Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
SLA OLA
1. Parties: Identification of the contracting parties, including the service provider, customer, and relevant internal departments for the OLA component
2. Background: Context of the agreement, including the relationship between the SLA and OLA components
3. Definitions: Detailed definitions of technical terms, service metrics, and key concepts used throughout the agreement
4. Service Description: Detailed description of the services to be provided, including scope and exclusions
5. Service Levels: Specific, measurable service levels and performance indicators (KPIs) that the service provider commits to
6. Operational Requirements: Internal operational commitments and responsibilities between departments to support the service levels
7. Monitoring and Reporting: Methods and frequency of service level measurement, monitoring, and reporting
8. Response and Resolution Times: Specified timeframes for responding to and resolving various categories of issues
9. Escalation Procedures: Clear procedures for escalating issues both externally and internally
10. Roles and Responsibilities: Detailed breakdown of responsibilities for all parties and departments involved
11. Data Protection and Security: Commitments and procedures relating to data protection, privacy, and security in compliance with Danish law
12. Term and Termination: Duration of the agreement and conditions for termination
13. Consequences of Breach: Remedies and consequences for failing to meet service levels or operational requirements
14. Governing Law and Jurisdiction: Specification of Danish law as governing law and jurisdiction for disputes
1. Service Credits: Financial compensation mechanism for service level failures - include when monetary penalties are part of the agreement
2. Continuous Improvement: Procedures for regular review and improvement of service levels - include for long-term strategic relationships
3. Disaster Recovery: Specific procedures for service continuity in disaster scenarios - include for critical services
4. Training and Knowledge Transfer: Requirements for training and knowledge sharing - include when service requires significant human interaction
5. Innovation and Technology Refresh: Provisions for updating technology and processes - include for technology-dependent services
6. Third-Party Dependencies: Management of external dependencies - include when service delivery relies on third-party providers
7. Environmental Requirements: Environmental standards and commitments - include when relevant to service delivery or corporate policies
1. Schedule 1 - Service Definitions: Detailed technical specifications of each service component
2. Schedule 2 - Service Level Metrics: Detailed metrics, measurement methods, and targets for each service level
3. Schedule 3 - Operational Procedures: Detailed operational procedures, workflows, and internal service standards
4. Schedule 4 - Price and Payment Terms: Pricing structure, payment terms, and service credit calculations if applicable
5. Schedule 5 - Technical Requirements: Technical specifications, systems, and infrastructure requirements
6. Schedule 6 - Contact Matrix: Contact details and escalation hierarchy for all parties and departments
7. Schedule 7 - Report Templates: Templates for various reports and performance measurements
8. Schedule 8 - Business Continuity Plan: Detailed procedures for maintaining service during disruptions
9. Appendix A - RACI Matrix: Detailed responsibility assignment matrix for all service components
10. Appendix B - Security Requirements: Detailed security and data protection requirements and procedures
Authors
Availability
Business Day
Business Hours
Change Management
Critical Incident
Customer
Data Controller
Data Processor
Downtime
Emergency Maintenance
Escalation Path
First Line Support
Force Majeure
Incident
Internal Response Time
Key Performance Indicator (KPI)
Major Incident
Mean Time Between Failures (MTBF)
Mean Time to Repair (MTTR)
Measurement Period
Minor Incident
Normal Business Hours
Operating Environment
Operational Level Agreement (OLA)
Planned Maintenance
Priority Levels
Problem
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Resolution Time
Response Time
Root Cause Analysis
Second Line Support
Service
Service Credits
Service Hours
Service Level Agreement (SLA)
Service Level Target
Service Provider
Service Request
Service Window
Severity Levels
Support Hours
Support Levels
System
Third Line Support
Time to Resolve
Unplanned Downtime
Urgent Change
Work Around
Working Day
Personal Data
Data Protection Legislation
Security Incident
Service Performance Report
Quality Standards
Maintenance Window
Operating Parameters
Service Degradation
Support Documentation
Technical Specifications
User
Authorized Representative
Business Impact
Compliance Requirements
Configuration Item
Dependencies
Emergency Contact
Escalation Level
Incident Log
Performance Metrics
Quality Metrics
Service Component
Service Failure
Support Process
Technical Environment
Performance Metrics
Operational Requirements
Service Hours
Response Times
Resolution Times
Monitoring
Reporting
Data Protection
Confidentiality
Security Requirements
Business Continuity
Disaster Recovery
Change Management
Incident Management
Problem Management
Escalation Procedures
Service Credits
Pricing
Payment Terms
Force Majeure
Liability
Indemnification
Insurance
Intellectual Property
Term and Termination
Exit Management
Dispute Resolution
Governing Law
Assignment
Subcontracting
Amendments
Notices
Entire Agreement
Severability
Compliance
Audit Rights
Staff Requirements
Training
Documentation
Quality Management
Risk Management
Communication Procedures
Roles and Responsibilities
Service Review
Continuous Improvement
Third Party Rights
Warranties
Service Availability
Maintenance
Support Services
Emergency Procedures
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.