Your data doesn't train Genie's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the service provider and the client, including their complete legal names, addresses, and registration details
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Definitions of technical terms, service-related terminology, and other important concepts used throughout the agreement
4. Scope of Services: Detailed description of IT support services to be provided, including core support areas and service boundaries
5. Service Provider Obligations: Key responsibilities and commitments of the IT support provider, including service delivery standards
6. Client Obligations: Client's responsibilities, including access provision, information sharing, and cooperation requirements
7. Service Levels: Specific service level agreements (SLAs), response times, and performance metrics
8. Data Protection and Security: Obligations and procedures for handling client data in compliance with the Data Privacy Act
9. Fees and Payment Terms: Pricing structure, payment schedule, and related financial terms
10. Term and Termination: Contract duration, renewal terms, and conditions for termination
11. Confidentiality: Provisions for protecting confidential information of both parties
12. Intellectual Property: Rights and restrictions regarding IP, including any licensed software or tools
13. Liability and Indemnification: Limitation of liability and indemnification obligations of both parties
14. Force Majeure: Provisions for handling circumstances beyond reasonable control
15. Governing Law and Jurisdiction: Specification of Philippine law as governing law and jurisdiction for disputes
1. Change Management: Procedures for requesting and implementing changes to services or terms, recommended for complex support arrangements
2. Disaster Recovery: Specific procedures and obligations for disaster recovery services, if included in the support scope
3. Staff Augmentation: Terms for providing on-site support staff, if required, including compliance with Philippine labor laws
4. Hardware Support: Specific terms for hardware maintenance and support if physical equipment is included
5. Training Services: Terms for providing training to client staff, if included in the service scope
6. Third-Party Vendors: Terms governing relationships with third-party service providers or software vendors
7. Knowledge Transfer: Provisions for transferring knowledge and documentation at contract end, important for complex systems
1. Schedule A - Service Description: Detailed breakdown of all IT support services, including specific technologies and systems covered
2. Schedule B - Service Levels: Detailed SLA metrics, measurement methods, and reporting requirements
3. Schedule C - Fee Schedule: Detailed pricing, including base fees, additional service charges, and expense policies
4. Schedule D - Escalation Matrix: Contact details and escalation procedures for various types of issues
5. Schedule E - Technical Requirements: Specific technical requirements, including supported systems, software versions, and infrastructure requirements
6. Schedule F - Security Protocols: Detailed security procedures and requirements for service delivery
7. Appendix 1 - Service Request Procedures: Step-by-step procedures for requesting and tracking support services
8. Appendix 2 - Incident Classification: Definitions and examples of different incident priority levels and their handling procedures
Find the document you need
骋别苍颈别鈥檚 Security Promise
Genie is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
