Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Operational Level Agreement
1. Parties: Identification of the internal departments/units entering into the agreement
2. Background: Context of the agreement and relationship between the parties
3. Definitions: Clear definitions of technical terms, service-related terminology, and abbreviations used
4. Service Description: Detailed description of services to be provided between departments
5. Service Hours and Availability: Operating hours, service windows, and availability commitments
6. Performance Metrics: Key Performance Indicators (KPIs) and Service Level Targets
7. Roles and Responsibilities: Clear delineation of responsibilities for each party
8. Response and Resolution Times: Timeframes for responding to and resolving service requests/incidents
9. Monitoring and Reporting: Methods and frequency of service performance monitoring and reporting
10. Communication Protocols: Procedures for routine communications and escalation paths
11. Review and Amendment Process: Procedures for periodic review and modification of the agreement
12. Term and Termination: Duration of the agreement and conditions for termination
1. Data Protection and Security: Specific data handling and security requirements - include when personal data or sensitive information is involved
2. Business Continuity: Disaster recovery and business continuity procedures - include for critical services
3. Training Requirements: Staff training and certification requirements - include when specialized skills are needed
4. Cost Allocation: Internal cost distribution and charging mechanisms - include when cross-charging applies
5. Quality Management: Quality assurance processes and standards - include for complex or regulated services
6. Compliance Requirements: Specific regulatory or internal compliance requirements - include when handling regulated services
1. Schedule A - Service Level Targets: Detailed breakdown of all service level targets and measurement methods
2. Schedule B - Technical Specifications: Detailed technical requirements and specifications for service delivery
3. Schedule C - Operating Procedures: Step-by-step procedures for routine operations and exceptional situations
4. Schedule D - Contact Matrix: List of key contacts, roles, and escalation paths
5. Schedule E - Performance Reports: Templates and examples of required performance reports
6. Appendix 1 - Incident Categories: Classification and prioritization of different types of incidents
7. Appendix 2 - Systems and Tools: List of systems, tools, and applications covered by the agreement
Authors
Service Hours
Business Days
Business Hours
Service Provider
Service Recipient
Service Level Targets
Key Performance Indicators (KPIs)
Response Time
Resolution Time
Priority Levels
Incident
Service Request
Emergency Change
Planned Maintenance
Unplanned Downtime
Escalation Path
Service Availability
Performance Metrics
Monitoring Period
Review Period
Service Components
Support Levels
Critical Service
Standard Service
Service Window
Maintenance Window
Change Request
Root Cause Analysis
Service Disruption
Contact Matrix
Authorized Personnel
Operating Environment
Service Dependencies
Quality Standards
Compliance Requirements
Documentation
Force Majeure
Service Credits
Reporting Period
Performance Dashboard
Service Portal
Support Tools
Business Impact
Service Recovery
Escalation Levels
Operation Manual
Service Catalogue
Definitions
Service Description
Service Level Requirements
Performance Standards
Monitoring and Reporting
Roles and Responsibilities
Operating Hours
Response Times
Resolution Times
Communication Protocols
Escalation Procedures
Quality Management
Change Management
Review and Amendment
Confidentiality
Data Protection
Force Majeure
Dispute Resolution
Term and Termination
Business Continuity
Compliance Requirements
Security Requirements
Documentation Requirements
Training and Support
Resource Management
Cost Allocation
Audit Rights
Performance Review
Service Measurement
Incident Management
Problem Management
Capacity Management
Availability Management
Reporting Requirements
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.