Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
SLA For Problem Management
1. Parties: Identification of the service provider and customer, including full legal names, registration numbers, and addresses
2. Background: Context of the agreement, relationship between parties, and general purpose of the problem management services
3. Definitions: Detailed definitions of technical terms, service levels, problem categories, and other key concepts used throughout the agreement
4. Service Scope: Detailed description of the problem management services covered, including systems, applications, and infrastructure in scope
5. Service Level Targets: Specific, measurable targets for problem management, including response times, resolution times, and quality metrics
6. Problem Management Process: Detailed description of the problem management methodology, including identification, classification, investigation, and resolution procedures
7. Roles and Responsibilities: Clear delineation of responsibilities between service provider and customer, including key personnel and escalation paths
8. Reporting and Review: Requirements for service level reporting, performance reviews, and continuous improvement processes
9. Data Protection and Security: Obligations regarding data handling, security measures, and GDPR compliance
10. Fees and Payment: Pricing structure, payment terms, and any penalties or credits related to service level performance
11. Term and Termination: Duration of the agreement, renewal terms, and conditions for termination
12. General Terms: Standard legal provisions including liability, force majeure, governing law, and dispute resolution
1. Transition Services: Details of service transition if taking over from another provider or internal team
2. Business Continuity: Additional provisions for ensuring service continuity during disasters or major incidents
3. Innovation and Improvement: Framework for implementing service improvements and new technologies
4. Multi-vendor Management: Procedures for coordination with other service providers in a multi-vendor environment
5. Knowledge Management: Requirements for maintaining and transferring knowledge base and documentation
6. Root Cause Analysis: Detailed procedures for conducting and reporting root cause analysis for major problems
7. Staff Requirements: Specific requirements for staff qualifications, security clearance, or certifications
1. Schedule 1 - Service Level Definitions: Detailed definitions and calculations of all service level metrics
2. Schedule 2 - Pricing and Credits: Detailed pricing structure and service credit calculations
3. Schedule 3 - Operational Procedures: Detailed operational procedures, including tools, templates, and workflows
4. Schedule 4 - Contact Matrix: Contact details for key personnel and escalation paths
5. Schedule 5 - Systems and Applications: Detailed list of systems and applications covered by the agreement
6. Appendix A - Problem Categories: Detailed classification and prioritization matrix for problems
7. Appendix B - Report Templates: Templates for various reports required under the agreement
8. Appendix C - Security Requirements: Detailed security requirements and procedures
Authors
Find the exact document you need
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.