Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Procurement Service Level Agreement
1. Parties: Identification of the contracting parties, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, including the procurement process followed and general purpose of the services
3. Definitions and Interpretation: Definitions of key terms and interpretation rules for the agreement
4. Scope of Services: Detailed description of the services to be provided, including general obligations and service requirements
5. Service Levels and Performance Standards: Key performance indicators, measurement methods, and reporting requirements
6. Supplier Obligations: Specific responsibilities and commitments of the supplier, including quality standards and compliance requirements
7. Customer Obligations: Responsibilities and commitments of the customer, including cooperation and access requirements
8. Charges and Payment: Pricing structure, payment terms, invoicing procedures, and related financial provisions
9. Contract Governance: Management structure, meeting requirements, escalation procedures, and reporting obligations
10. Change Control: Procedures for requesting, approving, and implementing changes to the services or agreement
11. Audit and Compliance: Rights of audit, compliance requirements, and record-keeping obligations
12. Term and Termination: Duration of the agreement, renewal provisions, and termination rights
13. Liability and Insurance: Limitation of liability, indemnities, and insurance requirements
14. General Provisions: Standard legal provisions including notices, assignment, entire agreement, and governing law
1. Data Protection: Required if personal data processing is involved, detailing GDPR compliance requirements and data processing terms
2. Information Security: Required for services involving IT systems or sensitive information, detailing security requirements and protocols
3. Business Continuity and Disaster Recovery: Required for critical services, detailing backup and recovery procedures
4. Intellectual Property Rights: Required if services involve creation or use of intellectual property
5. Staff and Key Personnel: Required if specific personnel are crucial to service delivery or if staff transfer issues are relevant
6. Exit Management: Required for complex services requiring detailed transition arrangements at contract end
7. Regulatory Compliance: Required if services are subject to specific regulatory requirements beyond general law
8. Environmental Requirements: Required if environmental standards or sustainability requirements are particularly relevant
1. Schedule 1 - Service Description: Detailed technical and operational specification of the services
2. Schedule 2 - Service Levels: Detailed SLA metrics, measurement methods, and service credit regime
3. Schedule 3 - Charges: Detailed pricing structure, rate cards, and payment mechanisms
4. Schedule 4 - Customer Requirements: Specific customer standards, policies, and procedures to be followed
5. Schedule 5 - Supplier Solution: Supplier's technical solution and methodology for delivering the services
6. Schedule 6 - Performance Monitoring: Detailed procedures for monitoring and reporting on service performance
7. Schedule 7 - Governance and Reports: Detailed governance procedures and required reports
8. Schedule 8 - Change Control Procedure: Detailed process for managing changes
9. Appendix A - Form of Change Request: Template for submitting and documenting change requests
10. Appendix B - Key Personnel: Details of key supplier personnel assigned to the services
11. Appendix C - Approved Subcontractors: List of approved subcontractors and their roles
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.