Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
Managed Service Provider Contract
"I need a Managed Service Provider Contract for our fintech startup in Lagos, covering comprehensive IT infrastructure management and cybersecurity services, with specific provisions for NDPR compliance and handling of financial data."
1. Parties: Identification and details of the service provider and client organizations
2. Background: Context of the agreement and brief description of the parties' business relationship
3. Definitions: Detailed definitions of technical terms, acronyms, and key concepts used throughout the agreement
4. Scope of Services: Comprehensive outline of the managed services to be provided
5. Service Provider Obligations: Detailed responsibilities and commitments of the MSP
6. Client Obligations: Responsibilities and commitments required from the client
7. Service Levels: Defined performance metrics, response times, and service quality standards
8. Fees and Payment Terms: Pricing structure, payment schedule, and related financial terms
9. Term and Termination: Duration of the agreement and conditions for termination
10. Data Protection and Security: Compliance with NDPR and security measures for data protection
11. Confidentiality: Protection of confidential information and trade secrets
12. Intellectual Property Rights: Ownership and usage rights of software, systems, and data
13. Limitation of Liability: Boundaries of legal responsibility and liability caps
14. Force Majeure: Provisions for unforeseen circumstances and events beyond reasonable control
15. Dispute Resolution: Procedures for handling disagreements and conflicts
16. Governing Law: Specification of Nigerian law as the governing law and jurisdiction
1. Change Management: Procedures for requesting and implementing service changes, recommended for complex service arrangements
2. Disaster Recovery: Specific procedures for business continuity and disaster recovery, important for critical services
3. Staff and Subcontractors: Terms regarding service provider personnel and use of subcontractors, relevant when specific staffing requirements exist
4. Insurance Requirements: Specific insurance coverage requirements, important for high-value or high-risk services
5. Transition Services: Procedures for service implementation and exit, important for complex service transitions
6. Compliance with Industry Standards: Specific industry standards and certifications requirements, relevant for regulated industries
7. Environmental Protection: Environmental compliance and sustainability requirements, relevant for services with environmental impact
8. Anti-Bribery and Corruption: Specific anti-corruption provisions, important for government contracts or high-value services
1. Schedule 1 - Service Descriptions: Detailed technical specifications of each service offered
2. Schedule 2 - Service Level Agreement (SLA): Detailed performance metrics, measurement methods, and penalties
3. Schedule 3 - Pricing and Payment Schedule: Detailed fee structure, rates, and payment terms
4. Schedule 4 - Implementation Plan: Timeline and milestones for service implementation
5. Schedule 5 - Technical Requirements: Specific technical specifications and requirements
6. Schedule 6 - Security Requirements: Detailed security protocols and compliance requirements
7. Schedule 7 - Approved Subcontractors: List of approved third-party service providers
8. Schedule 8 - Exit Management Plan: Detailed procedures for service termination and transition
9. Appendix A - Contact Details: Key contacts and escalation procedures
10. Appendix B - Required Reports: Templates and specifications for required service reports
Authors
Agreement
Authorized Users
Business Day
Business Hours
Change Control Procedure
Client Data
Client Systems
Commencement Date
Confidential Information
Critical Service Level
Cybersecurity Incident
Data Controller
Data Processor
Data Protection Laws
Deliverables
Disaster Recovery Plan
Documentation
Emergency Maintenance
End Users
Equipment
Fees
Force Majeure Event
Good Industry Practice
Incident
Initial Term
Intellectual Property Rights
Key Personnel
Maintenance Window
Managed Services
NDPR
Network
Normal Business Hours
Personal Data
Priority Levels
Problem
Professional Services
Response Time
Resolution Time
Service Credits
Service Levels
Service Level Agreement (SLA)
Service Provider Systems
Services
Software
Specification
Statement of Work
Subcontractor
Support Services
System Availability
Term
Third-Party Products
Transition Period
Transition Plan
Upgrade
User Acceptance Testing
Virus
Vulnerability
Service Levels
Performance Monitoring
Data Protection
Confidentiality
Intellectual Property
Payment Terms
Service Credits
Change Management
Term and Termination
Force Majeure
Liability Limitation
Indemnification
Insurance
Staff and Resources
Security Requirements
Disaster Recovery
Business Continuity
Audit Rights
Compliance
Dispute Resolution
Assignment and Subcontracting
Notice Requirements
Governing Law
Warranties
Service Implementation
Transition Services
Exit Management
Non-Solicitation
Anti-Corruption
Reporting Requirements
Equipment and Software
Access Rights
Maintenance Services
Documentation Requirements
Training and Support
Quality Assurance
Risk Management
Customer Obligations
Third-Party Rights
Entire Agreement
Information Technology
Banking and Financial Services
Healthcare
Manufacturing
Retail
Telecommunications
Education
Government and Public Sector
Oil and Gas
Professional Services
E-commerce
Construction
Logistics and Transportation
Information Technology
Legal
Procurement
Finance
Operations
Risk Management
Compliance
Information Security
Vendor Management
Service Delivery
Infrastructure Management
Chief Information Officer
IT Director
Chief Technology Officer
Procurement Manager
Legal Counsel
IT Operations Manager
Information Security Manager
Risk Management Officer
Compliance Officer
Contract Manager
Service Delivery Manager
Technical Operations Director
Chief Financial Officer
IT Infrastructure Manager
Vendor Management Officer
Find the exact document you need
Managed Service Provider Contract
A Nigerian law-governed agreement outlining terms and conditions for managed IT services provision, including service levels, data protection, and regulatory compliance requirements.
Management Consulting Agreement
A Nigerian law-governed agreement establishing terms and conditions for professional consulting services between a consultant and client organization.
Management And Administrative Services Agreement
A Nigerian law-governed agreement establishing terms for management and administrative services provision, including service scope, performance standards, and compliance requirements.
Managed Network Services Agreement
A Nigerian law-governed agreement for the provision and management of network services, detailing service terms, performance standards, and regulatory compliance requirements.
Business Management Consulting Agreement
A Nigerian law-governed agreement establishing terms for management consulting services, including scope, payment, and obligations between consultant and client.
Service Management Contract
A Nigerian law-governed agreement establishing terms and conditions for managed service delivery between service provider and client.
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.