Agreement for Active Watch Appliance or Threat Manager appliance, the Incident Resolution/Service Repair Objective SLA goal is measured from the time an Incident is first reported to TekLinks by the Customer until such Incident has been resolved or a suitable workaround is in place to restore Service to a state of reasonable operation. Incident Resolution/Service Repair Objectives herein are stated as goals toward Mean Time to Recovery ( MTTR ) of the Service. Failure of TekLinks to meet these goals on a single Incident does not qualify Customer for Service Credits. 24 Failure to meet the goal does not qualify TekLinks Public Version: 12/31/2013 Page 10 of 12

11 hours Customer for any Service Credit Hardware Replacement In the event of a failure of hardware or hardware components provided by TekLinks, the MTTR will be determined by the associated Incident Priority based on the impact of hardware failure to Services as outlined in the Incident Resolution/Service Repair Objectives section above. However, if the replacement hardware is not readily available from TekLinks inventory, MTTR begins at the time TekLinks takes possession of said replacement hardware. For Customer Equipment, MTTR starts at such time TekLinks receives the replacement hardware from the Customer or Customer s vendor Monitoring Provisioning For purpose of the Provisioning SLA, the duration of Provisioning shall be deemed to commence upon the execution of the applicable Agreement for Service by Customer and ends when the Service has been provisioned to the Customer. 45 days Failure to meet the goal does not qualify the Customer for any Service Credit Remote Hands Active Watch If Customer has an Agreement for Active Watch, for all Protected Networks segments for which Threat Manager and Active Watch services are deployed TekLinks will detect and escalate security Incidents for network threats to Protected Networks within 30 minutes of their occurrence. The Active Watch SLA goal is measured from the time a security Incident is detected by Threat Manager until the Active Watch escalation notification has been initiated by a TekLinks Security Analyst. 30 minutes Each failure to meet the goal qualifies Customer for a Service Credit of 1% of MRC per event Log Review If Customer has an Agreement for Log Review, TekLinks will (a) review data for the prior day within 24 hours, (b) escalate potential security Incidents to Customer upon detection, and (c) maintain an audit trail of review activity on a daily basis that is accessible online. The Log Review Escalation SLA goal is measured from the time a security Incident is detected by the Security Analyst until the Log Review escalation notification has been initiated by a TekLinks Security Analyst. The Log Review SLA goal is measured from 11:59 p.m. (central) of the prior day. The Log Review Audit Trail SLA goal is measured on a daily basis in conjunction with the Log Review itself. Log Review Activity Review prior day data Escalate security incidents Maintain Audit Trail TekLinks Public Version: 12/31/2013 Page 11 of hours 30 minutes Daily Each failure to meet the goal qualifies Customer for a Service Credit of 1% of MRC per event Each failure to meet the goal qualifies Customer for a Service Credit of 1% of MRC per event Each failure to meet the goal qualifies Customer for a Service Credit of 1% of MRC per event TekCare Secure Management If Customer has an Agreement for TekCare Management, TekLinks will begin formulating a mitigation plan in response to security Incidents for network threats to Protected Networks within the response goals below. The TekCare Secure Management SLA goal is measured from the time a security Incident is escalated by a TekLinks Security Analyst or the event notification is received from the Active Watch Appliance, Threat Manager, or Log Manager. Incident Priority Emergency Response 1 hour Failure to meet the goal qualifies Customer for a Service Credit of up to 1 month of MRC

12 Incident Priority Urgent Response 2 hours Failure to meet the goal qualifies Customer for a Service Credit of up to 1 month of MRC Normal Response 24 hours Failure to meet the goal qualifies Customer for a Service Credit of up to 1 month of MRC 10.5 Remedies Not Cumulative The remedies set forth herein are NOT cumulative. The aggregate maximum remedy for any and all failures to provide Services at the SLAs required that occur in a single calendar month shall not exceed one calendar month of Service Credit. If Customer is late in making any payments owing pursuant to this Agreement at the time of the occurrence which would otherwise entitle Customer to SLA remedies, none of such SLA remedies shall be available to Customer, and Customer waives the same. (End of ) TekLinks Public Version: 12/31/2013 Page 12 of 12

TekCloud Service Agreement

TekCloud Service Agreement Severity This ( Service Agreement ) is incorporated into the Quote executed by TekLinks and Customer for TekCloud Services and sets forth the specific terms and conditions under which TekLinks shall supply

More information

How To Use Teklinks For Free

How To Use Teklinks For Free Severity TekEx Service Agreement TekEx Service Agreement This TekWeb Service Agreement ( Service Agreement ) is incorporated into the Quote executed by TekLinks and Customer for TekEx Services and sets

More information

Software Citrix CSP Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description

Software Citrix CSP Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description This Software Citrix CSP Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Shared Hosting Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery

Shared Hosting Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery This Shared Hosting Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Master Service Level Agreement. Simplicity Itself

Master Service Level Agreement. Simplicity Itself Simplicity Itself Contents Service Commitment... 4 Service Delivery... 4 General...4 Installation...4 Service Upgrades & Modifications...4 Service Support... 4 Authorized Contacts...4 Support/Helpdesk...5

More information

Load Balancing Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery

Load Balancing Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery This Load Balancing Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

Software Microsoft SPLA Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Software Microsoft SPLA Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Software Microsoft SPLA Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD Protecting your infrastructure requires you to detect threats, identify suspicious

More information

Cloud Management Service Agreement. 1.0 Terminology. 2.0 Service Description

Cloud Management Service Agreement. 1.0 Terminology. 2.0 Service Description This Cloud Management Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Remote Access Service Broadband Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.

Remote Access Service Broadband Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4. This Remote Access Service Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Hosting Services - Dedicated Service Agreement Page 1 of 6

Hosting Services - Dedicated Service Agreement Page 1 of 6 Hosting Services - Dedicated Service Agreement Page 1 of 6 This Hosting Services - Dedicated Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description This Bare Metal Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Hosted Office Communications Server Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Hosted Office Communications Server Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Hosted Office Communications Server Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

Access - Point-to-Point VPN Tunnel Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description

Access - Point-to-Point VPN Tunnel Service Agreement. 1.0 Terminology. 3.0 Service Options. 4.0 Service Delivery. 2.0 Service Description This Access - Point-to-Point VPN Tunnel Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

Access - Data Center Ethernet Loop Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

Access - Data Center Ethernet Loop Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description This Access - Data Center Ethernet Loop Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

Hosted IDS Service Agreement. 1.0 Terminology. 2.0 Service Description

Hosted IDS Service Agreement. 1.0 Terminology. 2.0 Service Description This Hosted IDS Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The Master

More information

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Hosting Services Virtual Data Center Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

Hosting Services - Virtual Service Agreement Page 1 of 6

Hosting Services - Virtual Service Agreement Page 1 of 6 Hosting Services - Virtual Service Agreement Page 1 of 6 This Hosting Services - Virtual Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

Access - T1 Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Access - T1 Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Access - T1 Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

SSL Certificates Service Agreement. 1.0 Terminology. 2.0 Service Description

SSL Certificates Service Agreement. 1.0 Terminology. 2.0 Service Description This SSL Certificates Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Community Anchor Institution Service Level Agreement

Community Anchor Institution Service Level Agreement Community Anchor Institution Service Level Agreement Date: 3/13/2014 Version: 2.0 Prepared by: DC-Net Table of Contents 1 Service Level Agreement... 3 2 Definitions... 3 3 Service Delivery... 5 3.1 Network

More information

Managed Disaster Recovery Agreement. 1.0 Terminology. 2.0 Service Description

Managed Disaster Recovery Agreement. 1.0 Terminology. 2.0 Service Description This Managed Disaster Recovery Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to

More information

Managed Security Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Managed Security Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Managed Security Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Cloud Monitoring Service Agreement. 1.0 Terminology. 2.0 Service Description

Cloud Monitoring Service Agreement. 1.0 Terminology. 2.0 Service Description This Cloud Monitoring Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Mail Services Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Mail Services Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Mail Services Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

Managed DNS Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options. 4.0 Service Delivery

Managed DNS Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options. 4.0 Service Delivery This Managed DNS Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

Workplace Cloud Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery

Workplace Cloud Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description. 4.0 Service Delivery This Workplace Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

MS Hosted Exchange Service Agreement. 1.0 Terminology. 2.0 Service Description

MS Hosted Exchange Service Agreement. 1.0 Terminology. 2.0 Service Description This MS Hosted Microsoft Exchange Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

ALERT LOGIC LOG MANAGER & LOGREVIEW

ALERT LOGIC LOG MANAGER & LOGREVIEW SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOGREVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an infrastructure management

More information

MAILGUARD, WEBGUARD AND EMAIL ARCHIVING SERVICE SCHEDULE

MAILGUARD, WEBGUARD AND EMAIL ARCHIVING SERVICE SCHEDULE MAILGUARD, WEBGUARD AND EMAIL ARCHIVING SERVICE SCHEDULE 1. APPLICABILITY This Service Schedule is applicable only to the COF for the purchase of Mail Guard, Web Guard and Mail Archiving Services, to the

More information

ONESECURE MANAGED SECURITY SERVICES ADDENDUM AND SERVICE LEVEL AGREEMENT

ONESECURE MANAGED SECURITY SERVICES ADDENDUM AND SERVICE LEVEL AGREEMENT ONESECURE MANAGED SECURITY SERVICES ADDENDUM AND SERVICE LEVEL AGREEMENT This addendum (the Addendum ), dated this day of 20, amends the Telecommunications Account Agreement (the TAA ), dated,20 entered

More information

Access - Meshed IP WAN Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

Access - Meshed IP WAN Service Agreement. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description This Access - Meshed IP WAN Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

PCI DSS Reporting WHITEPAPER

PCI DSS Reporting WHITEPAPER WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts

More information

Managed Device Support Service Agreement Page 1 of 10

Managed Device Support Service Agreement Page 1 of 10 Managed Device Support Service Agreement Page 1 of 10 This Managed Device Support Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc.

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

Statement of Service Enterprise Services - AID Microsoft IIS

Statement of Service Enterprise Services - AID Microsoft IIS Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

Managed Internet Service

Managed Internet Service DAS MASTER AGREEMENT NUMBER: B-03-012 SERVICE/PRODUCT NAME: Internet Access: Dedicated Internet Service: SERVICE/PRODUCT DESCRIPTION: Managed Internet Service Managed Internet Service (MIS) is an Internet

More information

SYSTEM SOFTWARE AND OR HARDWARE SUPPORT SERVICES (PREMIUM 24x7)

SYSTEM SOFTWARE AND OR HARDWARE SUPPORT SERVICES (PREMIUM 24x7) SYSTEM SOFTWARE AND OR HARDWARE SUPPORT SERVICES (PREMIUM 24x7) These System Software and or Hardware System Support Services terms and conditions ( Terms and Conditions ) apply to any quote, order, order

More information

FIRN Secure Internet Bundled Services:

FIRN Secure Internet Bundled Services: FIRN INTERNET SECURITY BUNDLE SERVICES AND NEW ADVANCED SECURITY OPTIONAL SERVICES (New Services and Prices Available July 1, 2014. CSAB Orders can be placed as early as March 1, 2014) Ethernet Bandwidth

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Managed Computer Support Service Agreement Page 1 of 9

Managed Computer Support Service Agreement Page 1 of 9 Managed Computer Support Service Agreement Page 1 of 9 This Managed Computer Support Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum

UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum UC CLOUD VOICE SERVICE ADDITIONAL TERMS AND CONDITIONS AND SERVICE LEVEL AGREEMENT to the UC Cloud Voice Service Addendum This UC Cloud Voice Service Additional Terms and Conditions and Service Level Agreement

More information

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS

EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS EASYNET CHANNEL PARTNERS LIMITED PARTNER MASTER SERVICES AGREEMENT MANAGED IP VPN MPLS PRODUCT TERMS Registered Office at: St James House Oldbury Bracknell RG12 8TH Company No: 03676297 BMI MSA 20150402

More information

Statement of Service. Enterprise Services - WATCH MySQL Database. Customer. MANAGE Services for MySQL

Statement of Service. Enterprise Services - WATCH MySQL Database. Customer. MANAGE Services for MySQL Statement of Service Enterprise Services - WATCH MySQL Database Customer 1 TABLE OF CONTENTS 1.0 Introduction... 5 2.0 Engagement overview & scope... 5 3.0 Detailed Scope... 6 3.1 24/7 Monitoring and Alerting...

More information

Enterprise UNIX Services - Systems Support - Extended

Enterprise UNIX Services - Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for

More information

Offer Specifications Remote Infrastructure Monitoring

Offer Specifications Remote Infrastructure Monitoring Service Overview Offer Specifications Remote Infrastructure Monitoring This service provides Dell Remote Infrastructure Monitoring services (RIM, the Service or Services ) as set forth more specifically

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

CONTINUOUS LOG MANAGEMENT & MONITORING

CONTINUOUS LOG MANAGEMENT & MONITORING OFFERING BRIEF: CONTINUOUS LOG MANAGEMENT & MONITORING ALERT LOGIC LOG MANAGER AND ALERT LOGIC ACTIVEWATCH FOR LOG MANAGER Virtually every system you use to manage and run your business creates log data.

More information

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting

SERVICE LEVEL AGREEMENT - Shared Exchange Hosting SERVICE LEVEL AGREEMENT - Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Constructure

More information

Ancero Backup & Disaster Recovery (BDR) Service Guide

Ancero Backup & Disaster Recovery (BDR) Service Guide Ancero Backup & Disaster Recovery (BDR) Service Guide Contents Service Overview... 3 Ancero Backup and Disaster Recovery... 3 Hardware Warranty... 3 Warranty Exclusions and Limitations... 3 Extended Hardware

More information

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting

SERVICE LEVEL AGREEMENT: Shared Exchange Hosting SERVICE LEVEL AGREEMENT: Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Global Data

More information

Time Warner Cable Business Class Ethernet and Dedicated Internet Access Service Level Agreement

Time Warner Cable Business Class Ethernet and Dedicated Internet Access Service Level Agreement Time Warner Cable Business Class Ethernet and Dedicated Internet Access Service Level Agreement This document outlines the Service Level Agreement ( SLA ) for the Ethernet and Dedicated Internet Access

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT Shared Exchange Hosting This Service Level Agreement (this SLA ) governs the use of the Services under the terms of the Master Service Agreement (the MSA ) between Intermedia Technologies

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This service level agreement ( SLA ) is incorporated into the master services agreement ( MSA ) and applies to all services delivered to customers. This SLA does not apply to the

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

MANAGED PBX SERVICE SCHEDULE

MANAGED PBX SERVICE SCHEDULE MANAGED PBX SERVICE SCHEDULE 1. APPLICABILITY This Service Schedule is applicable only to the COF for the purchase of Managed PBX Services which has been signed by the Customer and Neotel. 2. DEFINITIONS

More information

Dell Advanced Network Monitoring Services Service Description

Dell Advanced Network Monitoring Services Service Description Dell Service Description 1. INTRODUCTION TO YOUR SERVICE AGREEMENT Advanced Network Monitoring: Network outages or network performance problems can cause significant economic impacts to your day to day

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint

Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint Statement of Service Enterprise Services - MANAGE AppTone Server Management for SharePoint CUSTOMER Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 EHIBIT Q to Amendment No. 60 - APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT EHIBIT Q to Amendment No.

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

I n t e l l i g e n t N e t w o r k S o l u t i o n s

I n t e l l i g e n t N e t w o r k S o l u t i o n s This NetWolves Service Level Agreement ("SLA") provides detailed Descriptions of Metrics for NetWolves service performance and installation for Business Internet Access Services ( BIA Services ). This

More information

Managed Backup and Recovery Service Agreement. 1.0 Terminology. 2.0 Service Description

Managed Backup and Recovery Service Agreement. 1.0 Terminology. 2.0 Service Description This Managed Backup and Recovery Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to

More information

Conferencing Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options. 4.0 Service Delivery

Conferencing Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options. 4.0 Service Delivery This Conferencing Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer. The

More information

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services

XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services 1.0 PRODUCT AND SERVICES 1.1 Product Descriptions. XO Wide Area Network ( WAN ) Services IP Virtual Private Network Services Ethernet VPLS Services (a) XO IP VPN. XO IP VPN is a layer 3 data networking

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Managed IT Services Terms & Conditions. I. Overview. Definitions

Managed IT Services Terms & Conditions. I. Overview. Definitions I. Overview Managed IT Services Terms & Conditions This Agreement states the terms and conditions by which Azul Services (heretofore known as Provider ) will deliver, and Customer (heretofore known as

More information

Statement of Service Enterprise Services - MANAGE Microsoft IIS

Statement of Service Enterprise Services - MANAGE Microsoft IIS Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The

More information

Sample Vulnerability Management Policy

Sample Vulnerability Management Policy Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director

More information

Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access

Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access Statement of Service Enterprise Services - AID Servers: Windows/Linux/Unix Network Infrastructure: Switches/Routers/Firewall/Wireless Access Customer Proprietary Rights The information in this document

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

1.1.1. Interoute Application Management comprises the following managed services for application and database software:

1.1.1. Interoute Application Management comprises the following managed services for application and database software: 1. SERVICE DESCRIPTION 1.1. Scope of Interoute Application Management Services 1.1.1. Interoute Application Management comprises the following managed services for application and database software: a)

More information

1 ForestSafe SaaS Service details Service Description Functional Non Functional

1 ForestSafe SaaS Service details Service Description Functional Non Functional 1 ForestSafe SaaS Service details 1.1 Service Description ForestSafe is a privileged identity management system used today to manage the Administrator passwords of 65,000 computers by the UK largest bank.

More information

QAD CLOUD EDI PROGRAM DOCUMENT

QAD CLOUD EDI PROGRAM DOCUMENT QAD CLOUD EDI POGAM DOCUMENT This QAD Cloud EDI Program Document establishes terms and conditions for Cloud Services ordered by Customer and provided by Vendor under an Order Document executed under a

More information

How To Get Paece Vpn On A Paucec Network For Free

How To Get Paece Vpn On A Paucec Network For Free MPLS VIRTUAL PRIVATE NETWORK SERVICE 1. DESCRIPTION. This service description sets forth the entire Preferred Advantage SM Multiprotocol Label Switching Site to Site IP Virtual Private Network Service

More information

Network Monitoring and Management Services: Standard Operating Procedures

Network Monitoring and Management Services: Standard Operating Procedures Network Monitoring and Management Services: Standard Operating Procedures September 17, 2013 TABLE OF CONTENTS Purpose... 2 Contacts... 2 Standard Operating Procedures... 3 Hours of Coverage... 3 Contacting

More information

Statement of Service Enterprise Services - WATCH Storage: Block-based, SAN-Attached File-based, Network-Attached

Statement of Service Enterprise Services - WATCH Storage: Block-based, SAN-Attached File-based, Network-Attached Statement of Service Enterprise Services - WATCH Storage: Block-based, SAN-Attached File-based, Network-Attached Customer Proprietary Rights The information in this document is confidential to Arrow Managed

More information

SERVICE LEVEL AGREEMENT. Open Source Support Desk B.V. Hargray, Inc.

SERVICE LEVEL AGREEMENT. Open Source Support Desk B.V. Hargray, Inc. SERVICE LEVEL AGREEMENT between Open Source Support Desk B.V. and Hargray, Inc. Copyright 2011 by Open Source Support Desk B.V. All rights reserved. This document is protected by copyright. No part of

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

AriesoGEO Support Services Terms and Conditions (12x5)

AriesoGEO Support Services Terms and Conditions (12x5) AriesoGEO Support Services Terms and Conditions (12x5) These Standard Support Services terms and conditions ( Terms and Conditions ) apply to any quote, order, order acknowledgment, and invoice, and any

More information

January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement

January 2015. Brennan Voice and Data Pty Ltd. Service Level Agreement January 2015 Brennan Voice and Data Pty Ltd Service Level Agreement 1. Introduction This document describes the service level commitment to Brennan Voice and Data Clients in relation to the following services

More information

Systems Support - Standard

Systems Support - Standard 1 General Overview This is a Service Level Agreement ( SLA ) between document: and Enterprise Windows Services to The technology services Enterprise Windows Services provides to the customer The targets

More information

ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z

ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z ADDITIONAL TERMS FOR HOSTED EXCHANGE SERVICES SCHEDULE 2Z CONTENTS 1 Service Description... 3 2 Definitions... 3 3 Service Terms... 4 3.1 Scope of Hosted Exchange Services... 4 3.2 Data centre locations...

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010

SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 SHARED WEB AND MAIL HOSTING SERVICE LEVEL AGREEMENT (SLA) 2010 This Service Level Agreement (SLA) ( Service Level Agreement or Agreement or SLA ) is by and between Bizcom Web Services, Inc. (the "Company")

More information

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS)

BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) BridgeConnex Statement of Work Managed Network Services (MNS) & Network Monitoring Services (NMS) 1. Introduction This Statement of Work (SOW) is an appendix to the existing Master Services Agreement between

More information

PBX SCHEDULE TO FIBERNETICS MASTER SERVICES AGREEMENT

PBX SCHEDULE TO FIBERNETICS MASTER SERVICES AGREEMENT PBX SCHEDULE TO FIBERNETICS MASTER SERVICES AGREEMENT This PBX Schedule is an attachment to and forms an integral part of Fibernetics Master Services Agreement (the Agreement ) and the Customer agrees

More information

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division

Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division Service Level Agreement Between: Computing and Informational Technology And The Finance and Business Operations Division 1/9 1. Executive Summary This Service Level Agreement ( SLA ) is between Computing

More information

MSA AGREEMENT ANNEXURE C SERVICE LEVEL AGREEMENT

MSA AGREEMENT ANNEXURE C SERVICE LEVEL AGREEMENT MSA AGREEMENT ANNEXURE C SERVICE LEVEL AGREEMENT Page 1 of 12 DOCUMENT INDEX DEFINITIONS INTRODUCTION Overview Purpose & Objectives Duration & Validity Scope SERVICES AND SERVICE LEVEL DEFINITION Commitment

More information

SERVICE LEVEL AGREEMENT (SLA)

SERVICE LEVEL AGREEMENT (SLA) SERVICE LEVEL AGREEMENT (SLA) This agreement covers the provision and support of the Managed Networking Services and details the service targets and obligations set and maintained by One...Solutions. Further,

More information

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION

GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION GMS NETWORK ADVANCED WIRELESS SERVICE PRODUCT SPECIFICATION 1. INTRODUCTION This document contains product information for the GMS Network Service. If you require more detailed technical information, please

More information

IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum

IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Service Addendum IP/MPLS VPN SERVICE - ADDITIONAL TERMS & CONDITIONS to the IP/MPLS Addendum These IP/MPLS VPN Additional Terms & Conditions are part of the IP/MPLS Addendum ( Addendum ). 1. SELECTED DEFINITIONS. Unless

More information

Workplace-As-A-Service SLA 1

Workplace-As-A-Service SLA 1 Workplace-As-A-Service SLA 1 SPRINT WORKPLACE-AS-A-SERVICE ( Workplace ) SERVICE LEVEL AGREEMENT Effective: September 16, 2015 1. POLICY. As one indicator of Sprint s service commitment, Sprint provides

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades.

Overview Software Assurance is an annual subscription that includes: Technical Support, Maintenance and Software Upgrades. Software Maintenance & Support Agreement This agreement ( Support Agreement, Software Assurance, Agreement ) is for the purpose of defining the terms and conditions under which Technical Support, Maintenance

More information