Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement)

Similar documents
Milk Support Service Level Agreement

Service Level Agreement (SLA) for The Texas State University System Office

STANDARD (PAY AS YOU GO) PRE-PAID SUPPORT PACKAGE SERVICE LEVEL AGREEMENT

Service Level Commitment (SLC) for NewsMemory Service by Tecnavia S.A.

SLA AGREEMENT. Hosting & Services

NUCONNECT INTERNET ACCEPTABLE USE POLICY

: Acceptable Use Policy

Version v November 2015

Acceptable Use and Publishing Policy

Acceptable Use Policy

Service Level Agreement

v February 2016

II.C.4. Policy: Southeastern Technical College Computer Use

Acceptable Use Policy

PTLGateway Acceptable Use Policy

Version v November 2015

Glenwood Telecommunications, Inc. Acceptable Use Policy (AUP)

Acceptable Use Policy

Acceptable Use Policy

Corporate Policy. Revision Change Date Originator Description Rev Erick Edstrom Initial

Service Level Agreement (SLA) For Nursing by Academic Technology Web Team

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Acceptable Use Policy Updated 1/16/2018

Application Lifecycle Management on Softwareas-a-Service

Acceptable Use Policy

Acceptable Use Policy

Acceptable Use Policy. Effective January 2017

SERVICE LEVEL AGREEMENT (SLA)

WAFA X3 Evolution Grade of Service. 13 October 2008

Guest Wireless Policy

Cleveland State University General Policy for University Information and Technology Resources

Draft. Policies of Colorado State University University Policy. Category: Information Technology

APPLICATION TO OPEN PORTS THROUGH THE FIREWALL

SERVICE LEVEL AGREEMENTS CALNET 3, Category 7 Network Based Managed Security

Acceptable Use Policy

Acceptable Usage Policy

Acceptable Use Policy (AUP)

Acceptable Use Policy ("AUP")

Terms of Service. Overdue Accounts If your account is overdue, the server will be shut down and access removed till payment is

The following is the Lightning IP Acceptable Usage Policy ( AUP ) for all Users of the Lightning IP Services. In General

ACCEPTABLE USE POLICY (AUP) 3W INFRA reserves the right to unilaterally amend the conditions set out in the Acceptable Use Policy (the Policies ).

Acceptable Usage Policy Published by FirstNet March 2015

3. As far as the hosting services of WWW INFOTECH are through leased severs of our data centre partners in US and UK through contracts.

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

Midstate Telephone & Midstate Communications. Acceptable Use Policy

Service Specific Terms & Conditions

HOSTING SERVICES AGREEMENT

Grades of Service at a glance

region16.net Acceptable Use Policy ( AUP )

IBM Managed Security Services for Security

Clearswift Managed Security Service for

SECURITY & PRIVACY DOCUMENTATION

BUCKEYE INTERNET SERVICE ACCEPTABLE USE POLICY

Bentley Walker StarCom Grade of Service. 4 th June 2010

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

GhostFiber Acceptable Use Policy

Terms and Conditions of use for the

Registration Agreement

SPECIFIC TERMS METRO ETHERNET SERVICE

IT ACCEPTABLE USE POLICY

ACCEPTABLE USE AND NETWORK MANAGEMENT POLICY

Tyson Communications Acceptable Use and Network Management Policy

Service Level Agreement

Service Level Agreements Category 7 Network Based Managed Security

Acceptable use policy for SLT idc services(ver 1.2)

Support Policy and Service Level Commitment

Internet Service Provider Agreement

HX Grade of Service W3a & Sesat2 Middle East. 16 Jan 2008

Version v January 2016

Bloom Broadband Acceptable Use Policy

The AUP applies to all Snowball products and services but is in particular applicable to internet services.

AppPulse Point of Presence (POP)

Security Annex for Firewalls Additional Terms for Firewall Service

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

SERVICE LEVEL AGREEMENT

Updated December 12, Chapter 10 Service Description IBM Cloud for Government

SCHEDULE DOCUMENT N4PROTECT DDOS SERVICE PUBLIC NODE4 LIMITED 28/07/2017

The registration of Domain Names will be centralized and managed through all DOT accredited Registrars selected by the Registry.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

USAGE POLICIES. is defamatory, offensive, abusive, indecent, obscene, or constitutes harassment;

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Magna5 reserves the right to make modifications to this policy at any time.

Acceptable Use Policy

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

MT4 VPS SERVICE TERMS AND CONDITIONS

Service Level Agreement (SLA) and Service Level Objectives (SLO)

Blackbaud Subscription Services Service Description for Australia and Asia Pacific

Eco Web Hosting Security and Data Processing Agreement

FreedomNet Solutions Acceptable Use Policy ( )

Service Level Agreement Public CaaS Service Level Terms

INTERNET ACCESS SERVICE AGREEMENT PLEASE READ CAREFULLY

SERVICE LEVEL AGREEMENT

Service Level Agreement

cpouta - IaaS Cloud Computing Service Service Level Agreement

S E R V E R C E N T R E

BCDC 2E, 2012 (On-line Bidding Document for Stipulated Price Bidding)

REPORTING INFORMATION SECURITY INCIDENTS

How to Backup CLIP Software using the CLIP Backup Program created 6/1/2009

Managed WAN SLA. Contents

Transcription:

Service Level Agreement (SLA) for Customer by Cybersmart Pty Ltd (Cloud Hosting Agreement) Effective Date: Document Owner: Cybersmart ISP Version Version Date Description Author 1.0.2 03-01-201 Service Level Agreement Zaid Bester Approval (By signing below, all Approvers agree to all terms and conditions outlined in this Agreement.) Approvers Role Signed Approval Date Cybersmart ISP Service Provider Customer Cybersmart ISP SP 1998

Table of Contents 1. Agreement Overview... 3 2. Goals & Objectives... 3 3. Stakeholders... 3 4. Periodic Review... 4 5. Service Agreement... 4 6. Service Management... 6 2/

1. Agreement Overview This Agreement represents a Service Level Agreement ( SLA or Agreement ) between Cybersmart. and Client for the provisioning of Cloud Hosting Service required to support and sustain the Product or service. This Agreement remains valid until superseded by a revised agreement mutually endorsed by the stakeholders. This Agreement outlines the parameters of all Cloud hosted services, including and not isolated to management or deployment within the cloud, as covered and mutually understood by the primary stakeholders. This Agreement does not supersede current processes and procedures unless explicitly stated herein. 2. Goals & Objectives The purpose of this Agreement is to ensure that the proper elements and commitments are in place to provide consistent Cloud Hosting Services and delivery to the Customer(s) by the Service Provider(s). The goal of this Agreement is to obtain mutual agreement for Cloud Hosting Services between the Service Provider(s) and Customer(s). The objectives of this Agreement are to: Provide clear reference to service ownership, accountability, roles and/or responsibilities. Present a clear, concise and measurable description of service provision to the customer. Match perceptions of expected service provision with actual service support & delivery. 3. Stakeholders The following Service Provider(s) and Customer(s) will be used as the basis of the Agreement and represent the primary stakeholders associated with this SLA: Cloud Hosting Provider(s): Cybersmart ISP ( Provider ) Cloud Hosting Customer(s): Customer ( Customer ) 3/

4. Periodic Review This Agreement is valid from the Effective Date outlined herein and is valid until further notice. This Agreement should be reviewed at a minimum once per fiscal year; however, in lieu of a review during any period specified, the current Agreement will remain in effect. The Business Relationship Manager ( Document Owner ) is responsible for facilitating regular reviews of this document. Contents of this document may be amended as required, provided mutual agreement is obtained from the primary stakeholders and communicated to all affected parties. The Document Owner will incorporate all subsequent revisions and obtain mutual agreements / approvals as required. Business Relationship Manager: Cybersmart Pty Ltd Review Period:12 Months Previous Review Date: 3 January 2016 Next Review Date: 3 January 201 5. Service Agreement The following detailed service parameters are the responsibility of the Service Provider in the ongoing support of this Agreement. 5.1. Service Scope The following Services are covered by this Agreement; o Manned telephone support o Monitored email support o Remote assistance using Remote Desktop and a Virtual Private Network where available o Planned or Emergency Onsite assistance (extra costs apply) o Monthly system reporting 4/

5.2. Customer Requirements Customer responsibilities and/or requirements in support of this Agreement include: Payment for all support costs at the agreed interval. Reasonable availability of customer representative(s) when resolving a service related incident or request. Clients are responsible for backup of their services within the Cloud unless otherwise stipulated and documented. Cloud hosted services are subject to self-management where applicable Clients are responsible for managing, patching and maintaining their own servers, operating systems and software installed Customers encouraged to keep backups of local copy of the data on their servers for DR situations. 5.3. Service Provider Requirements Service Provider responsibilities and/or requirements in support of this Agreement include: Meeting response times associated with infrastructure and initial setup related incidents. Appropriate notification to Customer for all scheduled maintenance. Cybersmart will not be responsible for services or maintenance to the services provided Virtual Machine backups, If selected by the customer, can be done daily weekly or monthly, backups are kept on a separate data store in a different Data Centre. Virtual Machine backup restorations are done at the customers request at a cost, please request a quote prior to any restoration. In the event of hardware failure no guarantees are provided for restoration without a relevant backup available from the client unless otherwise stipulated and documented. 5.4. Service Assumptions Assumptions related to in-scope services and/or components include: Changes to services will be communicated and documented to all stakeholders. 5/

6. Service Management Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components. 6.1 Cybersmart will provide Customer with Server Hosting set out herein in accordance with this Service Level Agreement ( Service Level Agreement ). 6.1.1. We warrant that Cybersmart has the facilities, infrastructure, capacity, and capability to provide the Services. 6.1.2. Despite this warranty, the Services are provided "as is" and "as available". No warranty of any kind is given, whether express or implied, including warranties of merchantability, title, or non-infringement, except where such a warranty is specifically required by law. 6.4 For the purpose of this Service Level Agreement: 6.5.1 service uptime will be measured by Cybersmart s monitoring software and only with reference to Cybersmart s network availability and UPS power; 6.5.2 the calculation of service uptime will exclude any downtime, outage or interruption or unavailability of the Server Hosting, as a result of, or caused by: 6.5.2.1 any outage, interruption or unavailability of the services or facilities of an external or third party telecommunications or network provider to which the Cybersmart network infrastructure is connected/ 6.5.2.2 any outage, interruption or unavailability caused by Customer s hardware, software and/or applications; 6.5.2.3 scheduled downtime for general maintenance, enhancements, upgrades or modifications (or of an otherwise scheduled nature). Cybersmart shall use its reasonable endeavors to notify Customer of such downtime and shall furthermore use its reasonable endeavors to provide such notification at least 24 (twenty four) hours prior to such scheduled downtime. 6.5.2.4 Force Majeure; 6.5.2.5 Any action or omission of the Customer, including without limitation, accidental damage, operator errors, abnormal operating conditions, the connection of unauthorized peripheral equipment, improper use, misuse, neglect or abuse of hosting service; and 6.5.2.6 Any factor beyond the reasonable control of Cybersmart. 6.6 Cybersmart will provide the monitoring service, and on a monthly basis provide uptime reports on request by Customer should Server statistics be required. 6/

6.8 Cybersmart will keep Customer informed of the progress of the problem resolution. Cybersmart will endeavor to adhere to the following times (in business hours) with regard to feedback.. Prohibited Activities The following sections outline activities that are considered an unacceptable use of Company's services/network/website/server/virtual machine and also detail the guidelines for acceptable use of certain facilities/services, as the case may be..1.1. Any activity, which threatens the functioning, security and/or integrity of Cybersmart s network is unacceptable. This includes:.1.2. Any efforts to attempt to gain unlawful and unauthorised access to the network or circumvent any of the security measures established by Cybersmart for this goal;.1.3. Any effort to use Cybersmart s equipment to circumvent the user authentication or security of any host, network or account ( cracking or hacking );.1.4. Forging of any TCP-IP packet header (spoofing) or any part of the header information in an email or a newsgroup posting;.1.5. Any effort to breach or attempt to breach the security of another user or attempt to gain access to any other person's computer, software, or data without the knowledge and consent of such person;.1.6. Any activity which threatens to disrupt the service offered by Cybersmart through denial of service attacks ; flooding of a network, or overloading a service or any unauthorized probes ("scanning" or "nuking") of others' networks;.1.. Any activity which in any way threatens the security of the network by knowingly posting, transmitting, linking to or otherwise distributing any information or software which contains a virus; Trojan horse; worm, lock, mail bomb, cancel bot or other harmful, destructive or disruptive component..1.8. Any unauthorized monitoring of data or traffic on the network without Cybersmart s explicit, written consent..1.9. Any unsolicited mass mailing activity including direct marketing; spam and chain letters for commercial or other purposes, without the consent of the recipients of those mails. /