Preview

A Service Level Agreement for Provision of Specified It Services Between Finman Account Management, Llc, Datanal, Inc., and Minertek, Inc.

Powerful Essays
Open Document
Open Document
2944 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Service Level Agreement for Provision of Specified It Services Between Finman Account Management, Llc, Datanal, Inc., and Minertek, Inc.
Agreement Overview:
This agreement represents a Service Level Agreement between Finman Account Management LLC, Datanal Inc and Minertek Inc for providing IT services that is needed to support and sustain Finman’s products and services. This Agreement will remain valid until it is superseded by a revised agreement which will be mutually signed by the stakeholders. This Agreement outlines the parameters of all IT services which is covered and it does not supersede the current processes and procedures unless it is stated in this agreement. This Agreement is mutually understood and endorsed by the primary stakeholders.

(2) Goals and Objectives:
The sole purpose of this Agreement is to make sure that “the services and associated standards of services that Finman Account Management LLC requires are absolutely clear; including the cost of those services and the consequences of not achieving pre-agreed services” (Desai, 2010). This Agreement will also make sure that proper elements, commitments and mutual agreements are in place to provide consistent IT service support and delivery to Finman by Datanal Inc and Minertek Inc. The objectives of this Agreement will include the following:
 Present a clear and concise description of service that will be provided to Finman Account Management LLC.
 Match perceptions of expected service provision with actual support and delivery
 Provide clear reference to service ownership, accountability, roles, copyrights, proprietary rights, retention, sharing and data destruction.
 Finman’s objectives in the SLA are to “compete more effectively in a highly competitive industry by offering its customers a unified IT management plan across an entire organization or even, if the customer wishes, across separate departments and divisions” (Desai, 2010).

(3) Period of Service: The service level Agreement (SLA) is for a period of three years, commencing on July 1, 2013 and concluding on June 30,



References: Desai, J (2010). Service Level Agreement: A Legal and Practical Guide. IT Governance. Clinch, J. (2009, May). Best Management Practice. ITIL V3 and Information Security, Retrieved May 30, 2011,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman Investment resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investment internal systems, etc.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Rlht2 Task 3

    • 1508 Words
    • 7 Pages

    With more than 50 years experience in business management, Finman has gained a broad and deep understanding of their own and their customers’ resources, needs, and growth potential, particularly in the present rapidly evolving and expanding IT environment. After meticulous review, Finman has determined that with the assistance of the above-named firms, Finman will be positioned to significantly improve and expand its services to its existing customers and compete more effectively nationally and internationally.…

    • 1508 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    LESMA204

    • 2205 Words
    • 7 Pages

    References: The Open University of Hong Kong. LESM A204 Security Practices and Management (Unit2). Hong Kong: OUHK…

    • 2205 Words
    • 7 Pages
    Good Essays
  • Better Essays

    After describing the information system architecture which includes data, processes, interfaces and network, in addition to the application architecture and process design, we can now move forward to the implementation and operation phase. There are seven major activities that take place in the implementation and operation phase. These phases must be managed effectively in order for the project to be successful. The seven phases consist of:…

    • 1332 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Case #2 describes the development of a business model based on "software as a service" (SaaS) for security solution distributed through Internet Service Providers (ISPs). F-Secure disruptively entered a mature business with dominant players by executing an innovative new service model. The case describes the challenges involved in developing and executing the new service model, and offers us the opportunities to discuss the evolving challenges the company faces looking forward.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Course Syllabus

    • 2512 Words
    • 11 Pages

    Course Description This course reviews common business systems and their interrelationships. Business systems covered include finance, accounting, sales, marketing, human resources, legal, and operations. Emphasis is placed upon the inputs and outputs of information systems, the potential for integration of the systems, and information systems security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • • University policies: You must be logged into the student website to view this document. Instructor policies: This document is posted in the Course Materials forum.…

    • 2512 Words
    • 11 Pages
    Satisfactory Essays
  • Better Essays

    Cobit Casestudy Tibo

    • 8174 Words
    • 33 Pages

    The IT Governance Institute, Information Systems Audit and Control Association [the “Owner(s)”] and the authors have…

    • 8174 Words
    • 33 Pages
    Better Essays
  • Good Essays

    Service-Level Agreement

    • 823 Words
    • 4 Pages

    A service-level agreement (SLA) is a part of a service contract where a service is formally defined. In practice, the term SLA is sometimes used to refer to the contracted delivery time (of the service or performance). As an example, Internet service providers and telcos will commonly include service level agreements within the terms of their contracts with customers to define the level(s) of service being sold in plain language terms. In this case the SLA will typically have a technical definition in terms of mean time between failures (MTBF), mean time to repair or mean time to recovery (MTTR); various data rates; throughput; jitter; or similar measurable details.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Good Essays

    I-Factor Testimony Bureau

    • 2920 Words
    • 12 Pages

    The project deals with the I-Factor followed for an IT firm and also with the profit and process management followed for a firm. The Software companies will be in need of the hardware resources from the different client and the problem faced by the company is they will be unable to get the complete requirements of the hardware as due to finance to solve this, the company focus on the banking sector. The company directly will be having the direct investment on the banking sector and with the help of bank the company will be getting the hardware resources from the client. As part of the manual it is very difficult to manage the process of the bank to provide the facilities to all the company having account with them. Based on the criteria followed in the banking sector ,they will be providing the opportunities to the firm to get the hardware requirements to them.…

    • 2920 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Strategic Managemet

    • 1505 Words
    • 7 Pages

    NOW, THEREFORE, the parties to this agreement have agreed to the terms and conditions regarding the services as follows:…

    • 1505 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Rakesh

    • 1205 Words
    • 6 Pages

    3. You will be bound by the responsibilities under the Information Security Policy of the Company as contained under Annexure – C.…

    • 1205 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    TCS FV

    • 5869 Words
    • 18 Pages

    To help customers achieve their business objectives by providing innovative, best-in-class consulting, IT solutions and services.…

    • 5869 Words
    • 18 Pages
    Powerful Essays