Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
IT Service Level Agreement
1. Parties: Identification of the service provider and customer, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement and brief description of the services to be provided
3. Definitions: Detailed definitions of technical terms, service metrics, and other key terms used throughout the agreement
4. Service Description: Comprehensive description of the IT services covered by the agreement
5. Service Levels: Detailed performance metrics, measurement methods, and minimum service level requirements
6. Service Availability: Specified hours of operation, maintenance windows, and guaranteed uptime percentages
7. Response and Resolution Times: Timeline commitments for addressing various categories of issues and incidents
8. Performance Monitoring: Methods and tools used to monitor service performance and generate reports
9. Service Credits: Compensation mechanism for service level failures and calculation methods
10. Data Protection and Security: GDPR compliance measures and security requirements for data handling
11. Incident Management: Procedures for reporting, escalating, and resolving service incidents
12. Customer Obligations: Requirements and responsibilities of the customer
13. Provider Obligations: Requirements and responsibilities of the service provider
14. Payment Terms: Service fees, payment schedule, and billing procedures
15. Term and Termination: Duration of agreement, renewal terms, and termination conditions
16. Liability and Indemnification: Limitations of liability and indemnification obligations
17. Force Majeure: Circumstances under which parties are excused from performance obligations
18. Governing Law and Jurisdiction: Specification of Danish law governance and jurisdiction for disputes
1. Disaster Recovery: Required for critical services needing specific disaster recovery procedures
2. Business Continuity: Needed when service requires detailed business continuity planning
3. Change Management: Include when service involves frequent system or process changes
4. Third-Party Dependencies: Required when service delivery depends on third-party providers
5. Knowledge Transfer: Include when service includes training or knowledge sharing requirements
6. Exit Management: Needed for complex services requiring detailed transition arrangements
7. Environmental Requirements: Include when service has specific environmental compliance needs
8. Regulatory Compliance: Required for services in regulated industries beyond standard requirements
1. Schedule 1 - Service Specifications: Detailed technical specifications of all services covered
2. Schedule 2 - Service Level Metrics: Detailed metrics, thresholds, and measurement methodologies
3. Schedule 3 - Pricing and Payment: Detailed fee structure, rates, and payment terms
4. Schedule 4 - Support Services: Support level definitions and escalation procedures
5. Schedule 5 - Security Requirements: Detailed security protocols and requirements
6. Schedule 6 - Data Processing Agreement: GDPR-compliant data processing terms and procedures
7. Schedule 7 - Business Continuity Plan: Detailed continuity and recovery procedures
8. Schedule 8 - Contact Matrix: Key contacts and escalation paths for both parties
9. Appendix A - Service Request Procedures: Procedures for requesting changes or additional services
10. Appendix B - Report Templates: Templates for various service reports and measurements
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.