The Parties
You (hereafter, “Client” or “Customer” interchangeably) have elected to do business with CLEARPATH TECHNOLOGY PARTNERS, INCORPORATED (hereafter, “Contractor”) for management, service, and support of Client’s computers, computer networks, computer software, and other technology components (hereafter “Technology Network”), demonstrated by signed Proposal(s) or Quote(s) and signed MSA (Master Service Agreement, hereafter “The Agreement”) at the time and place on record, and referencing these Terms therein.
Client is hereby bound by these Terms throughout the duration of The Agreement. These Terms may be updated from time to time, with or without written notice, as appropriate.
Service Coverage
Remote Help Desk and any Support of Client’s Technology Network will be provided to the Client by Contractor through remote (controlled virtual access) means between the hours of 8:00 am – 5:00 pm Monday through Friday in Client’s choice of Pacific, Central or Eastern Time Zone, excluding public and other company holidays. Network Monitoring Services will be provided 24/7/365 and all remediation shall be done during business hours.
All services qualifying under these conditions, shall be defined here.
- Support and Escalation – Contractor will respond to Client’s Service Tickets under the provisions of The Agreement, and with best effort after hours or on holidays.
Service Tickets must be opened via:
- Phone Call or Text to a Unique Support Number
- Support Portal, Support Icon, or other similar electronic means as may be designated
- By unique support email
- Ticketing – Each service request will be assigned a Service Ticket number for tracking, which will serve as an ongoing repository of service requests either created by the Client or by Contractor as a part of ongoing network monitoring. In the event where a service request and a Contractor resource is available, the Client may engage with Contractor’s Chat Assist dialogue tool through their Client Portal. As the Contractor resource may find necessary, a service ticket may be created to track or otherwise follow up with a Client-disclosed issue in accordance with the Service Level Agreement (SLA) timeframes and expectations.
- All tickets submitted will receive three contact attempts by a Contractor representative to the ticket contact, to gain clarity on the details of the request or to gain permission to begin working on the issue. If no response is given to these contact attempts, the ticket will be closed and marked “NO END USER CONTACT | Attempted Outreach – No Call Back” and the ticket will not count toward overall SLA numbers.
- Service outside Normal Working Hours – Emergency services performed outside of the hours of 8:00 am – 5:00 pm Monday through Friday, excluding public and other company holidays, if undertaken, shall be subject to additional fees according to the Rate Card set forth in these Terms.
- Actual Liability Limitations – In no event shall Contractor be held liable for indirect, special, incidental or consequential damages arising under The Agreement or these Terms, including but not limited to loss of profits or revenue, loss of use of equipment, lost data, costs of substitute equipment, or other costs. Contractor or its suppliers shall not be liable for any indirect, incidental, consequential, punitive, economic or property damages whatsoever (including any damages for loss of business profits, business interruption, loss of data or other pecuniary loss) arising out of these Terms or The Agreement.
- Service Operations Disclaimer – Client grants Contractor authorization to view any data within the regular routine of the repair or system improvement. Client also authorizes Contractor to reasonably delete, change, and/or rewrite any necessary information to complete the system repair or improvement that is consistent with the standards and practices in the industry.
Monitor and Remediate Services
- Support for Hardware and Software – Contractor shall keep a running supported device list (The List) and shall invoice accordingly against Client’s regular monthly invoice. The List may be reviewed by and between Client and Contractor from time to time to ensure accuracy. Contractor shall provide support for and facilitate vendor replacement of all hardware and systems specified in Contractor’s running supported systems list, provided that all Software is Genuine, Currently Licensed, and Vendor-Supported. Should any hardware or systems fail to meet these provisions, they will be excluded from this Service Agreement. Should 3rd Party Vendor Support Charges be required in order to resolve any issues, these will be passed on to the Client after first receiving the Client’s authorization to incur them.
- Monitoring Services Provided Under The Agreement – Contractor will provide ongoing monitoring services of all critical devices as indicated in Contractor’s running supported systems list. Contractor will provide regular reports as well as document critical alerts, scans and event resolutions to Client. Should a problem be discovered during monitoring, Contractor shall make every attempt to rectify the condition in a timely manner through remote means or via use of additional monitoring teams as employed by the Contractor.
Network Suitability Requirements
- Requisite Network Standards for Contractor Support Qualification – In order for Client’s existing environment to qualify for Contractor’s I.T. Managed Services, the following requirements must be continually met:
- All Servers, Desktops and Computer equipment in the Client Network, must be manufacturer supported.
- All Computers and Network Equipment must have Licensed Software and be supported by its manufacturer.
- All Wireless data traffic in the environment must be securely encrypted, without exception.
- Hardware Equipment Agreement – Client agrees that all equipment provided by Contractor will remain sole property of Contractor which retains a 100% security interest. Such equipment shall be inventoried by make, model, and serial number and may be clearly marked with an inventory tag indicating the equipment is the Contractor’s property. Such an inventory tag shall be provided only for convenience and ease of identification and lack of such inventory tag shall not release Contractor’s security interest. Client will not attempt to sell, resale, tamper, troubleshoot, repair, move, add, etc. to this equipment without written permission of Contractor. Should The Agreement be terminated by either party, Client agrees to return the property listed in Proposal, or after acquired, to Contractor within 10 days after the final cancellation date. During the term of The Agreement, Contractor shall retain ownership of the administrative passwords to this equipment, and may, at its sole discretion, sell its interest in the equipment to the Client at the termination of The Agreement.
- Client further acknowledges and gives permission to Contractor to take possession of said equipment from location listed in event of termination of The Agreement after 10 day grace period, and agrees to compensate Contractor for expenses accrued during the recovery in addition to all amount owing under the balance of the agreement.
- Client agrees and understands that Contractor-owned equipment is to be maintained completely by Contractor, without exclusion. Any tampering, repair attempt or service completed by another party on said equipment will be identified by Contractor as a material breach of security, where the Client willfully breaches a material term of The Agreement and these Terms.
- Loss Payee Requirement – Client agrees to make all logical and earnest attempts to keep equipment safe, secure and protected while in their possession. Client agrees to keep current insurance on Contractor supplied equipment while in their possession and list Contractor as an additional loss payee. Client will provide proof thereof to Contractor that Contractor is listed as an additional loss payee, providing a current copy of its insurance declaration sheet showing Contractor as a loss payee specifically for mobile equipment coverage. Client further agrees to be responsible for any and all costs for the repair or replacement of Contractor supplied equipment while in their possession should it be damaged or repaired by an unauthorized third party.
- Client Default – Should Client default, permission shall not be reasonably withheld to enter Client premises, under supervision if Client deems necessary, and remove all of Contractor’s hardware, and all efforts to recover such property will be deemed consensual and not a trespass. Client agrees to fully cooperate and will not interfere in any way, including but not limited to involving law enforcement. Client acknowledges that documented hardware provided under The Agreement belongs to Contractor, which retains a 100% Security Interest, and Contractor may repossess or recover without notice, upon breach of The Agreement by Client.
UCaaS Tier 0-2 (IT Support Agreements Not Included)
1. Scope of Services
- Services Provided:
- Tier 0 – Self-Service Support:
- Access to an online knowledge base, FAQs, automated self-help tools, and interactive tutorials for Wildix UCaaS solutions.
- Tier 1 – Basic End User Support:
- Direct support via phone, email, or chat for standard inquiries, including issues such as login problems, password resets, and basic troubleshooting.
- Incident logging, standard troubleshooting, and initial escalation handling.
- Tier 2 – Intermediate Technical Support:
- Advanced troubleshooting for issues beyond the first level, including remote sessions and diagnostic analysis.
- Coordination with vendor support when required, within the limits of Tier 2 capabilities.
- Exclusions:
- Tier 3 Technical Support: Any advanced troubleshooting requiring in-depth technical intervention is not included.
- Project Management & New Installations: Support related to new UCaaS deployments, project management, or onboarding of recently installed services are excluded.
- Advanced Technical Changes: In-depth program modifications, system integrations, customizations, and any high-level technical programming changes are outside the scope.
- IT Support Agreements Beyond Tier 0-2: No additional IT support services or escalations outside this defined Tier 0-2 framework are covered under this agreement.
2. Client Responsibilities & Additional Considerations
- The client is responsible for the initial configuration and basic setup of the Wildix UCaaS solutions.
- Requests for escalation beyond Tier 2, such as Tier 3 support or services outside this scope, must be separately authorized and will incur additional fees or require a separate contractual arrangement.
- CPT provides these services on a best-effort basis within the defined service hours and will not be held liable for issues arising from misconfiguration or modifications made outside the scope of this agreement.
3. Limitations & Disclaimers
- All services provided under this Tier 0-2 agreement are offered without any express or implied warranty regarding resolution times or system uptime.
- CPT shall not be liable for any indirect, incidental, or consequential damages resulting from delays or failures in providing the agreed services.
4. Term & Termination
- This section remains in effect for the duration of the contractual term and will automatically conclude upon termination of the overall agreement, subject to any terms regarding early termination for cause.
Consultation, Advisory and Training Agreements
1. Scope of Services
- Consultation Services:
- In-depth business consultations covering the review of Technical, Operations, and Sales departments.
- Comprehensive SWOT analysis and the development of a 12‑month strategic roadmap with specific, actionable recommendations.
- Advisory Services:
- Development and documentation of best practices and standard operating procedures, focusing on operational efficiencies and sales effectiveness.
- Delivery of training sessions to ensure proper implementation of these procedures.
- Training Services:
- Tier 3 technical training that involves hands‑on, monthly training sessions, interactive working sessions, and technical think tanks to elevate technician skills.
- Provision of supplemental support materials and access to resource portals for continuous learning.
2. Client Obligations
- The client shall provide CPT with necessary access to relevant data, personnel, systems, and internal processes required to perform the services.
- A designated project liaison from the client’s side must be appointed to facilitate communication, scheduling, and feedback throughout the engagement.
- The client is responsible for ensuring that internal processes are aligned to support the implementation of CPT’s recommendations.
3. Performance, Deliverables & Schedule
- CPT will deliver comprehensive reports, actionable recommendations, training materials, and advisory documentation according to the mutually agreed schedule.
- All deliverables will be provided in electronic format, with periodic review meetings to assess progress and incorporate client feedback.
- Services will be performed in accordance with the detailed scopes and methodologies described in the engagement proposal.
4. Payment Terms and Contract Duration
- This agreement is structured as a monthly recurring service over a 12‑month term, with payments due on the first day of each billing cycle.
- Any adjustments or additional services beyond the agreed scope will require a documented change order and may result in additional charges.
- All billing is subject to the overall payment terms outlined in the master agreement.
5. Limitation of Liability and Disclaimers
- CPT’s role is strictly advisory and consultative; while best efforts are made to provide accurate, actionable strategies and training, outcomes are not guaranteed.
- CPT disclaims any liability for incidental or consequential damages arising from the use of the provided advice, training, or consultation services.
- The success of any recommended improvements is contingent upon the client’s full cooperation and effective implementation of suggested strategies.
6. Termination and Amendments
- These services shall be provided for the contract duration, with provisions for termination for cause as outlined in the master agreement.
- Any amendments, modifications, or additional services must be agreed upon in writing by both parties prior to execution.
Out of Scope Services and Interventions
Below is a comprehensive “Out of Scope” list designed to clearly define and protect the boundaries of our remote IT services (available 8am–5pm) and ensure that our responsibilities are aligned with our core service offerings. As the nature of The Agreement is unique and specific to your network infrastructure, it is imperative that a delineation is made between what is included and what is excluded under The Agreement and these Terms. The following are listed as exclusions to The Agreement:
1. Onsite Services and Physical Interventions
- Any support, maintenance, or troubleshooting outside our standard business hours (8am–5pm) is excluded.
- Emergency onsite visits are not provided under our remote-only service model.
2. Onsite Services and Physical Interventions
- Physical repairs, installations, hardware replacements, or any work that requires a technician’s presence at the client site.
- Network cabling, electrical work, or any other physical infrastructure adjustments.
3. Unsupported Hardware and Software
- Maintenance or troubleshooting of legacy, custom-built, or non-standard hardware and software systems that are not explicitly included in our service agreement.
- Support in the appropriate trade use of any software product, including but not limited to software used in the execution of accounting practices, architectural skills, legal notation, etc.
- Devices or systems for which the manufacturer no longer provides support or updates.
- Any cables or consumables of any kind.
4. Deep-Dive Forensic and Incident Analysis
- Detailed forensic investigations beyond initial incident triage and escalation are outside our standard scope.
- Full-scale cybersecurity incident investigations that require specialized, on-site forensic analysis.
5. Advanced Disaster Recovery and Data Forensics
- Comprehensive disaster recovery planning or restoration services that exceed routine backup and recovery procedures.
- Services related to large-scale data recovery or physical data center restoration.
6. Customized Project Management and IT Consulting Beyond Agreed Projects
- Any IT project, implementation, or consulting services that have not been explicitly defined and agreed upon in a separate contract.
- Major network redesigns, system overhauls, or other complex initiatives requiring prolonged engagement.
7. Third-Party and Vendor Issues Requiring Onsite Intervention
- Support for problems that arise directly from third-party vendor services where onsite intervention is necessary.
- Liaison or troubleshooting for issues that fall outside of our contractual responsibilities with third-party providers.
8. Onsite Training and In-Person User Support
- In-person training sessions, workshops, or user support events. All training and support, if provided at all, are provided remotely.
- Customized on-site user education sessions or presentations.
9. Home Office or Remote Employee Equipment
- Support for personal or non-business-critical devices not part of the client’s officially managed IT infrastructure.
- Services for devices located outside of approved business locations unless explicitly covered in the contract.
10. Physical Security and Facilities Management
- Installation, maintenance, or monitoring of physical security systems (e.g., surveillance cameras, access control systems).
- Any service involving physical modifications or the security of client premises.
11. Unauthorized Data Transfers or Non-Contractual Data Management
- Data migration, transfer, or synchronization tasks not included in the service scope.
- Handling of sensitive or non-business data that falls outside the parameters of agreed business operations.
12. Telephony and VoIP Hardware Adjustments
- Onsite troubleshooting, repair, or configuration of telephony or VoIP hardware that require physical access to equipment.
13. Procurement and Supply of Hardware/Equipment
- Sourcing, ordering, or delivering hardware, software, or other IT equipment.
- We may provide recommendations but do not assume responsibility for procurement logistics or vendor negotiations.
14. Custom Integration and Development Work
- Development of custom integrations, applications, or scripts beyond minor adjustments required for standard support.
- Any programming or software development projects not clearly outlined in the service contract.
15. In-depth Network Infrastructure Redesign
- Comprehensive redesign or re-architecture of network infrastructure that exceeds routine maintenance and minor adjustments.
- Planning and execution of major network expansion or overhaul projects.
16. Compliance Audits and Regulatory Reporting
- Full-scale audits, compliance reviews, or regulatory reporting beyond our standard support scope, unless previously contracted.
17. Physical Data Center and Server Room Management
- Onsite management, maintenance, or physical upgrades of data center facilities or server rooms.
18. Managed Print Services Beyond Remote Assistance
- Direct management, servicing, or repair of printers and scanners that require on-premise technical support.
19. Custom Security Solutions and Onsite Installations
- Development or deployment of custom security solutions that necessitate on-site hardware installations or modifications.
20. Services Not Explicitly Defined in the Contract
- Any other tasks or interventions not specifically listed in the agreed-upon service contract or statement of work.
This “Out of Scope” list is intended to safeguard our service boundaries, ensure clarity in service expectations, and protect our remote-only IT services model. Should any needs arise beyond these boundaries, they will require a separate agreement or engagement to address those specialized requirements.
Confidentiality of Service
- Contractor and its agents may use Client information, as necessary to or consistent with providing the contracted services, and will use best efforts to protect against unauthorized use.
- In order to fulfill Contractor’s duties and responsibilities of maintaining network security and confidentiality, administrative passwords will be retained by Contractor and kept under tightly-controlled release to the Client. Client shall protect administrative passwords under lock and key.
- Upon the mutual agreement of Contractor and the Client, including payment of all sums due to Contractor, passwords and other administrative codes will be released to the Client or others at the Client’s written direction.
Termination / Cancellation Terms
- The Agreement may be pre-terminated for any reason by the Client upon thirty (30) days written notice if:
- Client agrees to pay an Early Termination Fee to Contractor, under the following criteria:
- If pre-termination is requested by the Client, it shall be done solely upon all remedies provided to Client and Contractor in these Terms having been first exhausted.
- Should all remedies provided to Contractor under these Terms be exhausted, Contractor will derive an Early Termination Fee 50% of the remaining value of The Agreement.
- Client will be sent an Early Termination Quotation, for approval and signature – wherein if executed, payment shall be immediately necessary in order to ensure a timely transfer of services to another credible provider.
- In case of failure of Contractor to fulfill in any material respect its obligations under The Agreement and these Terms shall be given thirty (30) days to cure such failure following Client’s written notice of such failure.
- Should Contractor fail to remedy such failure within 30 days of notice, Client may terminate The Agreement without further obligation, subject to all other conditions of termination or finality of The Agreement.
- Contractor reserves the sole right to cancel The Agreement at any time, with thirty (30) days advance written notification.
- If the Client chooses to pre-terminate The Agreement, Contractor will assist the Client with the orderly termination of services, including timely transfer of the services to another designated provider, under the following stipulations:
- Client agrees that the thirty (30) days advance notice required shall be used for a period of “offboarding,” during which:
- All end-user support shall cease immediately upon notice of termination.
- All property and software and software licensing solely owned or curated by Contractor under The Agreement shall be removed from Client’s premises on a schedule to be determined by Contractor, but not later than 30 days following notice of termination.
- Client agrees to pay Contractor the actual costs of rendering such assistance. Actual costs could include but are not limited to: knowledge transfer, data transfer, license transfers or equipment de-installation.
- Client acknowledges that in the event of pre-termination, Contractor shall use any and all remedies under the law, to protect any equipment or intellectual property provided in The Agreement.
Service Conduct Definitions
- Contractor, at times, may send its employees and/or authorized agents to the Client’s site or service location, or may allow its employees and/or authorized agents to remote support Client’s employees and other End Users during the term of The Agreement. The Client in no way, may solicit, inquire or otherwise make an arrangement of employment, contract or covenant, either direct or indirect, with an employee of Contractor, during The Agreement and surviving for a period of three (3) years after an employee is employed by Contractor.
- In the event of a breach of this clause, Contractor will be entitled to punitive damages, including but not limited to the full face value of The Agreement, and 1 year’s annual salary of the employee solicited, and may cancel all service agreements with the Client, by virtue of a breach hereto.
2. The Client acknowledges that during the term of The Agreement, Contractor has been granted exclusive right to
manage Client’s Technology Network, no subsidiary Technology Service Provider, Managed Service Provider,
contractor or individual human resource, either by invitation or by solicitation, may be allowed to investigate,
scope or diagnose the Client’s Technology Network, in part or in whole, without prior knowledge of Contractor.
- In the event where Contractor learns, that the Client has allowed another Technology Service Provider, contractor or individual human resource to investigate, scope or diagnose the Client’s Technology Network without Contractor’s prior knowledge, Contractor has the sole right to execute a ‘Material Breach’ of The Agreement in accordance with terms set forth herein, including but not limited to any available legal remedies under the law.
- In any event, where a legal entity or firm has been solicited to investigate the Client’s Technology Network, or any supported device thereto, the Client must immediately notify and request the assistance of Contractor to comply with an external request. Contractor may request documentation, including subpoenas or legal service notifications, to assert the nature of the network investigation, in order to ensure that the proper access is provided and scheduled for compliance.
3. Quarterly Business Reviews – Client acknowledges that participation in Quarterly Business Reviews (QBR’s)
between 1.) the Client’s Owner, Executive Director, Principal Partner, CEO, or other designated Company
Authority, and 2.) the Client’s designated Virtual CIO or Account Manager as determined by the Contractor, are a
requirement for service under The Agreement, and such participation will take place a minimum of four (4) times
per year, according to mutually available times and places, on an predetermined regular schedule agreed upon
in writing within 30 days of signing The Agreement.
- During the QBR, the Client’s representative will be discussing with Contractor the Client’s overall technology strategy, performance of the account, ticket distribution, network stability, suggestions for improvement, and additional products and services that may be required to fully service the account, all according to an agenda set by the Virtual CIO or Account Manager.
- Scheduled QBR’s may be cancelled upon notice given to either party, but must be rescheduled within 30 days of the regular appointment date.
Jurisdiction and Venue of Enforcement
- The Agreement and these Terms shall be governed by, construed, and enforced in accordance with the laws of the State of Texas, where it shall maintain Jurisdiction. It constitutes the primary Agreement between Client and Contractor for the services outlined herein. The Agreement can be modified only by a signed written Addendum by both parties.
- If any collection action, litigated or otherwise, is necessary to enforce the terms of the Agreement, Contractor shall be entitled to reasonable attorneys’ fees and costs in addition to any other relief to which it may be entitled.
- If any provision in The Agreement is held by a court of competent jurisdiction to be invalid, void or unenforceable, the remaining provisions shall nevertheless continue in full force without being impaired or invalidated in any way.
- Contractor is not responsible for failure to render services due to circumstances beyond its control including, but not limited to, acts of God, natural disasters, pandemic, public health crisis, war, civil uprising, or other Force Majeure.
Typical Services Found In The Agreement
These services may or may not be included in your Proposal, The Agreement, these Terms of Service, or your monthly invoice. They are provided for guidance and clarification only, and should not be assumed to be covered or offered in The Agreement unless specified as covered or offered.
PILLAR I
HELP DESK SUPPORT
- 8/5 Unlimited Help Desk Support for Day-to-Day Issues (such as):
- Printer support
- Software support
- Email support
- Smart phone and tablet support
- Support Ticket Management System to Track Issue
COMMON PILLAR I BENEFITS
User Account and Access Management
- Password Resets: Assisting users with forgotten or expired passwords.
- Account Lockouts: Unlocking accounts due to multiple failed login attempts.
- Provisioning New Accounts: Creating user accounts for new employees.
- Access Requests: Granting or revoking access to shared drives, applications, or resources.
Hardware Support
- Troubleshooting Printers and Scanners: Resolving connectivity or performance issues with peripherals.
- Desktop/Laptop Issues: Addressing boot problems, lags, or hardware failures.
- Peripheral Setup: Assisting with monitors, docking stations, keyboards, or mice.
- Suggesting Equipment Replacement: Recommending faulty hardware like aginig systems, hard drives or power supplies or peripherals be replaced.
Software Support
- Application Installation: Installing or updating software as per user requirements.
- License Management: Ensuring users have valid software licenses.
- Software Troubleshooting: Resolving errors, crashes, or compatibility issues.
Networking
- Wi-Fi Connectivity Issues: Helping users connect to corporate wireless networks.
- VPN Troubleshooting: Assisting with remote access to the enterprise network.
- Email Issues: Resolving problems with sending/receiving emails or syncing devices.
Security and Compliance
- Virus/Malware Removal: Advising on potential threats from infected devices.
- MFA: Assisting users with setting up or troubleshooting multi-factor authentication
- Security Awareness: Responding to phishing attempts and guiding users on secure practices.
Collaboration Tools
- x-bees/Microsoft Teams/Zoom/Voxo Support: Helping with meetings, chat, or collaboration issues.
- File Sharing Issues: Troubleshooting problems with cloud services like OneDrive, SharePoint, or Google Drive.
General IT Support
- Incident Documentation and Ticket Resolution: Logging issues, tracking resolutions in a ticketing system, and following up on recurring problems.
PILLAR II
NETWORK AND DEVICE MANAGEMENT
- 24/7 Monitoring for Hardware Failures and Unusual Events
- Operating System Updates/Patching
- Security Updates/Routine System Hardening per SOC/Patching
- Active Directory Maintenance
- User Rights Management
- Shared File Management
- Operating System Updates/Patching
COMMON PILLAR II BENEFITS
Network Monitoring and Performance
- Real-Time Network Monitoring: Keeping a constant watch on network performance metrics to identify bottlenecks or outages.
- Bandwidth and Traffic Analysis: Analyzing network traffic to optimize usage and plan for future capacity.
- Performance Reporting: Generating and reviewing regular reports on network performance and uptime.
Hardware Management and Configuration
- Router and Switch Configuration: Setting up, configuring, and maintaining routers, switches, and related network devices.
- Firmware and Software Updates: Applying patches and updates to network hardware to ensure security and performance.
- Device Replacement and Maintenance: Troubleshooting hardware issues, scheduling replacements, and coordinating repairs.
Troubleshooting and Support
- Issue Diagnosis and Resolution: Investigating and resolving network connectivity issues, downtime, or performance degradation.
- Advanced Troubleshooting: Provide seasoned technical support through remote tools.
Network Infrastructure Management
- Network Expansion and Integration: Assisting with integrating new devices or expanding network capacity as the business grows.
Change Management and Documentation
- Implementing Network Changes: Coordinating scheduled maintenance, upgrades, or configuration changes with minimal disruption.
- Documentation of Network Topology: Keeping up-to-date records of network layouts, configurations, and asset inventories.
- Compliance and Policy Enforcement: Ensuring that network configurations and operations adhere to security policies and industry standards.
PILLAR III
NETWORK SECURITY MANAGEMENT
- Firewall
- Content Filtering
- Networking and Routing
- Intrusion Prevention (IPS)
- VPN
- Synchronized Application Control
- Web Protection and Control
- Application Protection and Control
- Cloud Application Visibility
- Logging and Reporting
COMMON PILLAR III BENEFITS
Identity and Access Management
- Managing Access and Permissions: Ensuring appropriate access to systems and data.
- Enforcing (MFA): Enforcing and troubleshooting MFA for critical business applications.
- Managing Unauthorized Access Attempts: Investigating failed login attempts or suspicious activity and managing password policies.
Endpoint and Network Security
- Managing Antivirus Solutions: Ensuring all endpoints have up-to-date threat protection.
- Managing Firewall Rules: Configuring firewalls to block unauthorized traffic.
- Securing Wi-Fi and VPN: Configuring secure remote access for employees.
- Vulnerability Scans: Scanning systems for security vulnerabilities and applying patches.
Security Awareness and Incident Response
- Phishing Awareness: Educating employees about social engineering threats.
- Investigating and Responding to Security Incidents: Analyzing alerts and logs for signs of cyberattacks or breaches and responding appropriately.
- Monitoring Security Logs and Alerts: Reviewing logs from security tools and firewalls.
Data Protection and Compliance
- Managing Data Encryption: Encrypting sensitive business data in transit and at rest.
- Ensuring Compliance with Industry Regulations (e.g., HIPAA, PCI-DSS, GDPR): Implementing policies and software to meet security and privacy requirements.
- Device Hardening: Applying security policies to company-owned assets.
Cloud and Application Security
- Securing Microsoft 365/Google Workspace/Apple Accounts: Configuring security settings for cloud productivity suites.
- Managing Secure Access to SaaS Applications: Ensuring third-party business applications follow security best practices.
General Security Administration
- Security Audits: Regularly evaluating the security posture of the organization.
- Developing and Enforcing IT Security Policies: Creating policies for acceptable use, data protection, and security best practices.
PILLAR IV
BACKUP AND DISASTER RECOVERY
- Advanced On-Site Backup and Disaster Recovery (BDR) Unit, as necessary.
- Local storage and stand-by server in the event of server failure, as necessary.
- Secure Off-Site Storage
- Restoration of Files or Folders
- Full Recovery of Server System State, when appropriate.
- Full Management of the BDR and Remote Storage
COMMON PILLAR IV BENEFITS
Backup Management
- Maintaining Backup Solutions: Setting up automated backups for critical data.
- Monitoring Backup Jobs: Ensuring backups run successfully.
- Regular Backup Testing: Verifying that backups are complete, accurate, and restorable.
- Managing Retention Policies: Defining how long backups are stored for business needs.
- Securing Backup Data: Encrypting backups and ensuring access controls are in place.
- Cloud Backups: Ensuring backups are stored in a cloud data center.
- Managing Capacity: Ensuring there is enough storage for new backups and archives.
Disaster Recovery Planning
- Documenting Recovery Objectives (RPO & RTO): Defining acceptable data loss (Recovery Point Objective) and recovery time (Recovery Time Objective).
- Recovery Testing: Conducting regular drills to ensure recovery processes are effective.
- Coordinating with Leadership: Communicating recovery steps with key stakeholders.
- Implementing Business Continuity Strategies: Ensuring critical business functions can continue during a disaster.
Data Restoration and Recovery
- Data Restores for Users: Assisting employees with recovering lost or deleted files.
- Restoring Servers and Workstations After Failures: Recovering full system images and recovering clean backups after hardware or software failures, or cyber attacks.
- Troubleshooting Backup and Restore Failures: Diagnosing issues with backup software, storage, or network.
Compliance and Security
- Ensuring Compliance with Regulations (e.g., HIPAA, PCI, GDPR): Maintaining backup practices that meet industry regulations.
- Monitoring Backup Security Logs: Identifying unauthorized access attempts or backup anomalies.
Continuous Improvement and Reporting
- Reviewing and Updating Backup and Recovery Policies: Adjusting strategies based on business growth, new risks, and technology changes.
SUPPORT TIERS
The following schedule details and outlines the Support Tiers which serve The Agreement
Tier 1 Support
All support incidents begin in Tier 1, where the initial trouble ticket is created; the issue is identified and clearly documented, and basic hardware/software troubleshooting is initiated.
Tier 2 Support
All support incidents that cannot be resolved with Tier 1 Support are escalated to Tier 2, where more complex support on hardware/software issues can be provided by more experienced Engineers.
Tier 3 Support
Support Incidents that cannot be resolved by Tier 2 Support are escalated to Tier 3, where support is provided by the most qualified and experienced Support Engineers who have the ability to collaborate with 3rd Party (Vendor) Support Engineers to resolve the most complex issues.