Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
SaaS Service Level Agreement
1. Parties: Identification of the service provider and customer, including business registration details and authorized representatives
2. Background: Context of the agreement, brief description of the service, and the parties' intentions
3. Definitions: Detailed definitions of technical terms, service metrics, and other key concepts used throughout the agreement
4. Service Description: Detailed description of the SaaS service, including core functionalities and features
5. Service Levels: Specific, measurable performance metrics including availability, response time, and reliability commitments
6. Service Credits: Calculation and application of service credits or other remedies for failure to meet service levels
7. Support Services: Description of support levels, response times, and escalation procedures
8. Customer Obligations: Customer responsibilities, acceptable use policy, and cooperation requirements
9. Data Protection: GDPR compliance measures, data processing terms, and security commitments
10. Fees and Payment: Pricing structure, payment terms, and invoicing procedures
11. Term and Termination: Contract duration, renewal terms, and termination provisions
12. Intellectual Property: IP rights, licensing terms, and ownership of data
13. Confidentiality: Protection of confidential information and trade secrets
14. Limitation of Liability: Liability caps and exclusions in accordance with Danish law
15. Force Majeure: Events excusing performance and related procedures
16. Governing Law and Jurisdiction: Confirmation of Danish law application and dispute resolution procedures
1. Professional Services: Include when additional implementation, configuration, or consulting services are offered
2. Service Level Tiers: Include when multiple service tiers with different SLAs are offered
3. Disaster Recovery: Include for critical services requiring specific disaster recovery commitments
4. Security Requirements: Include when specific security certifications or standards compliance is required
5. Change Management: Include when formal change control procedures are needed
6. Audit Rights: Include when customer requires rights to audit service provider's compliance
7. Sub-processors: Include when service provider uses sub-processors for service delivery
8. Export Control: Include when service involves international data transfers
9. Insurance Requirements: Include when specific insurance coverage needs to be maintained
10. Service Migration: Include when specific provisions for service transition or termination assistance are needed
1. Service Level Metrics: Detailed technical specifications of service level measurements and calculations
2. Support Services Description: Detailed support procedures, contact information, and escalation paths
3. Fee Schedule: Detailed pricing, including service credits calculation methodology
4. Technical Requirements: Customer infrastructure requirements and technical specifications
5. Security Policy: Detailed security measures, procedures, and compliance requirements
6. Data Processing Agreement: GDPR-compliant data processing terms and details
7. Acceptable Use Policy: Detailed rules and restrictions for service usage
8. Business Continuity Plan: Disaster recovery and business continuity procedures
9. Service Architecture: Technical architecture and infrastructure description
10. Exit Plan: Detailed procedures for service termination and data return
Authors
Service
Service Levels
Service Credits
Availability
Scheduled Maintenance
Emergency Maintenance
Response Time
Resolution Time
Support Hours
Business Day
Business Hours
Incident
Critical Incident
Major Incident
Minor Incident
System
Platform
User
Authorized User
Administrator
Customer Data
Personal Data
Processing
Data Controller
Data Processor
Sub-processor
Service Provider
Documentation
Intellectual Property Rights
Confidential Information
Force Majeure
Service Fees
Subscription Term
Initial Term
Renewal Term
Service Window
Uptime
Downtime
Maintenance Window
Service Component
Integration
API
Authentication
Authorization
Backup
Recovery Point Objective
Recovery Time Objective
Security Breach
Service Level Failure
Support Request
Technical Contact
Third-Party Services
Update
Upgrade
Version
Vulnerability
Working Day
Help Desk
Dashboard
Measurement Period
Monthly Availability Percentage
Performance Metrics
Quality Standards
Root Cause Analysis
Service Level Report
Service Management
Subscription
Support Level
Support Services
System Requirements
Test Environment
Production Environment
User Access
Incident Priority
Reportable Incident
Service Credit Period
Service Improvement Plan
Service Interface
Compliance Requirements
Performance Metrics
Service Credits
Support Services
Maintenance
Data Protection
Security Requirements
Service Availability
Disaster Recovery
Business Continuity
Payment Terms
Subscription Terms
User Access Rights
Acceptable Use
Service Monitoring
Change Management
Incident Response
Reporting
Audit Rights
Intellectual Property
Confidentiality
Data Processing
Sub-processing
Liability
Indemnification
Force Majeure
Termination
Exit Management
Dispute Resolution
Governing Law
Assignment
Notice
Entire Agreement
Severability
Amendments
Compliance
Insurance
Service Scope
Technical Requirements
Integration Requirements
Migration Services
Implementation
Training
Documentation
Backup and Recovery
Emergency Support
Escalation Procedures
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.