SLM-SLA Example - Multi-Service
SLM-SLA Example - Multi-Service
for
Document History........................................................................................................................... 5
1.0 Introduction.......................................................................................................................... 6
1.1 Purpose of the Service Level Agreement......................................................................6
1.2 How to Use This Document...........................................................................................6
1.3 Responsibilities to the Customer...................................................................................6
2.0 Interpretations...................................................................................................................... 7
2.1 Abbreviations................................................................................................................. 7
2.2 Terms............................................................................................................................ 7
3.0 Problem Handling (via Global 24x7 Support).......................................................................8
3.1 Problem Handling Flow.................................................................................................. 8
3.2 Priority Table................................................................................................................. 8
3.3 Contacts........................................................................................................................ 9
3.4 Non-Response Escalation............................................................................................. 9
3.5 Escalation Outside of SLA............................................................................................. 9
4.0 Performance Measures...................................................................................................... 10
4.1 Connectivity................................................................................................................. 10
4.2 Monitoring & Capacity Planning...................................................................................10
4.3 Resilience & Fault Tolerance.......................................................................................10
5.0 Service Downtime.............................................................................................................. 11
5.1 Planned or Scheduled Downtime.................................................................................11
5.2 Unplanned or Unscheduled Downtime........................................................................11
5.3 Outages....................................................................................................................... 11
6.0 Security.............................................................................................................................. 12
6.1 Physical....................................................................................................................... 12
6.2 Data Protection............................................................................................................ 12
6.3 Confidential Data......................................................................................................... 12
6.4 Commercially Sensitive Data.......................................................................................12
6.5 E-Commerce Data....................................................................................................... 12
6.6 Remote Access............................................................................................................ 13
6.7 Third-Party Access to Information and Data................................................................13
7.0 Customer Responsibilities.................................................................................................. 14
8.0 Change Control and Management.....................................................................................15
8.1 Customer Requests..................................................................................................... 15
8.2 XYZ-Company Requests............................................................................................. 15
9.0 Service Description: Standard Web Service......................................................................16
9.1 Introduction.................................................................................................................. 16
9.2 Hardware..................................................................................................................... 16
9.3 Software...................................................................................................................... 16
9.4 Functionality................................................................................................................ 16
9.5 Reporting / Measurement............................................................................................ 16
9.6 Request Process......................................................................................................... 16
10.0 Service Description: Advanced Application Service.....................................................17
10.1 Introduction.................................................................................................................. 17
10.2 Hardware..................................................................................................................... 17
10.3 Software...................................................................................................................... 17
10.4 Functionality................................................................................................................ 17
10.5 Reporting / Measurement............................................................................................ 17
10.6 Request Process......................................................................................................... 17
11.0 Service Description: International User Registration (IUR)..........................................18
11.1 Introduction.................................................................................................................. 18
11.2 Hardware..................................................................................................................... 18
11.3 Software...................................................................................................................... 18
11.4 Functionality................................................................................................................ 18
11.5 Reporting / Measurement............................................................................................ 18
11.6 Request Process......................................................................................................... 18
12.0 Service Description: Personalisation Services Interface (PSI).....................................20
12.1 Introduction.................................................................................................................. 20
12.2 Hardware..................................................................................................................... 20
12.3 Software...................................................................................................................... 20
12.4 Functionality................................................................................................................ 20
12.5 Reporting / Measurement............................................................................................ 20
12.6 Request Process......................................................................................................... 20
13.0 Service Description: Domain Name Management.......................................................21
13.1 13.1 Introduction.......................................................................................................... 21
13.2 Hardware..................................................................................................................... 21
13.3 Software...................................................................................................................... 21
13.4 Functionality................................................................................................................ 21
13.5 Reporting / Measurement............................................................................................ 21
13.6 Request Process......................................................................................................... 21
14.0 Service Description: Vanity / Alias Mail........................................................................22
14.1 Introduction.................................................................................................................. 22
14.2 Hardware..................................................................................................................... 22
14.3 Software...................................................................................................................... 22
14.4 Functionality................................................................................................................ 22
14.5 Reporting / Measurement............................................................................................ 22
14.6 Request Process......................................................................................................... 22
15.0 Service Description: Mass Mail....................................................................................23
15.1 Introduction.................................................................................................................. 23
15.2 Hardware..................................................................................................................... 23
15.3 Software...................................................................................................................... 23
15.4 Functionality................................................................................................................ 23
15.5 Reporting / Measurement............................................................................................ 23
15.6 Request Process......................................................................................................... 23
16.0 Service Description: Quality Assurance.......................................................................24
16.1 Introduction.................................................................................................................. 24
16.2 Hardware..................................................................................................................... 24
16.3 Software...................................................................................................................... 24
16.4 Functionality................................................................................................................ 24
16.5 Reporting / Measurement............................................................................................ 24
16.6 Request Process......................................................................................................... 24
17.0 Service: International D-Cards.....................................................................................25
17.1 Introduction.................................................................................................................. 25
17.2 Hardware..................................................................................................................... 25
17.3 Software...................................................................................................................... 25
17.4 Functionality................................................................................................................ 25
17.5 Reporting / Measurement............................................................................................ 25
17.6 Request Process......................................................................................................... 25
18.0 Service Description: Search Engine Optimization & Submission.................................26
18.1 Introduction.................................................................................................................. 26
18.2 Hardware..................................................................................................................... 26
18.3 Software...................................................................................................................... 26
18.4 Functionality................................................................................................................ 26
18.5 Reporting / Measurement............................................................................................ 26
18.6 Request Process......................................................................................................... 26
19.0 Service Description: HitBox Site Analysis....................................................................27
19.1 Introduction.................................................................................................................. 27
19.2 Hardware..................................................................................................................... 27
19.3 Software...................................................................................................................... 27
19.4 Functionality................................................................................................................ 27
19.5 Reporting / Measurement............................................................................................ 27
19.6 Request Process......................................................................................................... 27
20.0 Appendix 1: SLA Table of Services.............................................................................28
21.0 Appendix 2: SLA Table of Service - Descriptions........................................................30
Document History
Version Date Description
1.0 Initial Draft
1.1 Initial Draft Review
1.2 Content Update
1.0 Introduction
This Service Level Agreement (SLA) between Service Management and its partners exists to
ensure that service quality is provided regularly and in a manner that is intrinsic to the success of
the XYZ-Company and its partners.
This SLA
Generic Service Level Agreement applied terms and conditions
Responsibilities of both IT and our partners
How problems are handled
How IT plans for resilience and capacity
How changes to Service Levels or the SLA are proposed and accepted
Descriptive overviews of Services offered
2.1 Abbreviations
SLA Service Level Agreement
LoB Line of Business
DMD Domain Management
Database
IUR International User
Registration
PSI Personalization Services
Interface
DNS Domain Name System
BU Business Unit
2.2 Terms
Office Hours 09:00 to 17:30 Monday to Friday
(London time)
(English Bank Holidays treat as out of
hours)
1 Month 1 Calendar month
1 Day 24 hours
Working Day As office hours above
Next Working Day Service provider’s next working day
(London)
5x8 Average office working week
24x7 24 hours at 7 days a week
Hosting Operation and maintenance of servers
on which the web site is located (Data
Centre)
Quality Assurance Testing of data & code to ensure no
errors or broken links in line with XYZ-
Company Design Policy
Account Manager XYZ-Company employee who acts as
point of contact for LoB or Business Unit
Service Availability Uptime of service expressed as
percentage (%)
Scheduled Downtime Planned monthly downtime in which
routine monthly maintenance is required
or necessary
Problem Response Time Time taken (hours) to acknowledge
problem and begin resolution or fix
Out of Hours Any hours outside of normal office hours
(London)
Scheduled New Service Request Average time measured in working days
taken from initial request of service to
delivery of service
Change Control Management Request to change or alteration of
service by either party as outlined in
Change Control Procedures
Internal References XYZ-Company functionality
and responsibility
External References non-XYZ-Company or 3rd
party functionality
3.0 Problem Handling (via Global 24x7 Support)
Problem handling and communication flow is shown in the diagram below. The severity of the
problem will dictate the appropriate priority classification (see Priority Table) and the flow line of
problem notification. In cases where Web Operations has been contacted, a notification of receipt
is sent to both the LoB and the local Account Manager.
3.3 Contacts
The table below provides the appropriate contact names or numbers that are to be used when
reporting priority problems. Calls or requests for assistance should be directed only to those
contacts as provided. Web Operations in London appropriately directs priority calls to the correct
level of support.
Priority calls received, and delegated to the appropriate support resource, are followed up with
the customer or call logger. Regular feedback to the customer during problem resolution is
important to us, and as such all support staff make every effort to keep the customer informed
and updated with progress during resolution.
Specific documentation exists that describes fully to all users and customers of XYZ-Company
International services the problem reporting and handling process.
Priority Contact
Global 24x7 Technical Support
P1/P2/P3 (see User 24x7 Support
Procedures)
P4 Requests Local Account Manager
Should the caller receive no response within the time given in the Problem Response Time, then
the original call will be escalated to the next higher level of line management. In order to escalate
the call the caller will need to again contact the Call Center to request the call be escalated. The
process of non-response escalation is repeated again if necessary but further up line
management.
Technical Operations monitors several server processes (server memory, CPU and disk
activity), and sets a threshold at or around 65% utilization. That is, any utilization
increases above this threshold are flagged then logged.
Should server memory, CPU or hard disk I/O exceed the designated threshold regularly
during normal business use (day to day business activities), then Service Management
will commit to increase server capacity and/or install and commission additional front end
servers.
Capacity planning considers also bandwidth as well as server processes. Monitoring
across a variety of measures allows statistics to be trended over time and enables
forward planning.
Please refer to your Level of Service schedule table for guaranteed service uptime and problem
resolution information.
5.0 Service Downtime
5.1 Planned or Scheduled Downtime
All planned or scheduled downtime is kept to a minimum and is timetabled to cause the minimum
of disruption or loss to services. In nearly all cases customers and users will notice no loss of
services due to the employment of redundant hardware equipment. Where loss of service may be
experienced, XYZ-Company will give notice for any planned or scheduled monthly downtime of
services.
Any scheduled downtime is for the purpose of applying software upgrades, bug fixes and security
patches as recommended by software developers. It also allows for the essential maintenance
and upgrade of any hardware necessary to maintain uptime, reliability and security.
If for any reason the customer believes the planned downtime will seriously impact business and
there is a strong business case against the planned downtime, then they must inform the
originator of the downtime notification before the due date. An agreement will be made and the
downtime rescheduled to an alternative day or time.
5.3 Outages
Unexpected disruption to services or systems that provide access to those services (i.e. network),
are reported as outages. This may be a temporary loss of power to the delivery network, or failure
of some part of the service component. To minimize the possibility of service or network outages
occurring, XYZ-Company employs a network of auto-sensing switches that can divert network
traffic via alternative locations.
Should any unexpected outage or downtime occur Service Management will, at the earliest
possible opportunity, inform designated global contacts who will in turn advise the relevant
Account Managers and LoB managers as necessary. This would be followed up with a more
detailed explanation of the outage and its cause.
6.0 Security
XYZ-Company will maintain the sites and network infrastructure in a manner that is designed to
prevent unauthorized modification of content or server software, and unauthorized disruption of
services and is designed to protect the privacy of data collected from web site users to the extent
required by law and by XYZ-Company policy.
6.1 Physical
Physical server security and protection takes the form of both hardware and software
firewalls and router technology.
An HTTP front channel only is used for browser access.
Security patches are installed on to servers as recommended by, and in accordance with
software vendor procedures.
Any physical modifications necessary to the server or the network that may affect service
availability to the customer will be discussed and arranged as mutually agreed.
Provide in a timely manor, accurate information that has been requested to promote the
successful delivery of any services.
Any third-party development agreements arranged by an LoB must ensure the adherence
of XYZ-Company Technical Specifications for Developers.
Adhere to Problem Resolution paths, as outlined in this agreement, when reporting
service related issues or problems that impact the normal running of business.
Not to make any changes, technical or otherwise, to any systems or services that have
been provided without prior consent or discussion with approved service delivery
personnel.
Keep XYZ-Company informed of all planned network, hardware and software changes
that affect the use and reception of delivered services.
The arrangement for the purchase, repair and maintenance of customer equipment for
the receiving of services is the responsibility of the customer. XYZ-Company will advise
and recommend in cases where specialist equipment or software may be required to
receive and use any service being delivered.
Where the customer elects to provide their own hardware, they must ensure that they
meet the minimum standards and the required operating platform needed to receive and
use the service.
Maintain an updated version of virus protection software, in accordance with XYZ-
Company guidelines, on systems used for the reception and use of any services being
provided to the customer.
Not to divulge privileged contact information, such as phone numbers of management
escalation, to anyone not acting in a services administration or management role.
The customer must adhere to XYZ-Company security standards that protect confidential
information and data belonging to either end users or XYZ-Company. See Security
section of this Agreement.
8.0 Change Control and Management
The Customer may at any time request and XYZ-Company recommend changes of any
service offerings, Service Levels, definitions of service or the Service Level Agreement.
Neither XYZ-Company nor the Customer shall unreasonably withhold its agreement to
any change.
Until such time as a change is made in writing from an authorized person and mutually
approved and accepted, XYZ-Company shall continue to supply the Services and adhere
to the Service Level Agreement as if the request or recommendation had not been made.
9.2 Hardware
Redundant Sun Enterprise class servers
Redundant load balanced Sun class servers
Redundant Cisco Firewalls
Redundant Network Appliance Storage facilities
Redundant Physical connectivity – Appropriate cabling and routing hardware
Redundant Load Balancer (Cisco)
9.3 Software
SunOS
Web Servers
Secure Certificate Access
Perl
ProFTPD
9.4 Functionality
Setup and maintenance of servers / network (hardware)
Setup and maintenance of web servers (software)
Basic Troubleshooting of Perl scripts
Publication of content onto production servers
Maintenance of content hosted on production servers
Monitoring of services (uptime) for hardware and software platforms
Site statistics report published monthly and available on website
10.1 Introduction
Service Management will manage the hosting of dynamic (as opposed to static) web sites asked
for by the LoB within the scope of XYZ-Company International. Service is managed and
maintained by Production, Quality Assurance and Online Systems Admin.
10.2 Hardware
Redundant Load Balanced Dual CPU Compaq Proliant Application Servers
Redundant Hot Standby Dual CPU Compaq Proliant Database Servers
Redundant Cisco Firewalls
Redundant Physical connectivity – Appropriate cabling and routing hardware
Cisco Local Director Model
Redundant Load Balancer (Cisco)
10.3 Software
Microsoft Windows NT Technology
Microsoft IIS web servers
BEA WebLogic web/application servers
Starwave Barista application servers
Microsoft SQL Database servers
PC-Anywhere
10.4 Functionality
Setup and maintenance of servers / network (hardware)
Setup and maintenance of web servers (software)
Basic Troubleshooting of “Java Server Pages” (JSP) files and configuration files
Publication of content onto the production servers
Maintenance of content hosted on the production servers
Monitoring of services (uptime) for hardware and software platforms
11.2 Hardware
Redundant Load Balanced Dual CPU Compaq Proliant Application Servers
Redundant Hot Standby Dual CPU Compaq Proliant Database Servers
Redundant Cisco Firewalls
Redundant Physical connectivity – Appropriate cabling and routing hardware
Cisco Local Director Model
Redundant Load Balancer (Cisco)
11.3 Software
Microsoft Windows NT Technology
Microsoft IIS web servers
BEA WebLogic web/application servers
Starwave Barista application servers
Microsoft SQL Database servers
PC-Anywhere
11.4 Functionality
Setup and maintenance of servers / network (hardware)
Setup and maintenance of application servers (software)
Setup and maintenance of application database servers (software)
Registration & Promotion Entry Service
Registration Home Page
Promotion Setup
Promotion QA
Automatic Confirmation and Fulfillment email
Manual Fulfillment
Monitoring of services (uptime) for hardware and software platforms
Standard IUR Promotions Reports
Custom IUR Reports
12.2 Hardware
Redundant Load Balanced Dual CPU Compaq Proliant Application Servers
Redundant Hot Standby Dual CPU Compaq Proliant Database Servers
Redundant Cisco Firewalls
Redundant Physical connectivity – Appropriate cabling and routing hardware
Cisco Local Director Model
Redundant Load Balancer (Cisco)
12.3 Software
Microsoft Windows NT Technology
Microsoft IIS web servers
BEA WebLogic web/application servers
Starwave Barista application servers
Microsoft SQL Database servers
PC-Anywhere
12.4 Functionality
Setup and maintenance of servers / network (hardware)
Setup and maintenance of application servers (software)
Setup and maintenance of application database servers (software)
Provision of PSI test and live Service.
Supply and support of the PSI Software.
Monitoring of services (uptime) for hardware and software platforms
13.2 Hardware
Not applicable
13.3 Software
Not applicable
13.4 Functionality
Domain Registrations
DNS set-up, maintenance and monitoring
Redirect set-up, maintenance and monitoring
Sub-domain set-up maintenance and monitoring
Domain Renewals
Co-ordinate legal recovery (if required)
Set-up transfers to Service Management.
14.1 Introduction
Vanity Mails are email directions using a XYZ-Company domain in their body (xxx@XYZ-
Company.co.uk) and project to the visitor the image of a XYZ-Company official site that they are
sending or receiving messages. Vanity Mails can either be the final address or a redirect to a
non-XYZ-Company address. Service is managed and maintained by Production and Online
Systems Admin.
14.2 Hardware
Sun E250 servers running Solaris OS
14.3 Software
POP3
IMAP
SMTP Server
IntraStore Enterprise
14.4 Functionality
Appearance to user of a dedicated XYZ-Company mail account to which mail is sent to
and received from.
Includes the setting up a dedicated site e-mail address
Includes the search and registration of a domain name unique to the site or promotion
15.1 Introduction
The Service Management Mass Mail service allows LoB marketing managers to specify a list of
users for direct marketing purposes. Service is managed and maintained by Online Systems
Admin. There are two distinct versions of the service:
(a) IUR Based – where a XYZ-Company LoB generates email lists from IUR at the
registration screen.
(b) List Based – where a XYZ-Company LoB prepares its own email list from its own
sources or using IUR not at registration screen.
The service will be based on “Beacon” for List Based service and “IUR mass mail” (the MS
Access tool) for IUR Based service.
15.2 Hardware
Compaq ProLiant Servers running NT
15.3 Software
SQL
SMTP Server
IIS
Beacon
IUR
Barista
Outlook
15.4 Functionality
Creation of email lists through IUR
Quality Assurance and hosting of HTML
Sending of Mail on date requested to group specified.
Tracking of click-thru’s (Mass Mail must comply with technical guidelines), bounces,
number’s sent.
16.1 Introduction
QA offers the ability to build increased End User confidence into a site prior to code being pushed
Live to ensure that XYZ-Company is not compromised by any content on any XYZ-Company
hosted or branded site as well acting as sentinels to promote the building of quality into any
product at the earliest stage to reduce the impact and cost of firefighting of bad code and warden
the use of quality processes/procedures in the project lifecycle.
16.2 Hardware
N/A
16.3 Software
N/A
16.4 Functionality
Code should be checked by both developer & Account Manager prior to QA
QA perform UAT
Report all content bugs/performance issues to Account Manager
QA can process up to 400 web pages per man per day.
Benchmarking using:
Linkbot Developer
IE
Netscape (Above applies to standard content tracking)
17.1 Introduction
D-Cards are electronic postcards designed to add a viral marketing element to new and existing
sites. The International Dcard system comes complete with 6 cards and a themed player. The
player also includes (if desired) a referral URL and advertising area. The product is developed in
flash and has multi-format compatibility. The system can handle film clips, jpegs and vector-
based graphics. XYZ-Company International D-Cards is managed and maintained by Online
Systems Admin.
17.2 Hardware
N/A
17.3 Software
BEA Weblogic Web Application Server
Microsoft SQL Server database
SMTP server for emails
Dcards java application
Macromedia Flash 4/5
Adobe illustrator
Adobe Photoshop
17.4 Functionality
Set up, creative and maintenance of D-Card system per country for 1 year.
Hosting and maintenance on XYZ-Company servers for 1 year.
18.2 Hardware
3rd party globally distributed satellite site host servers.
18.3 Software
Internet browser (on-line maintenance tool)
18.4 Functionality
Web Intelligence and Analysis report
Competitive Analysis report
Key-term site builds
Site cross-linking effectiveness
Express submission to all top regional search engines (incl. directory listings i.e. yahoo
etc)
70% 1st page listing - 50% at No.1 position
Greater traffic revenue (10,000+ new users per month following 4-6 months)
24x7 on-line site maintenance tool
Foreign language pages if required (additional cost)
19.1 Introduction
HitBox is an outsourced service tool for gathering data directly from visitors' browsers. As well as
counting views, JavaScript records information on the user’s browser and, with the use of
cookies, tracks paths taken through the web site and frequency of visits. Site or campaign report
generation and statistical viewing is accessed via a username account.
19.2 Hardware
3rd Party HitBox Server
19.3 Software
Server-side HitBox application
Internet browser (statistical viewing)
19.4 Functionality
Monitor marketing campaign performances
Gathering of user behavior
Track customer site paths
Online real-time report generation
Flash site tracking
User account set-up and administration
Mass Mail
Setup and Send 99.99% n/a 10 2 n/a n/a n/a
Monitoring 100% n/a 7 7 n/a n/a n/a
International User Registration (IUR)
Service Availability 99.73% n/a n/a 2 1 4 8
Setup Promotion n/a n/a n/a n/a n/a n/a n/a
Servi Platform/ Service Service Scheduled Change Problem Response Time (hours)
ce Application Availabil Frequenc New Request (acknowledgement and resolution started)
Components ity y Service For (use SLA for P definitions)
Request Scheduled
(lead time – Service
working (lead time –
days) working
days)
Setup new Site or n/a n/a 25 2 n/a n/a n/a
County
Standard Reporting n/a weekly n/a 2 n/a n/a n/a
Custom Reporting n/a n/a 5 2 n/a n/a n/a
Local Replication n/a n/a 5 5 n/a n/a n/a
Personalization Services Interface (PSI)
Service Availability 99.73% n/a 20 2 1 4 8
21.0 Appendix 2: SLA Table of Service - Descriptions
The Table of Service is the outline detail of services as provided and is to be used in conjunction
with this Service Level Agreement. The table delineates the Services being offered and the Level
of Service that service receives. The table headings are described below:
Service
The Service name
Service Availability
The Service can be defined as being available if it can be accessed via the internet or network
and used correctly by at least one client institution, which is not involved in the provision of the
service. This implies the Customer, LoB or site user as the client institution not involved in
providing the service. Availability shall be calculated for each service each month.
All periods of inaccessibility that result from the effects of scheduled or planned downtime
(maintenance) shall be discounted when calculating the network availability.
All periods of inaccessibility that result from the effects local to the Customer (LoB), such
as site power failures, customer error or customer-selected application incompatibilities,
shall be discounted when calculating the network availability.
Service Frequency
Some service components are essentially reporting features or timetabled functions (i.e. weekly
statistics report or daily system backups). Their frequency is implied as ‘how often’.
* All requests are return acknowledged within 2 working days of receiving request.
* All requests are return acknowledged within 2 working days of receiving request.