Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Standard Uptime SLA
1. Parties: Identification of the service provider and customer, including their full legal names, registration numbers, and addresses
2. Background: Context of the agreement, reference to any master services agreement if applicable, and the purpose of the SLA
3. Definitions: Detailed definitions of technical terms, service metrics, and other key concepts used throughout the agreement
4. Service Levels: Specific commitments regarding service availability, performance metrics, and response times
5. Measurement and Monitoring: Methods and tools used to measure service levels, including monitoring procedures and reporting frequencies
6. Service Credits: Calculation and application of service credits or other remedies for failure to meet service levels
7. Exclusions: Circumstances under which service level commitments do not apply, including planned maintenance and force majeure events
8. Reporting: Requirements for regular service level reporting, including format, frequency, and content
9. Governance: Procedures for review meetings, escalation processes, and amendment of service levels
10. Term and Termination: Duration of the SLA and conditions for termination
1. Data Processing Terms: Required if the service involves processing of personal data under GDPR
2. Security Requirements: Detailed security obligations, recommended for services involving sensitive data or critical systems
3. Disaster Recovery: Specific commitments regarding service recovery in case of major incidents, relevant for business-critical services
4. Performance Incentives: Positive incentives for exceeding service levels, optional alternative to penalty-only approaches
5. Multi-vendor Provisions: Required when service delivery involves multiple vendors requiring coordination
1. Service Level Metrics: Detailed technical specifications of all service level metrics and their measurement methods
2. Service Credit Calculations: Detailed formulas and examples for calculating service credits
3. Reporting Templates: Standard formats for service level reports and monitoring documentation
4. Technical Architecture: Overview of the technical infrastructure relevant to service delivery and monitoring
5. Escalation Matrix: Contact details and procedures for different levels of escalation
6. Maintenance Windows: Scheduled maintenance periods and notification procedures
Authors
Business Day
Business Hours
Critical Incident
Downtime
Emergency Maintenance
Excused Downtime
Force Majeure
Incident
Maintenance Window
Major Incident
Mean Time to Repair (MTTR)
Mean Time Between Failures (MTBF)
Minor Incident
Monitoring Period
Planned Maintenance
Recovery Point Objective (RPO)
Recovery Time Objective (RTO)
Resolution Time
Response Time
Service
Service Credits
Service Hours
Service Level
Service Level Failure
Service Level Measurement Period
Service Level Report
System
Unplanned Downtime
Uptime
Uptime Percentage
Working Hours
Root Cause Analysis
Service Level Agreement
SLA Target
Support Hours
Time to Resolution
User
Authorized User
Service Components
Service Infrastructure
Measurement Tools
Monitoring Tools
Performance Metrics
Quality Standards
Reporting Period
Service Level Dashboard
Service Window
System Availability
Performance Measurement
Monitoring and Reporting
Service Credits
Force Majeure
Planned Maintenance
Emergency Maintenance
Incident Response
Escalation Procedures
Governance
Confidentiality
Data Protection
Intellectual Property
Liability
Indemnification
Insurance
Term and Termination
Dispute Resolution
Change Management
Notice Requirements
Assignment
Subcontracting
Audit Rights
Service Quality
Business Continuity
Disaster Recovery
Security Requirements
Amendments
Entire Agreement
Severability
Governing Law
Jurisdiction
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.