Create a bespoke document in minutes, Â or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Outsourcing Service Agreement
"I need an Outsourcing Service Agreement for IT support services between our Qatar-based financial services company and a global service provider, with specific provisions for data security and compliance with QFC regulations, planned to commence in March 2025."
1. Parties: Identification of the contracting parties, including full legal names, registration details, and addresses
2. Background: Context of the agreement, business relationship, and purpose of the outsourcing arrangement
3. Definitions: Detailed definitions of terms used throughout the agreement
4. Scope of Services: Detailed description of services to be provided, including specific deliverables and exclusions
5. Term and Termination: Duration of the agreement, renewal terms, and circumstances for termination
6. Service Provider Obligations: Key responsibilities and commitments of the service provider
7. Client Obligations: Responsibilities and commitments of the client
8. Service Levels: Performance standards, metrics, and measurement methods
9. Fees and Payment Terms: Pricing, payment schedule, invoicing, and payment methods
10. Data Protection and Confidentiality: Obligations regarding data handling, privacy, and confidential information
11. Intellectual Property Rights: Ownership and usage rights of IP created or used during service provision
12. Personnel and Subcontracting: Requirements for staff, key personnel, and subcontracting arrangements
13. Liability and Indemnification: Limitations of liability, indemnification obligations, and insurance requirements
14. Force Majeure: Provisions for unforeseen circumstances and their handling
15. Governing Law and Dispute Resolution: Application of Qatar law and dispute resolution mechanisms
16. General Provisions: Standard boilerplate clauses including notices, amendments, and entire agreement
1. Transition Services: Details of knowledge transfer and transition arrangements, used when complex service handover is required
2. Business Continuity: Disaster recovery and business continuity requirements, essential for critical services
3. Compliance with Specific Regulations: Additional regulatory compliance requirements, needed for regulated industries
4. Security Requirements: Specific security protocols and requirements, important for technology or sensitive data services
5. Change Control: Procedures for managing changes to services or requirements, useful for long-term or complex arrangements
6. Audit Rights: Client's rights to audit service provider, important for regulated industries or critical services
7. Performance Incentives: Bonus structures or incentives for exceeding service levels, optional for performance-driven arrangements
8. Exit Management: Detailed provisions for service termination and transition, important for complex or critical services
1. Schedule 1 - Service Description: Detailed technical and operational specifications of services
2. Schedule 2 - Service Levels and KPIs: Detailed performance metrics, measurement methods, and reporting requirements
3. Schedule 3 - Pricing and Payment Schedule: Detailed fee structure, pricing models, and payment terms
4. Schedule 4 - Governance and Reporting: Management structure, meeting schedules, and reporting requirements
5. Schedule 5 - Data Protection Requirements: Specific data handling procedures and compliance requirements
6. Schedule 6 - Required Personnel: Key personnel requirements, qualifications, and roles
7. Appendix A - Service Provider Policies: Relevant internal policies of the service provider
8. Appendix B - Technical Requirements: Technical specifications and requirements
9. Appendix C - Form of Reports: Templates and formats for required reports
Authors
Information Technology
Financial Services
Professional Services
Healthcare
Manufacturing
Oil and Gas
Construction
Telecommunications
Hospitality
Education
Retail
Logistics and Supply Chain
Legal
Procurement
Operations
Finance
Risk Management
Compliance
Information Technology
Human Resources
Vendor Management
Project Management
Service Delivery
Chief Executive Officer
Chief Operations Officer
Chief Financial Officer
Head of Procurement
Legal Counsel
Procurement Manager
Vendor Management Director
Operations Director
Contract Manager
Risk Management Officer
Compliance Officer
Project Manager
Service Delivery Manager
Technology Director
Human Resources Director
Find the exact document you need
IT Outsourcing Service Level Agreement
Qatar-law governed agreement defining IT outsourcing services, performance metrics, and operational requirements between a service provider and client.
Outsourcing Service Agreement
A Qatar law-governed agreement establishing terms and conditions for outsourcing services, including service levels, pricing, and compliance with local regulations.
Outsourcing Agreement Between Two Companies
A Qatar law-governed agreement establishing terms and conditions for outsourcing services between two companies, including service delivery, payment terms, and compliance requirements.
Download our whitepaper on the future of AI in Legal
³Ò±ð²Ô¾±±ð’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; ³Ò±ð²Ô¾±±ð’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our for more details and real-time security updates.
Read our Privacy Policy.