Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the service provider and customer, including full legal names and addresses
2. Background: Context of the agreement, identifying the software to be maintained and the general purpose of the maintenance services
3. Definitions: Defined terms used throughout the agreement, including technical terms specific to software maintenance
4. Scope of Services: Detailed description of maintenance services, including preventive maintenance, corrective maintenance, and support services
5. Service Provider Obligations: Key responsibilities of the maintenance provider, including response times, maintenance windows, and quality standards
6. Customer Obligations: Customer's responsibilities, including providing access, information, and maintaining proper operating environment
7. Service Levels: Specific performance metrics, response times, and service availability commitments
8. Fees and Payment: Maintenance fees, payment terms, and any additional charges
9. Term and Termination: Duration of the agreement, renewal terms, and termination rights
10. Intellectual Property: Ownership of modifications, improvements, and any new developments
11. Confidentiality: Protection of confidential information exchanged during maintenance services
12. Liability and Indemnification: Limitations of liability and indemnification obligations
13. Force Majeure: Provisions for handling events beyond reasonable control
14. General Provisions: Standard boilerplate clauses including notices, assignment, and governing law
1. Change Management: Procedures for requesting and implementing changes to the maintenance services or supported software. Include when significant modifications are anticipated.
2. Disaster Recovery: Procedures for maintaining service continuity in case of disasters. Include for business-critical software.
3. Security Requirements: Specific security protocols and compliance requirements. Include when handling sensitive data or in regulated industries.
4. Training: Provisions for training customer's staff. Include when regular knowledge transfer is needed.
5. Audit Rights: Rights to audit service provider's performance and compliance. Include for regulated industries or when handling sensitive data.
6. Insurance: Specific insurance requirements. Include for high-value contracts or when required by regulation.
7. Third-Party Software: Provisions relating to maintenance of third-party components. Include when solution includes third-party software.
8. Data Protection: Specific data protection and privacy requirements. Include when personal data is processed.
1. Schedule A - Maintained Software: Detailed list of software components covered by the maintenance agreement, including versions and configurations
2. Schedule B - Service Level Agreement: Detailed service levels, performance metrics, and remedies for failure to meet SLAs
3. Schedule C - Fee Schedule: Detailed breakdown of maintenance fees, including any variable charges and rate cards
4. Schedule D - Support Procedures: Detailed procedures for requesting and providing support, including escalation procedures
5. Schedule E - Technical Requirements: Technical specifications and requirements for providing maintenance services
6. Schedule F - Contact Details: Key contacts and communication protocols for both parties
7. Appendix 1 - Incident Classification: Definitions and examples of different types of incidents and their priority levels
8. Appendix 2 - Change Request Template: Standard form for requesting and documenting changes to the maintained software
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
