Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identifies the service provider and client with full legal names and registered addresses
2. Background: Outlines the context of the agreement and the parties' intentions
3. Definitions: Defines key terms used throughout the agreement
4. Scope of Services: Detailed description of IT support services to be provided
5. Service Level Agreement: Defines response times, resolution times, and service quality metrics
6. Term and Termination: Duration of the agreement and conditions for termination
7. Fees and Payment: Payment terms, rates, and billing procedures
8. Obligations of Service Provider: Key responsibilities and commitments of the IT support provider
9. Client Responsibilities: Client's obligations to enable service delivery
10. Confidentiality: Protection of confidential information and data
11. Data Protection: Compliance with PDPA and data handling requirements
12. Intellectual Property: Ownership and usage rights of IP
13. Limitation of Liability: Limits on liability and indemnification provisions
14. Force Majeure: Provisions for unforeseen circumstances
15. General Provisions: Standard legal clauses including notices, amendments, and governing law
1. Hardware Maintenance: Include when physical IT equipment maintenance is part of the service
2. Software Development: Required if custom software development or modifications are included
3. Disaster Recovery: Include for contracts requiring specific disaster recovery services
4. Training Services: Add when user training is part of the support package
5. Security Requirements: Include for contracts with specific security compliance needs
6. Change Management: Add for contracts requiring formal change control procedures
7. Third-Party Vendors: Include when managing third-party vendor relationships is part of the service
8. Service Credits: Add when including financial penalties for missing service levels
1. Schedule A - Service Descriptions: Detailed breakdown of each service component and support level
2. Schedule B - Service Level Metrics: Specific metrics, measurement methods, and reporting requirements
3. Schedule C - Fee Schedule: Detailed pricing, payment terms, and rate cards
4. Schedule D - Supported Systems: List of hardware and software covered under the agreement
5. Schedule E - Contact Details: Key personnel and escalation paths for both parties
6. Schedule F - Security Protocols: Detailed security procedures and requirements
7. Appendix 1 - Service Request Procedures: Process for submitting and handling support requests
8. Appendix 2 - Acceptable Use Policy: Guidelines for appropriate use of IT support services
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
