1.  Responsibilities

1.1        Joint

1.1.1 Privacy and data protection

Through the act of providing support and installation services to the client, it may be necessary for our engineers to have access to and make copies of your personal and business data. Every sensible step will be taken to ensure that this data is kept secure for the duration that it is required and destroyed afterwards.

If you have any strong concerns about the safety and security of the data, please discuss this with the engineer carrying out the work and advise how the data needs to be handled. If you have any data protection or data privacy legislation that you require us to adhere to, it is essential that you communicate this to us so Entire IT can adhere to the required standards.

1.1.2 Mutual non-disclosure

Entire IT do not discuss specific or unique business operations about any of our clients outside of our professional requirement to provide services to those clients, however, should you require us to

complete a non-disclosure agreement by all staff, please ensure this is communicated and provided as part of the commencement of this agreement.

1.2        Entire IT

Upon the commencement of this agreement Entire IT will assume the role of managing your IT systems as if it were an IT department within your organisation. The client understands that Entire IT will be granted decision making responsibility of minor day to day IT changes and maintenance required to ensure the operation of the clients business systems. Items requiring the customers input and having significant impact on the client’s business systems will require the input of the primary contact and decision makers.

Entire IT does not have authority to make purchases of hardware or software for the client unless approved by the client in advance.

Entire IT will act to maintain continuity of service for all business-critical systems within the capabilities of the customers IT resources. Where necessary Entire IT will advise the client of significant changes or additional resources required to maintain the business. Where appropriate we may provide a range of options and outcomes.

Entire IT will ensure that it maintains the following systems where in place on customers systems:

Entire IT will provide responsive and timely support to the client based on the information communicated to us.

Entire IT provide an out of hours on call engineer available via our standard telephone number. Calls will be answered from 7am until 10pm.

Entire IT will advise the client of any systems susceptible to risk of failure, high cost of remediation and prolonged downtime.

1.3        Client

1.4        Minimum standards

 Entire IT require that you ensure your IT practice falls in line with industry best practices which include but are not limited to:

 

Failure to maintain the above standards may compromise our ability to offer fixed cost support, incur additional charges to remedy and unplanned downtime. Should any of the above be identified we will discuss with you the best way to remedy the situation.

Supported Version or In Support:

 

Most software vendors will only support the most current versions of their software and will provide limited support or no support for older versions. A product is deemed “In Support” if it is currently supported by the vendor.

A vendor may offer support for multiple versions of software including the current and last x number of versions in which case these are considered a supported version. Details regarding which versions are “In Support” are generally provided on the vendors website or via their technical support department.

 

2.  Payment and invoicing

 

 

3.  Service outside Normal Working Hours

 

Emergency services requested outside of the hours of 8:30 am – 5:00 pm Monday through Friday, and including all major public holidays, may be subject to additional charges.

Remote or Onsite Service requested between 5:01pm and 10:00pm will be billed at Clients discounted rate plus a 50% surcharge.

Remote or Onsite Service requested between 10:01pm and 7:00am will be billed at double Client’s discounted rate. 7:01am to 8:29am will be billed at standard rate plus a 50% surcharge. Any work needed to rectify a Server-Down situation is included on BEST Total Care plans.

 

4.  Right to refusal of support

 

Both Entire IT and the client maintain the right to refuse either the receipt of support or to deliver support. This may arise from inconvenient timing, a high risk of unacceptable outcome, willingness to accept the fault until a replacement or better resolution is available.

Entire IT maintain the right to not provide support for cases where the end user has disobeyed specific instructions either once or repeatedly, requested support for equipment that is beyond economic repair or is known to be below or fails to meet a minimum standard recommended either above or directly by Entire IT.

This right extends to providing unlimited support within the agreement that is prescriptively long winded that could be resolved more effectively by a chargeable onsite visit or warranty return/repair. At the point of refusing support Entire IT will advise the client of the circumstances and the potential outcomes and any risk associated. In some cases where this allows the customer to fall below acceptable good business practice or below a minimum standard, rectification of any issues arising may be chargeable.

E.g failure to backup data or the uninstallation or disabling of any security systems. Entire IT will where mutually acceptable, attempt to mitigate the risks associated with these circumstances at their discretion.

 

5.  Service Calls Where No Trouble is found

 

If Client requests onsite service and no problem is found or reproduced, the client shall be billed at the current applicable rates as indicated in section 6 of the agreement summary.

 

6.  Limitation of Liability

 

In no event shall Entire IT be held liable for indirect, special, incidental or consequential damages arising out of service provided hereunder, including but not limited to loss of profits or revenue, loss of use of equipment, lost data, costs of substitute equipment, or other costs.

 

7.     Definitions of service

 

7.1        Remote monitoring and proactive support 24/7

 

Remote monitoring allows our engineers to address issues before they become serious problems for our customers. Ranging from running out of disk space, to antivirus updates and performance issues our checking and alerting system covers all of the key factors that affect your computer systems health. Entire IT will remotely monitor all covered systems using our Remote Monitoring and Maintenance (RMM) platform.

In addition to the above, we are also proactively alerted of any failure of communications between your devices and our RMM platform. This can be due to multiple issues including:

 

 

This ensures we can contact you to advise and resolve these issues minimising downtime for your business.

Failed checks on servers automatically log service tickets which will be actioned by our engineers remotely during normal business hours.

 

7.2        Managed Antivirus and Antimalware

 

Antivirus and antimalware software is a necessity with the number of malicious applications on the rise and their effects becoming ever more significant.

Entire IT will provide all Windows computer systems covered by this agreement with a centrally managed Antivirus and Antimalware solution. Please note that this requires that the customers systems be up to date, compatible and of sufficient performance to run this application. We regularly check to ensure scans are run and updates are applied to make sure your systems are as well protected as possible. Please note that having current, supported and fully updated Antivirus is not a guarantee against virus or malware.

 

 

7.3        Patch management

 

Keeping applications patched is an important part of maintaining the security of your computer and computer network. Patches protect against known vulnerabilities that can be exploited by viruses and hackers.

Entire IT will ensure that Microsoft Windows, Office and other applications are updated to the latest version through our centralised patch management system. We will ensure that patches are applied and installed according to our patch management policy.

Please note that not all applications can be updated through our systems. We strongly recommend that any line of business applications be kept up to date in line with your software vendors guidance. Patch management requires systems are left on overnight and subject to regular full reboots to ensure that the patches have applied correctly.

 

7.4        Daily Backup checks

 

Backups ensure that your data is safely protected in more than one location to protect your business against accidental or malicious data loss. If a backup system is neglected and not working correctly when you need it the most it can cost your business dearly.

Entire IT will carry out daily checks of the clients backup, business continuity and disaster recovery system to ensure it is working correctly. These checks are carried out every weekday morning. Any faults are logged as tickets and corrective action is carried out to resolve this. Prolonged failure of the system to work will result in the client being notified in order to decide on remedial work.

 

7.5        Preventative maintenance

 

Wherever possible and practical, we will carry out corrective work to prevent serious issues from occurring and reduce the chances of downtime and disruption affecting your business. In most cases we will carry this work out remotely during business hours. If necessary, this work will have to be carried out outside of normal business hours to ensure no disruption to your business operations.

 

 

7.6        IT support and fault resolution

 

Entire IT define “Support” as being the process of identifying and resolving a problem or fault with a pre-existing system.

Issues will be logged with our ticketing system, prioritised and worked on by our engineering staff. Please refer to “Logging a support ticket” in the agreement summary.

Entire IT will deliver end user support by the following means:

 

 Method                                                                                   Description                                                                                                  

Telephone troubleshooting                                     The engineer will call to confirm if it is convenient to carry out fault resolution

Remote Control                                                       The engineer will remote control your computer or server to carry out diagnosis and resolution

Onsite engineer                                                       If the work cannot be carried out remotely we will

attend site

 

Workshop                                                                If the fault cannot be resolved onsite the equipment will be returned to Entire IT workshop for further work All systems returned for remedial work are imaged prior to work being carried out

Return to vendor/manufacturer for repair             If the equipment cannot be resolved by Entire IT it

will be returned to the vendor for replacement or repair. This may be subject to additional costs and delays through shipping and returns procedure.

 

 

7.7        Projects/New work/adds, moves and changes

 

Work that does not directly constitute support is considered new work, additions to your business network, a change to an existing system or for larger work a project.

 

 Type                                                                                         Description                                                                                                  

New                                                                         Setting up something that is new or didn’t exist previously. E.g. New printer or PC

Adds                                                                         Adding an existing system to your business

network

Moves                                                                      Moving equipment within the business or re- provisioning it for another user

 

Changes                                                                   Reconfiguring a system to fulfil a new business requirement e.g. Reconfiguring a PC or printer or server

 

Projects                                                                    A significant task involving planning, quoting and phases of engineering work. E.g. Office 365 migration or server upgrades

 

7.8        License and Asset Management

 

Entire IT will maintain an asset list of significant IT equipment and provide information as about its business effectiveness and lifespan.

Entire IT will maintain a database of software licenses to ensure compliance with software vendors.

 

7.9        Onboarding

 

Entire IT will carry out an onboarding process which includes the following:

 

 

 

7.10     Hardware and parts

 

All parts, equipment and hardware supplied by Entire IT are subject to the payment terms on the invoice. No equipment or parts are covered under this agreement unless otherwise stated.

Equipment or parts supplied by Entire IT and found to be faulty will be replaced or repaired by Entire IT providing this is identified within an acceptable timeframe.

 

7.11     Software licenses

 

A license or subscription is required for the majority of software and IT services. Examples include but are not limited to the following:

 

 

 

Entire IT will provide advice and quote for all necessary licenses. In the case that you are not correctly licensed for your software usage Entire IT can audit your systems and ensure that the correct number of licenses are procured.

Entire IT will not install pirated software on behalf of clients and may be required to advise software vendors of incorrect usage or instances of software piracy.

Please note that many subscriptions including Office 365 are licensed per user and cannot be used by more than one individual.

 

7.12     Third Parties

 

Enitre IT will as necessary liaise and work with the following organisations on your behalf as third parties:

 

 

 

No charges incurred by these third parties are covered by this agreement unless the service is provided through Entire IT and detailed in the agreement summary. Where costs are anticipated Entire IT will arrange for these to be quoted either directly or via Entire IT.

 

7.13     End user training

 

During the course of providing support to the client’s end users and staff we are able to assist with basic instruction on how to carry out a task. Should we identify that staff need further or more advanced training we will advise the client and recommend the best resources.

This may include Entire IT producing training guides and providing one to one or small group training. In the case of a new system being provided by Entire IT these training costs may be quoted as part of the solution.

 

7.14     Programming and development

 

Entire IT are able to call upon software development resources from a small list of preferred suppliers we have worked with for several years, able to build custom standalone applications, job tracking, client server and mobile applications. We also have access to preferred local marketing and web developers.

 

7.15     Vendor management

 

Entire IT will provide Vendor Management services for any of the client’s vendors that supply telecommunications and internet related services, software and network related equipment on authorisation by the client. In addition if specified in the agreement summary Entire IT will provide vendor management for any Line-of-Business software applications or other Technology Vendors used by Client. Entire IT will use best efforts to remediate any issues with Vendors and negotiate best prices and services with them. It is solely the Client’s responsibility to pay Vendors on a timely basis to avoid interruption of services

 

7.16     Disaster recovery

 

A disaster can be defined as a single event that has a significant impact on the operation of your business through loss of service, data loss or loss of access, inability to carry out business operations.

Causes of disaster can include:

 

 

 

Disaster recovery can be carried out to many different levels depending on the severity of the incident and on the availability of resources.

In the event of any of the above or similar events computer systems may be destroyed along with the data contained within them or may become inaccessible for prolonged periods of time.

It is strongly recommended that the client has at least an outline plan for recovering from different types of disaster along with a clear list of priorities, including key responsible parties and timescales.

In the event of an isolated incident affecting just the client, recovery can begin relatively quickly, however, in the event of a widespread disaster such as an earthquake Entire IT may prioritise the recovery of it’s clients over others. Organisations offering medical services or that can aid in the widespread recovery process will take priority.

Due to the varying nature of disasters it is impossible to cover fully all of the aspects of recovery. It is the clients responsibility to understand their business systems and to mitigate any losses should an event occur.

Entire IT can offer specialist advice to produce a disaster recovery and business continuity plan as an additional service.

 

7.17     Ransomware recovery

 

Ransomware is a specific type of disaster that at face value may seem innocuous, however, it has the ability to cause significant damage to a business often involving permanent data loss.

In many cases decryption tools are not available within practical timescales and therefore cannot be counted on as a means of recovery. The only other recourse is restoring data from a backup.

Recovering data may be simple in the case of recovering documents and files but may be significantly more complicated in the case of large database driven systems including Exchange e-mail databases or line of business applications. This may require external third party expertise. In almost all cases data generated or received since the last backup will be lost irretrievably. This can be as much as a day or a weeks worth of data or more in extreme cases. Please also note that the recovery time may be significant depending on the amount of data and where and how it is stored. Recovery time could potentially be as long as several days.

 

7.18     Data loss recovery

 

Recovering any form of data typically relies on a separate copy of the data being available at the point in time it is required. Typically a backup copy taken as part of a backup routine and in a recoverable format. In the event of a backup not being available some data may be recoverable using a third party data recovery expert. This would involve the storage media being removed and sent away for

a forensic recovery process to take place. This can be at significant cost and may take several days or weeks to fully complete.

Please note that where data is stored in cloud systems, a recovery may not be possible at all due to the service level offered as part of the subscription or the technical capabilities of the system.

When implementing a cloud based system it is essential that both a fail-over platform be part of the service and also that specific end user recoverable backups be taken at regular intervals. Most cloud subscriptions carry out disaster recovery backups to ensure that hardware failure or disasters at their data centres do not affect client operations. These backups are not capable of being used to recover data accidentally or mali

ciously lost through end user operations. If in doubt please discuss this with your system vendor.

 

 

7.19     Virus and malware disinfection

 

Identifying and removing malicious and infectious software to prevent further unwanted effects. Please note that this is a distinctly separate task to the act of remediation of the damage caused.

Viruses, malware, potentially unwanted programs and software detrimental to the operation and performance of a computer system can be considered under this remit.

Maintaining up to date security software and following good security practice should prevent the majority of cases of virus infection, however, infections that take place on day zero - the first day that a virus or malware is released to the wild may infect systems as the antivirus software may not be aware of the behaviour or have the signature of the virus in it’s library in order to protect against it. Maintaining multiple layers of defence is the best form of prevention against these forms of threats.

In particularly bad scenarios, the best form of disinfection is the reformatting of the affected computer system to ensure that there are no traces of virus or back doors left on the system. This may involve several hours workshop time

 

 
   

 

 

8.          Termination of agreement

 

This Agreement may be terminated by either Party upon ninety (90) days’ written notice to the other Party.

If either party terminates this Agreement, Entire IT will assist the Client in the orderly termination of services, including timely transfer of the services to another designated provider. The Client agrees to pay Entire IT Service Provider the actual costs of rendering such assistance.