Preview

A Service Level Agreement for Provision of Specified It Services Between Finman Account Management, Llc, Datanal, Inc., and Minertek, Inc.

Powerful Essays
Open Document
Open Document
2944 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Service Level Agreement for Provision of Specified It Services Between Finman Account Management, Llc, Datanal, Inc., and Minertek, Inc.
Agreement Overview:
This agreement represents a Service Level Agreement between Finman Account Management LLC, Datanal Inc and Minertek Inc for providing IT services that is needed to support and sustain Finman’s products and services. This Agreement will remain valid until it is superseded by a revised agreement which will be mutually signed by the stakeholders. This Agreement outlines the parameters of all IT services which is covered and it does not supersede the current processes and procedures unless it is stated in this agreement. This Agreement is mutually understood and endorsed by the primary stakeholders.

(2) Goals and Objectives:
The sole purpose of this Agreement is to make sure that “the services and associated standards of services that Finman Account Management LLC requires are absolutely clear; including the cost of those services and the consequences of not achieving pre-agreed services” (Desai, 2010). This Agreement will also make sure that proper elements, commitments and mutual agreements are in place to provide consistent IT service support and delivery to Finman by Datanal Inc and Minertek Inc. The objectives of this Agreement will include the following:
 Present a clear and concise description of service that will be provided to Finman Account Management LLC.
 Match perceptions of expected service provision with actual support and delivery
 Provide clear reference to service ownership, accountability, roles, copyrights, proprietary rights, retention, sharing and data destruction.
 Finman’s objectives in the SLA are to “compete more effectively in a highly competitive industry by offering its customers a unified IT management plan across an entire organization or even, if the customer wishes, across separate departments and divisions” (Desai, 2010).

(3) Period of Service: The service level Agreement (SLA) is for a period of three years, commencing on July 1, 2013 and concluding on June 30,



References: Desai, J (2010). Service Level Agreement: A Legal and Practical Guide. IT Governance. Clinch, J. (2009, May). Best Management Practice. ITIL V3 and Information Security, Retrieved May 30, 2011,

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman Investment resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investment internal systems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    After describing the information system architecture which includes data, processes, interfaces and network, in addition to the application architecture and process design, we can now move forward to the implementation and operation phase. There are seven major activities that take place in the implementation and operation phase. These phases must be managed effectively in order for the project to be successful. The seven phases consist of:…

    • 1332 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    explaining the service customers can expect and what the company will do if it fails to…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Case #2 describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers (ISPs). F-Secure disruptively entered a mature business with dominant players by executing an innovative new service model. The case describes the challenges involved in developing and executing the new service model, and offers us the opportunities to discuss the evolving challenges the company faces looking forward.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Course Syllabus

    • 2512 Words
    • 11 Pages

    Course Description This course reviews common business systems and their interrelationships. Business systems covered include finance, accounting, sales, marketing, human resources, legal, and operations. Emphasis is placed upon the inputs and outputs of information systems, the potential for integration of the systems, and information systems security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.…

    • 2512 Words
    • 11 Pages
    Satisfactory Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    The IT Governance Institute, Information Systems Audit and Control Association [the “Owner(s)”] and the authors have…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Good Essays

    Service-Level Agreement

    • 823 Words
    • 4 Pages

    A service-level agreement (SLA) is a part of a service contract where a service is formally defined. In practice, the term SLA is sometimes used to refer to the contracted delivery time (of the service or performance). As an example, Internet service providers and telcos will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case the SLA will typically have a technical definition in terms of mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR); various data rates; throughput; jitter; or similar measurable details.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Strategic Managemet

    • 1505 Words
    • 7 Pages

    NOW, THEREFORE, the parties to this agreement have agreed to the terms and conditions regarding the services as follows:…

    • 1505 Words
    • 7 Pages
    Better Essays
  • Good Essays

    I-Factor Testimony Bureau

    • 2920 Words
    • 12 Pages

    The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to solve this, the company focus on the banking sector. The company directly will be having the direct investment on the banking sector and with the help of bank the company will be getting the hardware resources from the client. As part of the manual it is very difficult to manage the process of the bank to provide the facilities to all the company having account with them. Based on the criteria followed in the banking sector ,they will be providing the opportunities to the firm to get the hardware requirements to them.…

    • 2920 Words
    • 12 Pages
    Good Essays
  • Powerful Essays

    Rakesh

    • 1205 Words
    • 6 Pages

    3. You will be bound by the responsibilities under the Information Security Policy of the Company as contained under Annexure – C.…

    • 1205 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    TCS FV

    • 5869 Words
    • 18 Pages

    To help customers achieve their business objectives by providing innovative, best-in-class consulting, IT solutions and services.…

    • 5869 Words
    • 18 Pages
    Powerful Essays