11:11 Systems Service Schedule
The terms and conditions set out in this 11:11 Systems Service Schedule (this “Schedule”) shall apply to each Service Order executed by the Provider and the Customer (each, a “Order”), and shall be deemed to be incorporated, the necessary changes having been made, into each Order.-
Section 1: Definitions
In this Schedule: Any capitalized terms used but not defined in this Schedule or the remainder of the Agreement shall have the meanings set out in the relevant Order.- “11:11 Autopilot Managed Recovery for DRaaS” shall refer to a managed service offering provided by the Provider to the Customer for the purpose of managing the on-boarding, technical design, testing and operational support elements of an 11:11 Secure DRaaS for Zerto, 11:11 Secure DRaaS for Veeam, or 11:11 DRaaS for Cohesity service contract.
- “11:11 Cloud” shall refer to an environment that contains the Provider’s basic cloud infrastructure features without any level of encryption or security attributes integrated into the environment and its underlying storage and/or shared Cloud Resources. Features associated with 11:11 Cloud environment are only available to Customers that elect to have those services provided to them on their Order.
- "11:11 Cloud Console” or “Cloud Console” shall refer to the cloud-based management portal in which the Customer accesses and administers the Services.
- "11:11 Cloud Object Storage" shall mean the public Internet service delivered by the Provider that allows the Customer to store and manage data as objects, as opposed to other storage architectures like file systems and block storage. Features associated with 11:11 Cloud Object Storage environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Co-Managed Firewall” shall refer to the service that allows the Customer the ability to make configuration changes to supported firewall devices while the Provider provides monitoring, support, and visibility in accordance with the selected Basic and Advanced Managed Appliance service level.
- “11:11 DRaaS for Zerto” shall refer to an environment that contains the Provider’s basic cloud infrastructure features without any level of encryption or security attributes integrated into the environment and its underlying storage and/or shared Cloud Resources. Features associated with 11:11 DRaaS for Zerto environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 DRaaS for Zerto Cloud-to-Cloud” shall refer to a DRaaS environment where both the Primary Site and Recovery Site are in two (2) different Provider’s physical locations as specified in the Order. Features associated with 11:11 DRaaS for Zerto Cloud-to-Cloud environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Managed Migration” shall mean the Provider’s process and service that assists the Customer with the migration of Virtual Machines and/or Physical Servers from the Customer’s Primary Site into a Provider’s Virtual Data Center, and the connectivity setup and configuration that it entails.
- “11:11 Secure Cloud” shall refer to an environment that contains the Provider’s advanced security and encryption features and attributes integrated into the environment and its underlying storage and shared Cloud Resources. Features associated with 11:11 Secure Cloud environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Secure Cloud Backup for Veeam Cloud Connect” shall mean the public Internet service delivered by the Provider that allows the Customer to backup Machine’s virtualized data into Cloud Resources. Features associated with 11:11 Secure Cloud Backup environment are only available to Customers that elect to have those services provided to them on their Order.
- "11:11 Secure DRaaS for Veeam" shall refer to an environment where the Customer uses Veeam Cloud Connect software to replicate from the Primary Site to the Provider's Recovery Site and its underlying storage and shared Cloud Resources. Features associated with 11:11 Secure DRaaS for Veeam environment are only available to Customers that elect to have those services provided to them on the Order.
- “11:11 Secure DRaaS for Zerto” shall refer to an environment that contains the Provider’s advanced security and encryption features and attributes integrated into the environment and its underlying storage and shared Cloud Resources. Features associated with 11:11 Secure DRaaS for Zerto environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Secure Private Cloud” shall refer to an environment that contains the Provider’s advanced security and encryption features and attributes integrated into the environment and its underlying storage and dedicated Cloud Resources. Features associated with 11:11 Secure Cloud environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Secure Private DRaaS for Zerto” shall refer to an environment that contains the Provider’s advanced security and encryption features and attributes integrated into the environment and its underlying storage and dedicated Cloud Resources. Features associated with 11:11 Secure Private DRaaS for Zerto environment are only available to Customers that elect to have those services provided to them on their Order.
- “11:11 Support” shall refer to the Provider’s technical support department, which acts as the primary contact for all Customer’s requests for help and assistance once the initial deployment has been completed.
- “Accelerated Storage” shall mean encrypted storage resources provided on a blend of traditional shelves of disks and flash storage.
- "Acceptable Use Policy" or "AUP" shall mean the Provider's document that stipulates constraints and practices that the Customer must adhere to when utilizing any of the Provider's Services. The current AUP can be accessed at https://1111systems.com/legal/acceptable-use-policy/ provided, however, that the AUP may be modified from time to time at the Provider's sole discretion.
- “Account Management Application” is the primary resource for Customers to access and manage information including, but not limited to, account profile, contact management, contracts, service and maintenance status of services and regions, and support tickets.
- “Active Virtual Machine” shall mean a Virtual Machine that is turned on within the Virtual Data Center.
- “Advanced Storage” shall mean storage resources provided on traditional shelves of disks.
- “Appliance” shall mean a physical or virtual device or equipment designed to perform a specific IT task.
- “Archive Storage” shall mean storage resources provided on traditional shelves of disks.
- “Availability Zone” shall mean one or more AWS discrete Data Centers with redundant power, networking, and connectivity in an AWS region. Availability Zones are physically separated by a meaningful distance, many kilometers, from any other Availability Zone, although all are within 100 km (60 miles) of each other, and are designed to handle concurrent device failures by quickly detecting and repairing any lost redundancy, and they also regularly verify the integrity of your data using checksums.
- “Backup Groups” shall mean the groups of Virtual Machines defined in Advanced Backups. These groups define what Virtual Machines are backed up and how they are backed up by the applied Backup Policy.
- “Backup Policies” shall mean the policies that define the Advanced Backup schedule of how often and when to take a backup and the retention timeframe for that backup. The policies also define how often full backups should be taken and how often to retry in the event of backup failure.
- “Backup Testing” shall mean the operational mode in which the data of the Machines are validated leveraging Target Site restore points during a predetermined process. “Tested Backup” shall have a correlative meaning.
- "Bare Metal Device" shall mean a physical computer system without a base operating system (OS) or installed applications. It is a computer's hardware assembly, comprised of structure and components, that is installed with either the firmware or basic input/output system (BIOS) software utility or no software at all. The Provider service includes the colocation of this device, but no OS.
- "Broadcom White Label Program" shall refer to the licensing and resell framework established by Broadcom under the VMware Cloud Service provider (VCSP) program, enabling authorized partners to resell VMware Cloud Foundation licenses and related add-ons.
- “Brownfield” shall mean an IT environment or deployment where the design, installation, and configuration is an upgrade or addition to an existing infrastructure using legacy components.
- “Burst Resources” shall mean Cloud Resources that are not dedicated to the Customer but which, if available, the Customer may use to exceed its committed Reserved Resources. These are billed in arrears and are calculated by multiplying a usage over the Reserved Resources by the monthly or hourly burst rate as specified in the Order.
- “Carrier” shall mean an organization that provides services accessing and using the Internet or any other telecommunications service that operates on its proprietary network infrastructure.
- “CASB” shall mean Cloud Access Security Broker.
- “CDN” shall mean Content Delivery Network.
- “Change Management” shall mean making controlled and informed changes to the operation and functionality of an eligible service or Equipment provided by the Provider.
- “Cloud Resources” shall mean compute (CPU), memory (RAM), storage, IP address and network bandwidth that comprises a Virtual Data Center as described in the Order.
- “Cloud Storage” shall mean storage resources within the Target Site, provided on traditional shelves of disk, accessed from the Machines.
- “Colocation” shall mean the Provider's service related to placing and maintaining the Customer's Equipment within the same Data Center where the Provider hosts its Cloud Resources.
- “Colocation Area” shall mean the area within the Data Center in which the Colocation Rack Space is located.
- “Colocation Rack Space” shall mean the physical space within a rack or other location(s) within the Colocation Area of the Data Center designated by the Provider for the Customer to colocate the Equipment.
- “Colocation Specifications” shall have the meaning set out in the relevant Colocation Order or, if no such definition is set out in the Colocation Order, the Provider's standard specifications for colocation space in the Colocation Area.
- “Commencement Notification” shall mean an email communication from the Provider to the Customer indicating the formal hand-off of Cloud Resources and the commencement of billing under the Order.
- “Connectivity Services” shall mean, collectively, Dark Fiber, Lit Services, Managed Firewall, SD-WAN, and Managed Connectivity.
- “Cross Connects” shall mean physical cables that allow direct connections between two different termination locations within a Data Center.
- “Customer-Owned Telecommunications Circuit” shall mean a telecommunications circuit contracted by Customer with a third-party telecommunications provider.
- “Customer Premises Equipment” or “CPE” shall mean any Equipment owned and/or used by Customer, including Provider-Supplied Equipment, that is used to connect to the Services.
- “Customer-Provided Equipment” shall mean any equipment owned by the Customer and listed in the Hybrid Colocation Order as equipment that may be colocated in the Colocation Rack from time to time.
- “Dark Fiber” shall mean all connectivity circuits with dark optical fiber strands in a particular network configuration supplied by Provider to Customer pursuant to an Order.
- “Dark Fiber Specifications” shall mean those specifications set forth in section 3.33.5 below.
- “Data Center” or "Datacenter" shall mean the facility operated by the Provider designated as the Datacenter in the relevant Order.
- “Data Seeding” or “Seed Data” shall mean the process of exporting Virtual Machine data to removable media at the Primary Site and/or Source Site, shipping the removable media to Recovery Site and/or Target Site and importing Virtual Machine data into a Virtual Data Center at Recovery Site and/or Target Site.
- “DDoS” shall mean Distributed Denial of Service.
- "Dedicated Resources" shall mean Cloud Resources dedicated to a single tenant or Customer.
- “Demarcation Point” shall mean the point located in the Data Center at which the extension from the Carrier infrastructure ends and connects with the Provider’s on-premises wiring, where Provider hands off the Connectivity Services to Customer;
- “Deployment” shall mean the period beginning once the Provider has acknowledged receipt of the signed Order and ending when the Provider satisfies all deliverables within the initial scope.
- “Deployment Engineer” shall refer to an engineer, who is an employee of the Provider with technical knowledge and training of use and best practices of the Provider’s services, that is responsible for deploying the environment in the Provider’s infrastructure used by the Customer.
- “Disaster” shall mean the Customer’s inability to send or receive data at the Primary Site due to unavailable compute, storage, or network resources.
- “Disaster Recovery Runbook” shall mean a collection of Recovery Groups that are combined into a single list to simplify management of the DRaaS environment when testing failover, or in the case of performing a live failover of the environment.
- “DLP” shall mean Data Loss Prevention.
- “DNS” shall mean Domain Name Services.
- “DRaaS” shall mean Disaster Recovery as-a-Service.
- “DRaaS Testing” shall mean the operational mode in which the functions of the Virtual Machines in the Primary Site are validated on the Virtual Machines in the Recovery Site. Testing is a non-service impacting event and does not include modification of Primary Site resources including Virtual Machines and networking. “Tested” shall have a correlative meaning. Testing is a fully autonomous function and can be triggered by the Customer at any time.
- “Electricity Fee” shall mean the amount to be charged by the Provider to the Customer based upon the Customer's usage of electricity in the Colocation Area during the relevant period and the then-current standard prices charged by the Provider to its Customers for electricity, which shall be calculated on a breakered-amp-load basis, and which shall be subject to increase from time to time if the power utility or primary electricity vendor used by the Provider increases the price paid by the Provider for power provided to the Colocation Rack.
- “Emergency” shall mean an urgent, sudden, and serious event that requires immediate action to remedy the situation.
- "Equipment" shall mean physical computer, network and/or communications devices.
- “Failback” shall mean the return of operational mode of the Virtual Machines in the Recovery Site back to the Virtual Machines in the Primary Site after originally becoming unavailable through either failure or scheduled downtime.
- “Failover” shall mean the backup operational mode in which the functions of the Virtual Machines in the Primary Site are assumed by the Virtual Machines in the Recovery Site due to the Virtual Machines in the Primary Site becoming unavailable through either failure or scheduled downtime.
- “Greenfield” shall mean an IT environment where the design, installation, and configuration is totally new and requires development from a clean state.
- “GSS” shall mean Broadcom Global Support Services which provide additional support services for VMware license providers.
- “ICMP” shall mean Internet Control Message Protocol, more commonly known as ping.
- “Image-based Backup” shall mean a point-in-time copy of a defined collection of data.
- “Insider Protection” shall mean the optional feature for the 11:11 Cloud Backup for Veeam Cloud Connect service delivered by the Provider that provides an off-repository storage folder into which all deleted files will be retained for a short time allowing for the restoration of those files by the Provider based on the Customer’s request. The length of time these files are stored is set in the Order.
- “IOPS” shall mean Input/Output Operations Per Second and is a common performance measurement used to benchmark computer storage devices.
- “i-Tech” or “iTech” shall refer to the Provider’s i-Tech Services Schedule where services, fees, and rates are defined for when remote, on-site, and/or Telco carrier support is required that was not part of the original scope on an Order. It can be accessed at https://1111systems.com/i-tech-services-schedule
- “Letter of Authorization” or “LOA” is a document from the Customer or Carrier authorizing the Provider to act on their behalf.
- “Lit Services” shall mean the services provided by Provider to Customer to enable the transmission of
data using one of the following methods as indicated on an Order:
a. Domestic optical (lit) Wavelength and Ethernet Private Line (“EPL”) connectivity circuits—these services are a point-to-point, dedicated electrical or optical data transmission that provides a fixed capacity of bandwidth between two (2) points, specified by the Customer, for the transport of Customer’s digital communications traffic over a physical circuit;b. Ethernet Private LAN (“EPLAN”) connectivity circuit, Multi-Cloud Connect, Layer 3 VPN (L3VPN) — these services are dedicated electrical or optical data transmission that provides a fixed capacity of bandwidth between two (2) or more points, specified by the Customer, for transporting the Customer’s digital communications traffic over a physical circuit;c. Domestic Direct Internet Access — this connectivity circuit provide the Customer with connectivity to the Internet, including routing services based upon the Internet Protocol, and are typically comprised of a network Internet Port at a Provider provided POP, and a dedicated network connection between 11:11 Systems POP and the Customer location (these services do not include Internet Over Broadband or Internet Over Wireless);d. Internet Over Broadband (Broadband) — these connectivity circuits provide the Customer with connectivity to the Internet and include:i.Digital Subscriber Line (“DSL”),ii.Ethernet Over Copper (“EOC”),iii.Internet Over Broadband (“IOB”),iv.Internet Over Cable (“IOC”),v.Internet Over Fiber (“IOF”),vi.Internet Over Wireless (“IOW”),vii.Internet Over Fixed Wireless (“IOFW”), andviii.Internet Over Satellite (“IOS”);e. AWS Direct Connect (AWS DX) On-ramp — this connectivity is between a Provider POP and AWS Direct Connect on-ramp, offered in a 50 Mbps – 5 Gbps hosted connection, or a 1 Gbps or 10 Gbps dedicated direct connect connection.i. An AWS Direct Connect Dedicated On-ramp connection is a physical network port that allows customers to establish a dedicated and private network connection between the Customer’s on-premises networks and the AWS cloud, andii. An AWS Direct Connect Hosted On-ramp connection allows Customers to establish a network connection between their on-premises networks and the AWS cloud on a shared Provider port. Unlike a Direct Connect dedicated port, which requires Customers to manage the physical network port themselves, a Hosted Connection simplifies the process by allowing Customers to connect to AWS using connectivity provided and managed by the Provider; andf. IP Bandwidth – This connectivity service provides the Customer with connectivity to the internet via diverse upstream internet peering providers.g. Fabric Connect - This connectivity service provides the Customer with layer 2 or layer 3 connectivity between the source and destination locations specified in the Order.h. Fabric Multi-Service Connect – This connectivity service provides the Customer with layer 2 or layer 3 full mesh connectivity between all Multi-Service Connect source locations specified in the Order.i. Colo Multi-Service Connect – This connectivity service provides the Customer with a single-mode cross connect and network port on Provider’s infrastructure.
- “Local Monitoring Probe” shall mean an Appliance deployed within a specific Customer’s location, such as an on-premises facility or a remote site, whose primary purpose is to collect, analyze, and report data on the performance and health of the local network or systems.
- “LUR” shall mean License Usage Report, which is provided in conjunction with Broadcom’s Usage Meter.
- “Machine” shall mean the computing equipment on which the Customer is running the Veeam Cloud Connect software and the computing equipment used by the Customer to access the Cloud Resources (but excluding the Cloud Resources).
- “Managed Security Portal” shall mean the site that is accessed as part of the Continuous Risk Scanning offering providing the customer visibility into the vulnerabilities within their environment, which can be accessed at https://assess.grncld.com/
- "Microsoft 365" shall mean a Microsoft 365 end-user account that, because it is being backed up using the Provider's services, requires an 11:11 Secure Cloud Backup for Microsoft 365 license. A Microsoft 365 user account can use one or many applications such as Exchange Online, OneDrive for Business, SharePoint Online, and Microsoft Teams.
- “Microsoft SPLA” shall refer to the licensing provided under the Microsoft Service Provider Licensing agreement.
- “mTLS” shall mean mutual transport layer security.
- “Network Support” shall mean the Provider’s process and service that assists the Customer with the initial implementation and ongoing support of Customer’s virtual network appliances and their configurations.
- “NGFW” shall mean a next-generation firewall, which is a security appliance that uses context-aware features to process network traffic and applies rules to protect against modern cyber threats.
- “NOC” or “Network Operation Center” shall mean a centralized function within the Provider’s organization composed of people, processes, and technologies that continuously shall mean any Connectivity Service designated as having redundancy of route and facilities and power and card protection. In the event of an equipment failure or a fiber cut, the service will automatically be re-routed to a “protected” path. Customer hand-off protection is limited to Connectivity Services delivered over a four (4) fiber hand-off connection.
- “Object Storage Access Credentials” are comprised by a pair of text strings (Key and Secret) used in an 11:11 Cloud Object Storage environment that the Customer generates through the 11:11 Cloud Console.
- "Offsite Backup" shall mean an archive copy of computer data stored at another remote Data Center different to the one where the source of that data resides.
- “On-boarding Provisioning Form” shall mean a document used by the Provider for information gathering and collection of all Customer specific technical and infrastructure related details for the sole purpose of the Provider providing the on-boarding service, integration, and management services to the Customer as part of an 11:11 Secure DRaaS for Zerto or 11:11 Secure DRaaS for Veeam service contract.
- "Onsite Backup" shall mean an archive copy of computer data stored at the same Data Center location where the source of that data resides.
- "OSI Model" shall mean Open Systems Interconnection model.
- “Playbook” shall mean a set of configured instructions within the Managed Endpoint Detection and Response (EDR) service that outlines the automated steps taken following a specific alert condition.
- “Primary Site” shall mean the Customer’s physical location in which the Customer’s Virtual Machines function in normal, non-Failover scenarios in a DRaaS environment.
- “Product Compatibility Matrix” shall identify the requirements that the Customer's systems and software must meet in order for them to be compatible with the Provider's offerings. The Customer can access the Matrix by accessing our Success Center at https://success.1111systems.com/.
- “Provider-Supplied Equipment” shall mean any equipment or licenses that the Customer obtains from the Provider for the Customer’s exclusive use and control.
- “RBI” shall mean Remote Browser Isolation.
- "Recovery Group" shall mean one or more Virtual Machines grouped together for replication purposes.
- “Recovery Plan” shall mean the detailed steps involved in how a Customer’s Virtual Machines will be recovered into the Provider’s Recovery Site.
- “Recovery Point Objective” or “RPO” shall mean the maximum acceptable amount of data loss, measured in time, between the last point-in-time that IT services (applications and data) can be restored to during a Disaster.
- “Recovery Site” shall mean the Provider’s physical location as specified in the Order to which the Virtual Machines located in the Primary Site will be replicated.
- “Recovery Time Objective” or “RTO” shall mean the maximum desired length of time allowed between an unexpected failure or Disaster and the recovery of the IT services (applications and data).
- “Replica Seeding” or “Seed Replica” shall mean the process of exporting Virtual Machine data from an 11:11 Secure Cloud Backup Target Site repository and importing Virtual Machine data into a Virtual Data Center at Recovery Site and in the same Data Center location.
- “Reserved Resources” shall mean Cloud Resources that are dedicated to the Customer.
- “RMA” shall mean Return Merchandise Authorization, which is a form of approval issued to Customers who have requested to return or exchange an appliance after experiencing a failure and validated by the Provider.
- “SD-WAN” or “Software-Defined Wide Area Network” shall mean a virtual WAN architecture that allows communication between networks over the Internet using software-defined technology and encryption.
- “Shared Resources” shall mean a pool of Cloud Resources shared across multiple Customers in a multi-tenant environment.
- “Site Environmental Specifications” shall mean the requisite space, racks, power, security and other facilities and other environmental conditions necessary to support and operate the Provider Network and telemetry to support out of band management. Unless specified in the Order, Customer shall be responsible for providing the conditions set forth above.
- “SNMP” shall mean Simple Network Management Protocol.
- “SOC” or “Security Operation Center” shall mean a centralized function within the Provider’s organization composed of people, processes, and technologies that continuously monitor and improve the Customer’s security posture by detecting, analyzing, and responding to cybersecurity incidents.
- “Source Site” shall mean the Customer’s physical location from which the Customer’s Virtual Machines will be backed up in an 11:11 Secure Cloud Backup environment.
- “SSD Storage” shall mean storage resources provided on Solid State disks.
- “Statement of Work” or “SOW” shall mean a document defining the project specific activities, requirements, considerations, deliverables and timelines between the Customer and the Provider, in conjunction with the specifications of the relevant Order.
- “Success Center” shall refer to the digital site provided by the Provider that consists of a knowledge base that contains product documentation, user guides, and technical articles related to the Provider’s portfolio of services located at https://success.1111systems.com/.
- “Target Site” shall mean the Provider’s physical location as specified in the Order to which the Machines will be backed up in an 11:11 Secure Cloud Backup environment.
- "Tunnel” shall mean an encrypted tunnel between an origin server and Cloudflare’s nearest Data Center.
- “UM” or “Usage Meter” shall mean Broadcom’s Usage Meter, which is a virtual appliance provided by Broadcom used to monitor VMware software usage and report license usage back to Broadcom.
- “Unified Threat Management” or “UTM” is an information security term that refers to a single hardware or software installation that provides multiple security functions at a single point on the network.
- “Users Authorized to Declare Disasters” shall mean users defined on the Customer Contact form which have the Customer’s authorization to declare a Disaster. If Cloud Resources are available at the time-of-Disaster, the Customer pre-authorizes Users Authorized to Declare Disasters the option to expand its Reserved Resources up to the Disaster Resource Limit specified in the Order. These resources are billed on a monthly basis with a minimum of one-month commitment. The Customer’s Resource Burst Limit will not be modified. At the end-of-Disaster, the Customer has the option to revert to the original Reserved Resource quantity.
- “vApp” shall mean a collection of pre-configured Virtual Machines that combine applications with the operating systems that they require allowing them to work together in a stack as an application.
- “VCF" or "VMware Cloud Foundation" shall mean VMware Cloud Foundation software by Broadcom.
- “Virtual Data Center” shall mean self-contained infrastructure including, compute, memory, and storage that is pooled, aggregated, virtualized, and delivered as-a-service.
- “Virtual Machine” or '"VM" shall mean a guest operating system such as Windows or Linux that can run or be stored as an isolated entity on a host and is separated from the physical resources it uses such that the host environment is able to dynamically assign those resources among several Virtual Machines.
- “VMWaaS” shall mean VMware as a Service wherein the Provider manages the VMware layer on a Bare Metal cluster.
- “vSAN” shall mean Virtual SAN (Storage Area Network).
- “WAF” shall mean Web Application Firewall.
- “WARP” shall mean the Cloudflare WARP client.
- “Workload” shall mean a logical Virtual Machine or physical server instance used for the purposes of hosting one or more applications and / or data set instances.
- "Zerto Journal" or "Journal" shall mean the collection of replicated data and checkpoints defined as part of the Virtual Protection Group (VPG) configuration. The Journal lives in the Recovery Site and it determines the maximum amount of history, in hours or days, that can be saved and leveraged during a failover event.
- "Zone" shall mean a unique apex domain such as example.com.
-
Section 2: Universal Service Terms (Applicable to All Services)
- Service Commencement Date. For all the Provider’s Services, the Service Commencement Date of services shall be defined on the applicable Order.
- Provider's Obligations. The Provider is responsible for
the following in accordance with industry best practices:
- Providing 24x7x365 global technical support via our different contact methods located at https://1111systems.com/support/contact-support/ or via our Account Management Application. The technical ticket response SLOs are available at https://1111systems.com/legal/sla.
- Testing and placing into production any software updates on the Provider’s systems in relation to the third-party software on the Provider’s then-current Product Compatibility Matrix, which is updated from time to time to reflect new software updates that have been placed into production. The Provider shall not be liable to the Customer and the Customer can neither cancel nor withhold payment for an Order outside of the requirements set forth in the Master Service Agreement, Service Schedule, or Order if the Customer’s systems or software were not compatible with this Matrix prior to the commencement of an Order or if the Customer installs a software update before that update is reflected in the Provider’s then-current Product Compatibility Matrix. In addition, while the Provider may test third-party software updates before listing them on the Provider’s then-current Product Compatibility Matrix, those tests are solely designed to ensure that the third-party software updates will not have a negative effect on the Provider’s ability to provide agreed upon services to the Customer and the Provider presents those updates listed as being compatible “as is” with no warranties of any kind, express or implied, including, but not limited to, warranties for fitness of purpose in regard to the third-party software.
- Customer's Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Supplying the Provider with information reasonably required to fulfill its obligations;
- Promptly notifying the Provider if the Cloud Resources are compromised, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar malicious code;
- Reviewing the Provider’s then-current Product Compatibility Matrix before procuring the Provider's services and before installing any software updates in order to ensure that the Customer’s systems are compatible with the Provider’s system. The Provider shall not be liable to the Customer and the Customer can neither cancel nor withhold payment for an Order outside of the requirements set forth in the Master Service Agreement, Service Schedule, or Order if the Customer’s systems or software were not compatible with this Matrix prior to the commencement of an Order or if the Customer installs a software update before that update is reflected in the Provider’s then-current Product Compatibility Matrix. In addition, while the Provider may test third-party software updates before listing them on the Provider’s then-current Product Compatibility Matrix, those tests are solely designed to ensure that the third-party software updates will not have a negative effect on the Provider’s ability to provide agreed upon services to the Customer and the Provider presents those updates listed as being compatible “as is” with no warranties of any kind, express or implied, including, but not limited to, warranties for fitness of purpose in regard to the third-party software;
- Configure the appropriate organization access including the creation, modification, and deletion of end-user 11:11 Cloud Console account(s).
- If the Customer is providing operating system or application licenses:
- If used in conjunction with the Services, Customer is solely responsible for compliance with the applicable license terms. At any time during the term of an Order, Provider may request Customer to provide proof of software assurance for the licenses or subscriptions deployed on Provider’s hardware;
- Adhering to the relevant software vendor’s licensing agreements, as well as the Microsoft Licensing Policy stated at https://microsoft.com/licensing/spur, as applicable;
- Implicitly consenting to the transferring of limited Customer data (i.e. such as Customer contact information) by the Provider to third-party licensors providing licenses to the Customer for the purpose of verifying and monitoring compliance and usage with the terms associated with those licenses;
- Maintaining, updating, and keeping current license information (as interruption of services may result if such licenses are not maintained). This includes ensuring that the quantity and type of licenses do not exceed the Customer-provided licenses. If the Provider determines (in its sole discretion) that the Customer has exceeded the Customer-provided quantity of licenses, the Provider will (1) notify the Customer of such usage, (2) advise the Customer to upgrade its Order in order to reflect the additional license usage, and (3) invoice the Customer for the costs associated with the additional license usage during the corresponding period. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to unilaterally increase the number of licenses on the Customer Order in order to true up the licensed endpoints. The Customer agrees to pay any invoices or charges for any additional licenses or back charges allowed under this Section;
- Building Virtual Machine templates using Customer-provided operating system licenses;
- Not utilizing Microsoft operating system original equipment manufacturer (OEM) licenses as they are not allowed; and
- Adhering to the Provider’s then-current Acceptable Use Policy as defined in the Definitions Section 1 at all times.
- If the Customer is consuming Provider-supplied licenses:
- Such software is subject to the terms of a separate license from the applicable Third-Party software vendor. Customer will comply with all such applicable license agreements as well as the Microsoft Licensing Policy stated at https://microsoft.com/licensing/spur, as applicable;
- Implicitly consenting to the transferring of limited Customer data (i.e. such as Customer contact information) by the Provider to third-party licensors providing licenses to the Customer for the purpose of verifying and monitoring compliance and usage with the terms associated with those licenses, and
- Maintaining, updating and keeping current license information (as interruption of services may result if such licenses are not maintained). This includes ensuring that the quantity and type of licenses do not exceed the contracted amount as described in the Order. If the Provider determines (in its sole discretion) that the Customer has exceeded the contracted quantity of licenses, the Provider will (1) notify the Customer of such usage, (2) advise the Customer to upgrade its Order in order to reflect the additional license usage, and (3) invoice the Customer for the costs associated with the additional license usage during the corresponding period. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to unilaterally increase the number of licenses on the Customer Order in order to true up the licensed endpoints. The Customer agrees to pay any invoices or charges for any additional licenses or back charges allowed under this Section; and
- If both 2.3.5 and 2.3.6 above, if Provider is audited by the Third-Party vendor or owner of such software, then in addition to Provider’s rights under the Agreement, Provider will promptly notify Customer and Customer agrees to participate in such audit, at its own expense, and to provide all reasonably requested information to Provider in a complete and timely manner. If Customer does not comply with the foregoing, without limited any other remedy available to Provider, Provider will have the right to terminate the applicable the Services and/or revoke Customer’s license(s) immediately upon written notice to Customer.
- Resource additions via Console. The Customer acknowledges and agrees that any additions, modifications, or adjustments to the Services or resources made by or on behalf of the Customer through the Console, whether or not such actions result in a formal contract amendment, shall be deemed authorized by the Customer. The Customer shall be fully responsible for all associated fees, obligations, and usage relating to such actions. All resource additions or changes made via the Console shall be governed by, and subject to, the same terms and conditions as set forth in the original Order, including pricing, billing periods, and usage restrictions, unless otherwise expressly agreed by the parties in writing.
- Customer Data.
- By purchasing the Provider’s Services, the Customer acknowledges that the Provider could potentially be exposed to Customer data which shall not be utilized by the Provider for any purpose other than the purpose of carrying out the Provider’s Obligations specified under Sections 2 and 3 of this Service Schedule. By purchasing Provider Services, the Customer expressly acknowledges that it understands and accepts this possibility and the Customer further agrees to not hold the Provider liable in the event that such an exposure occurs.
- After the signing of an Order, the Customer and the Provider may mutually agree to move or redirect the Customer’s data from the Data Center identified on an Order to a different Data Center located in the same country. In the event that the Customer and the Provider come to such an agreement, the Customer shall not be required to sign a replacement Order in order to effect that change and the Provider shall not be in breach of the Agreement or any Order if it moves or redirects the Customer’s data in accordance with that agreement.
- Service Level Agreement. Infrastructure and Service Availability, Service Performance, and Response times are available on the Service Level Agreement accessible at https://www.1111systems.com/legal/sla
- Disabling Cloud Resources. If the Cloud Resources get infected, hacked, or are compromised in any way, or if it is determined by the Provider that there is a potential threat to the Provider's network or any of the Provider's other customers, the Provider will make commercial best efforts to notify the Customer and may in its sole discretion disable the Cloud Resources until the Customer can take the appropriate actions to resolve the issue or contact the Provider to resolve the issue. The Provider may disable the Cloud Resources at any time if the Provider reasonably believes that the Customer has violated the Provider's then-current Acceptable Use Policy.
- Beta Service Participation. This section describes the terms and conditions under which
the Customer may access certain services or features available by the Provider that are not considered
Generally Available. Services or features labeled "beta" (each, a "Beta Service"), or access and use of
the Provider's Services available in Data Centers that are also labeled as "Beta Location".
- Customer may access the applicable Beta Service used in a generally available Data Center, or in a Beta Location during the term specified by the Provider;
- Customer shall not grant access to any Beta Service by any third-party other than the Customer's employees and contractors that have executed written non-disclosure agreements with the Provider;
- Customer shall not advertise or publicly disclose any of the features, services or performance of the Beta Services without the written approval from the Provider;
- The Customer shall utilize the applicable Beta Service used in a generally available Data Center, or in a Beta Location only for internal evaluation purposes or to provide feedback to the Provider;
- The Customer shall comply with the Provider's then-current Acceptable Use Policy when accessing and using the Beta Service or the Provider's Services in a Beta Location;
- The Provider may suspend or terminate Customer's access to or use of Beta Service or the Provider's Services available in Beta Locations;
- The Customer shall provide reasonably-requested information related to access, use, testing, or evaluation results of the Beta Services to the Provider;
- The Customer agrees that the Provider does not guarantee any Service Level, performance or stability of the Beta Service or any of the Provider's Services in Beta Locations;
- Access or use of the applicable Beta Services or the Provider's Services in the Beta Location will automatically terminate upon the release of a generally available version;
- The Customer agrees that after termination of
- The applicable Beta Service, or
- Access to a Provider's Service in a Beta Location,
- The Customer agrees that the Provider does not guarantee that any Beta Service or the Provider's Services in any Beta Location will ever be made generally available, or that the generally available version will be the same or similar as the version made available by the Provider during the term of the Beta Service or Beta Location, as applicable; and
- THE PROVIDER EXCLUDES ALL WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, WITH RESPECT TO ANY SERVICE PROVIDED AS PART OF THE BETA SERVICE OR BETA LOCATION, AS APPLICABLE, INCLUDING WARRANTIES FOR MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, OR SATISFACTORY QUALITY OR WHETHER AT COMMON LAW OR CONTRACT OR TORT OR BY STATUTE, OR OTHERWISE. THE BETA SERVICES AND THE PROVIDER'S SERVICES IN ANY BETA LOCATION ARE OFFERED ON AN AS-IS, WHERE IS BASIS, WITH ALL FAULTS, AND ARE NOT SUBJECT TO ANY OF THE WARRANTIES SET OUT IN THE AGREEMENT.
- Inbound and Outbound Shipping Policy to/from any of the Provider's Data Center. The
terms and conditions of this Section 2.8 shall be applicable if the Customer-Provided Equipment needs to
be shipped from the Customer to the Provider or from the Provider to the Customer.
- Responsibility and Liability. It is the Customer's sole responsibility to arrange the packaging and shipping of the Customer-Provided Equipment, as the Provider does not provide those services. Because the Provider does not provide those services, the Provider accepts no liability or responsibility in regard to the Customer-Provided Equipment being damaged or mishandled in the packaging and shipping process. Any Customer-Provided Equipment or property not removed within thirty (30) days after the expiration or termination of service agreement(s) will be deemed abandoned and become the property of the Provider. The Customer will be liable for all costs incurred by the Provider as a direct result of removal and disposal of any abandoned Customer-Provided Equipment.
- Usage of Carriers. Should the Customer utilize a Carrier for this service, the Customer shall coordinate with that Carrier directly in order to address the variables that arise during shipping, such as shipping internationally or any applicable tax or tariff related requirements; and
- Provider's Shipping Process. The Customer is required to contact the Provider's project manager for specific details on the Provider's Inbound and Outbound Shipping Process. The Customer shall be charged the applicable Remote Hands and/or i-Tech fees for the Provider's assistance.
- Statement of Work (SOW). The terms and conditions of this Section 2.9 are applicable to
all Statement of Work documents that shall be required prior to the Deployment of a Provider’s specific
Service.
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Providing the Customer with a team to ensure the successful completion of the project. This team will include a project manager and a qualified deployment engineer to perform the services purchased; the Provider’s standard support will be available upon completion of the project;
- Ensuring that resources are available to complete the tasks and hold meetings per the project timeline;
- Providing all deliverables described in the SOW;
- Providing written communication and documents through the project tickets;
- Adhering to the project schedule and milestone projections. The Provider will notify the Customer as soon as possible if a need to reschedule should arise; and
- Providing a method of feedback for each project.
- Customer’s Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Designating one Technical Contact as the primary contact who will be responsible for the project, acting as the Customer’s project manager;
- Reviewing all the documentation the Provider shares with the Customer and asking for clarification when needed;
- If required, ensuring that there is enough bandwidth at the Primary Site to enable initial replication of data and successive incremental changes of data to the Recovery Site;
- Reviewing the Provider’s online product documentation and user guides located on the Provider’s Success Center;
- Providing ample time for the Customer’s project manager to maintain communication with the Provider’s project manager to complete the project requirements;
- When possible, providing at least one (1) business day written notice to reschedule any meeting. The Provider understands that emergency circumstances come up as is the nature of the IT services business and that, as a result, one day advance notice is not always possible; and
- Missed meetings are defined as being absent from a scheduled meeting by 15 minutes or more after the start time without notifying the Provider in writing in advance. If three (3) meetings are missed, then the project may be placed “On Hold” at the Provider’s sole discretion, and a project placed on “On Hold” status will be rescheduled to the Provider’s next availability. There is no guarantee that a project rescheduled due to “On Hold” status will be assigned to the same Provider’s project manager.
- Risks. The SOW and Order were designed and built according to specific information
identified during the discovery phase. If that information is incorrect or has changed, the
timeline and cost of this project could change.
- Compatibility. The Provider publishes the Product Compatibility Matrix which
details the current requirements for a Customer’s system and its compatibility with the
Provider’s system as specified under Section 2.3.3 of this Service Schedule. For DRaaS
and/or Migration Services, the Provider makes every effort to ensure that the Customer’s
Primary Site or Source Site meets the requirements during the pre-sales process, but in
the event something in the Customer’s environment is not compatible with the Provider’s
solution, the Provider shall make every reasonable effort to provide assistance to
accommodate the Customer. The most common incompatibilities are:
- Customer is running VMs with a VM hardware version which is not supported by the Provider,
- Customer is running a version of the replication software that the Provider does not support,
- Customer is using Guest Operating Systems that the replication software does not support;
- Storage. Storage requirements can change quickly. During the kick-off call, the Provider’s project manager will confirm the amount of storage you need and the amount of storage you purchased. If more storage is needed, the Provider’s project manager will work with the Provider’s sales representative to increase storage;
- Bandwidth. If required, the amount of bandwidth the Customer allocates for replicating the data directly correlates with how long replication will take. The Provider recommends providing as much bandwidth as possible during and after the Customer’s office hours. This will ensure the Customer’s data is replicated as quickly as possible without affecting the Customer’s day-to-day operations;
- Shared Disks. For DRaaS and/or Migration Services, the Customer understands that any shared disks used across multiple VM’s need to be converted to a single VMDK and used from a single VM. Clustered servers or shared disks are not supported within this SOW Section and would require alternate planning. This solution only supports SCSI based disks. CIFS, IDE, or any other disk types are not supported; and
- Active Directory replication. For DRaaS, the Customer understands that in some cases a live Active Directory server is needed for replication and should be connected to the Customer’s internal network for quicker and more seamless recovery of the solution.
- Compatibility. The Provider publishes the Product Compatibility Matrix which
details the current requirements for a Customer’s system and its compatibility with the
Provider’s system as specified under Section 2.3.3 of this Service Schedule. For DRaaS
and/or Migration Services, the Provider makes every effort to ensure that the Customer’s
Primary Site or Source Site meets the requirements during the pre-sales process, but in
the event something in the Customer’s environment is not compatible with the Provider’s
solution, the Provider shall make every reasonable effort to provide assistance to
accommodate the Customer. The most common incompatibilities are:
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
-
Section 3: Service-Specific Terms
- 11:11 Cloud. The terms and conditions of this Section
3.1 are applicable to each Order that includes 11:11 Cloud services.
- Resources.
- Storage;
- Public. These Cloud Resources are available as Shared Resources with Advanced and/or SSD Storage types as specified in the Order,
- Dedicated. These Cloud Resources are available as Dedicated Resources with
Accelerated and/or SSD Storage types as specified in the Order with varying
parameters:
- Capacity. Dedicated Storage is sold in preconfigured sizes, each size providing different usable capacity as specified in the Order, which is determined by the maximum recommended usable capacity for the underlying storage component that accounts for the average deduplication and compression ratios.
- Performance. Performance for each preconfigured size is specified in the Order.
- Interoperability. Dedicated Storage resources are only supported under Private Virtual Data Centers, which should only be comprised of resources with similar capacity and performance. Mixing Public and Dedicated storage under the same Private Virtual Data Center is not supported.
- CPU & RAM;
- Public. These Cloud Resources are available as Shared Resources as specified in the Order,
- Private. These Cloud Resources are available as Dedicated Resources as specified in the Order. The Provider is responsible for architecting and deploying CPU & RAM in a high availability configuration;
- Bandwidth (Public or Private). Bandwidth is available as a Shared Resource as specified in the Order. On Orders where network bandwidth is not specified, it is included, abiding by the Excessive Use Section on the Acceptable Use Policy;
- Business Models (Public or Private). Cloud Resources are available in either Reserved, Burst, or Reserved plus Burst models as specified in the Order; and
- Overhead (Private only). The Customer acknowledges that all applications and hypervisors require some amount of overhead resource capacity in order to run optimally. The Customer agrees that the Dedicated Resources on the Order will be used for the overhead capacity of the Customer’s applications/hypervisor and that it is the sole responsibility of the Customer to ensure sufficient Cloud Resources exist.
- Storage;
- Provider's Obligations. The Provider is
responsible for the following in accordance with industry best practices:
- Onboarding the Customer into the Provider's Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Provide documentation, project management, and guiding the Customer through an initial set up;
- Provide ongoing support and education on the service at the Customer's request;
- Creating Virtual Data Center(s) consisting of compute, memory, storage infrastructure, and network bandwidth per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following the Provider’s guidelines for managing these environments;
- Providing the Customer with the URL and authentication credentials to access the Customer’s Cloud Resources;
- Assigning external and internal IP addresses for the virtual router per the Customer-provided requirements; and
- Providing VM templates with Microsoft Windows Data Center Licensing.
- Customer's Obligations. The Customer is
responsible for the following in accordance with industry best practices:
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- If the Customer chooses to Seed Data, then the Customer must follow the Provider’s then-current Data Seeding Guidelines;
- Maintaining operating systems and applications installed on the Customer's Virtual Machines or in the Customer's Virtual Data Center, including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Fixing any problems resulting from upgrades to the Virtual Machines operating system;
- Providing Virtual Machine and application log monitoring;
- Providing support for operating systems and applications installed on the Customer-Managed Virtual Machines; and
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation.
- Encryption.
- VM Encryption.
- The Provider offers encryption on a per VM or per volume basis, and is available to the Customer if purchased on the Order,
- The Customer agrees and understands that when running VM Encryption some features in the 11:11 Cloud Console that require access to the Customer's VMs may not function or provide information, since the Customer's VM will be encrypted, and
- VM Encryption encrypts data using AES-128/256 algorithms and allows the Customer to manage the encryption keys. The Customer understands that the Provider has no access to encryption keys.
- VM Encryption.
- Security Features.
- The 11:11 Cloud Console performs the following function:
- Vulnerability Scanning. Assesses systems, networks and applications for weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack. The weekly predefined scan generates a report which is added to the historical data.
- The 11:11 Cloud Console performs the following function:
- Resources.
- 11:11 Secure Cloud. The terms and
conditions of this
Section 3.2 are applicable to each Order that includes 11:11 Secure Cloud services.
- Resources.
- Storage;
- Public. These Cloud Resources are available as Shared Resources with Accelerated and/or SSD Storage types as specified in the Order; and
- Dedicated. These Cloud Resources are available as Dedicated Resources with
Accelerated and/or SSD Storage types as specified in the Order with varying
parameters:
- Capacity. Dedicated Storage is sold in preconfigured sizes, each size providing different usable capacity as specified in the Order, which is determined by the maximum recommended usable capacity for the underlying storage component that accounts for the average deduplication and compression ratios.
- Performance. Performance for each preconfigured size is specified in the Order and it’s defined based on the underlying storage component’s total IOPS based on 50/50 Read/Write and using 4K random block size.
- Interoperability. Dedicated Storage resources are only supported under Private Virtual Data Centers, which should only be comprised of resources with similar capacity and performance. Mixing Public and Dedicated storage under the same Private Virtual Data Center is not supported.
- CPU & RAM;
- Public. These Cloud Resources are available as Shared Resources as specified in the Order; and
- Private. These Cloud Resources are available as Dedicated Resources as specified in the Order. The Provider is responsible for architecting and deploying CPU & RAM in a high availability configuration;
- Bandwidth (Public or Private). Bandwidth is available as a Shared Resource as specified in the Order. On Orders where network bandwidth is not specified, it is included, abiding by the Excessive Use Section on the Acceptable Use Policy;
- Business Models (Public or Private). Cloud Resources are available in either Reserved Resources, Burst, or Reserved Resources plus Burst models as specified in the Order; and
- Overhead (Private only). The Customer acknowledges that all applications and hypervisors require some amount of overhead resource capacity in order to run optimally. The Customer agrees that the Dedicated Resources on the Order will be used for the overhead capacity of the Customer’s applications/hypervisor and that it is the sole responsibility of the Customer to ensure sufficient Cloud Resources exist.
- Storage;
- Provider's Obligations. The Provider is
responsible for the following in accordance with industry best practices:
- Onboarding the Customer into the Provider's Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Provide documentation, project management, and guiding the Customer through an initial set up;
- Provide ongoing support and education on the service at the Customer's request;
- Creating Virtual Data Center(s) consisting of compute, memory, storage infrastructure, and network bandwidth per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following the Provider’s guidelines for managing these environments;
- Providing the Customer with the URL and authentication credentials to access the Customer’s Cloud Resources;
- Assigning external and internal IP addresses for the virtual router per the Customer-provided requirements; and
- Providing VM templates with Microsoft Windows Data Center Licensing.
- Customer's Obligations. The Customer is
responsible for the following in accordance with industry best practices:
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- If the Customer chooses to Seed Data, then the Customer must follow the Provider’s then-current Data Seeding Guidelines;
- Maintaining operating systems and applications installed on the Customer's Virtual Machines or in the Customer's Virtual Data Center, including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Fixing any problems resulting from upgrades to the Virtual Machines operating system;
- Providing Virtual Machine and application log monitoring;
- Providing support for operating systems and applications installed on the Customer-Managed Virtual Machines; and
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation.
- Encryption.
- Storage Encryption. Storage is encrypted at rest with AES-256 in XTS cipher mode with FIPS 140-2 approved algorithms;
- Security Features.
- The Provider offers internal and external vulnerability scanning and reporting on the Customer's public Internet facing IPv4 address blocks and presents the information in the 11:11 Cloud Console;
- The 11:11 Cloud Console performs the following functions, if enabled, and displays them
in reports. In order to enable some features, a software agent may be required to be
loaded on the Virtual Machine:
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and
outgoing traffic for protocol deviations, policy violations, or content that
signals an attack. There are 2 types of scanning available:
- Weekly predefined scan and report, and
- On-demand scan that generates new reports ad-hoc.
- Malware Detection. Detects malware, viruses, spyware, trojans, and other malware,
- Firewall. Bidirectional host-based stateful firewall that audits all traffic incoming and outgoing from the VM,
- Configuration Auditing. Checks that IT assets are compliant with the Provider’s policies and standards,
- Compliance Reports. Provides logs and data necessary to fulfill audit requirements,
- Web Application Scanning. Discovers web server and services weaknesses and OWASP vulnerabilities, and
- Integrity Monitoring. Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time; and
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and
outgoing traffic for protocol deviations, policy violations, or content that
signals an attack. There are 2 types of scanning available:
- The information contained within the reports are intended solely to identify threats, vulnerabilities, and statuses of the Cloud environment components, and is provided “as is” without warranty of any kind, express or implied, including but not limited to warranties for fitness of purpose. The Provider does not warrant the completeness of accuracy of the report, nor does it make any recommendations based on the findings noted herein.
- Resources.
- Standard Backups. The terms and
conditions of this
Section 3.3, are applicable to each Order that includes both the Provider's Standard Backups and at
least one of the Provider's services that are described in any of the following Sections: Section 3.1
(11:11 Cloud), Section 3.2 (11:11 Secure Cloud), 11:11 Secure Private Cloud, Section 3.6 (11:11 DRaaS
for Zerto Cloud-to-Cloud), Section 3.10 (11:11 DRaaS for Zerto), and Section 3.11 (11:11 Secure DRaaS
for Zerto) of this Schedule.
- Resources.
- Storage. The amount of storage available for backups as specified by the Order;
- Licensing. All required licensing is included in the service on the Target Site;
- Business Models. Storage is available in a Reserved plus Burst model;
- Provider’s Obligations. The Provider is
responsible for the following in accordance with industry best practices:
- Providing the pool of storage as specified by the Order;
- Creating initial backup jobs with the number and frequency of the backup restore points on the target location as specified by the Order;
- Provide ongoing support and education on the Service at the Customer's request;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following Provider's guidelines for managing these environments;
- Providing storage pool modification options to the Order as required by the Customer, which is directly linked to the amount of production storage;
- In case of Provider-assisted restoration, assisting the Customer with initiating the restore at-time-of-Disaster; and
- In the event of Disaster and restoration from the Target Site, the Provider can, if needed, assisting the Customer with restoration from Disasters to the Customer's Source Site for additional i-Tech fees.
- Customer’s Obligations. The Customer is
responsible for the following in accordance with industry best practices:
- Providing the Provider with information reasonably request to fulfill its obligations, including without limitation backup requirement details;
- At the Customer’s discretion, restoring backups either through the self-service 11:11 Cloud Console or by requesting support from the Provider in restoring backups;
- Performing agent-based application aware backups and restores, as the Provider does not guarantee the recoverability of individual applications running on the Virtual Machines, such as databases or email messaging systems. The Customer is also responsible for performing granular recovery of individual items from agent-based application aware backups;
- Promptly notifying the Provider if the Cloud Resources are hacked, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar code;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation, loss of backup data, or errors caused by over allocation, this includes the storage necessary for processing the snapshot-based backups, which could result in production storage Burst charges; and
- In order for the Customer to restore Virtual Machine data, the Customer must have sufficient storage available. If the Customer does not have sufficient storage available, the Customer may have to purchase more storage to make the restore possible.
- Risks.
- There may be times where the Provider’s service is unable to perform daily backups. Reasons for a backup job failure include, but are not limited to, situations where a job is unable to start during retry windows, services are temporarily unavailable, conflicts occur between resources, etc. Where such failure occurs, the Provider will use reasonable efforts to attempt to remedy any potential backup job failures, and the Customer shall hold the Provider harmless in the event that a backup job did not occur successfully.
- Resources.
- Advanced Backups. The terms and conditions of this Section 3.4, are
applicable to each
Order that includes both the Provider's Advanced Backups and at least one of the Provider's services
that are described in following Sections: Section 3.1 (11:11 Cloud), Section 3.2 (11:11 Secure Cloud),
Section 3.6 (11:11 DRaaS for Zerto Cloud-to-Cloud), Section 3.8 (11:11 DRaaS for Veeam), Section 3.9
(11:11 Secure DRaaS for Veeam), Section 3.10 (11:11 DRaaS for Zerto), Section 3.11 (11:11 Secure DRaaS
for Zerto), and Section 3.45 (11:11 DRaaS for Cohesity) of this Schedule.
- Resources
- Backup Policies. The policies that define the Advanced Backup schedule of how frequently and when to take a backup and also the retention timeframe for that backup. The policies also define how often full backups should be taken and how often to retry in the event of backup failure;
- Backup Groups. Groups define what Virtual Machines and backup agents are backed up and assigns defined Backup Policy to those virtual machines and backup agents;
- Licensing. All required licensing is included in the service on the Target Site; and
- Business Models. Storage is available in a Reserved plus Burst model.
- Provider's Obligations. The Provider is responsible for the following in
accordance with industry best practices:
- Providing the pool of Storage as specified by the Order;
- Providing documentation and guide the Customer through an initial setup;
- Providing ongoing support and education on the Service at the Customer's request;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following Provider's guidelines for managing these environments;
- Providing storage pool modification options to the Order as required by the Customer;
- In case of Provider-assisted restoration, assisting the Customer with initiating the restore at-time-of-Disaster; and
- In the event of Disaster and restoration from the Target Site, the Provider can, if needed, assist the Customer with restoration from Disasters to the Customer's Source Site for additional i-Tech fees.
- Customer's Obligations. The Customer is responsible for the following in
accordance with industry best practices:
- Providing the Provider with information reasonably request to fulfill its obligations, including without limitation backup requirement details;
- Creating and Maintaining the Backup Policies and Backup Groups through the self-service 11:11 Cloud Console. The Customer is responsible to ensure that their Virtual Machines are in the appropriate Backup Groups and have the appropriate Backup Policies applied to meet the Customer's desired RPO and retention times;
- Performing agent-based application aware backups and restores, as the Provider does not guarantee the recoverability of individual applications running on the Virtual Machines, such as databases or email messaging systems. The Customer is also responsible for performing granular recovery of individual items from agent-based application aware backups;
- At the Customer’s discretion, restoring backups either through the self-service 11:11 Cloud Console or by requesting support from the Provider in restoring backups;
- Promptly notifying the Provider if the Cloud Resources are hacked, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar code;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation, loss of backup data, or errors caused by over allocation, this includes the storage necessary for processing the snapshot-based backups, which could result in production storage Burst charges; and
- In order for the Customer to restore Virtual Machine data, the Customer must have sufficient storage available. If the Customer does not have sufficient storage available, the Customer may have to purchase more storage to make the restore possible.
- Risks.
- Customer acknowledges that Provider is not responsible for monitoring backup job performance and status. Customer is fully responsible for the monitoring of job performance, SLAs, Backup Policies and Backup Groups. Customer may engage Provider in assistance in monitoring such items for additional i-Tech fees; and
- There may be times where the Providers service is unable to perform daily backups. Reasons for a backup job failure include, but are not limited to, situations where a job is unable to start during retry windows, services are temporarily unavailable, conflicts occur between resources, etc. Where such failure occurs, the Provider will use reasonable efforts to attempt to remedy any potential backup job failures, and Customer shall hold Provider harmless in the event that a backup job did not occur successfully.
- Resources
- 11:11 Managed Migration. The terms and
conditions of this Section 3.5 are applicable to each Order that includes the Provider’s Managed
Migration in combination with either 11:11 Cloud or 11:11 Secure Cloud.
- Assets & Deliverables.
- Connectivity Design Documentation. Technical documents and/or diagrams providing engineering level information and configuration details for the purpose of interconnecting the Customer Primary Site(s) to the designated Provider Site(s) delivering the service capabilities to the Customer;
- On-boarding Project Plan A documented overview of all tasks associated with the Provider’s on-boarding process for interconnectivity and delivery of the Managed Migration from the Customer Primary Site(s) Workloads within scope of the mutually agreed upon service contract. The purpose of this document is to track ownership, progress and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider; and
- Migration Workbook. A detailed discovery document used to collect all of the Customer specific technical and infrastructure related information for the sole purpose of the Provider providing the Managed Migration as part of the service contract.
- Migration Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager each who will serve as the primary contact point; and
- Migration Project Management Engagement. The Provider’s project manager and the Customer’s project manager shall meet as required for the duration of the migration process for the purposes of facilitating a successful relationship and overseeing the implementation of all Cloud Resources and Managed Migration outlined in the Order and the Migration Provisioning Form, including but not limited to, (a) tracking the progress of the migration and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the Managed Migration, (c) reviewing weekly status reports in order to review the Provider’s performance in execution of the project for delivery of all Managed Migration Services, (d) coordinating and planning for any new equipment or software acquisitions specific to supporting the completion of the Managed Migration.
- Provider’s Obligations. The Provider is responsible for the following in
accordance with industry best-practices:
- Providing enhanced onboarding project management deliverables, to include:
- Status call between the Provider’s migration personnel and the applicable Customer’s contacts, and
- Status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing and managing supporting service documentation to include:
- Inventory and workload specifications (e.g. compute, storage, networking) of all Workloads within scope of the Order, and
- L2/L3 network design for compatibility and integration between the Customer’s Primary Site(s) and the Provider’s networking services and design guidelines;
- If applicable, providing installation, configuration and management of all services
components required for the Managed Migration, to include:
- Replication software installation, guiding the Customer through setup and configuration both in the Customer on-premises and the Provider’s cloud data center environments (where applicable),
- Setup and configuration of VPN connections (where applicable), and
- Setup and configuration of all Provider’s side networking components support dedicated circuits for WAN connectivity (where applicable);
- Providing full setup and configuration for replication of the Workloads within scope and applicable to the Order and the Migration Workbook.
- Providing enhanced onboarding project management deliverables, to include:
- Customer’s Obligations. The Customer is responsible for the following in
accordance with the Provider’s delivery of the 11:11 Managed Migration and industry
best-practices:
- Ensure all Customer-owned software, applications, devices, systems, processes, and services that maintain the Customer’s data to be migrated as part of the Order are covered as specified under Section 2.3.5 of this Service Schedule for the purposes of fulfilling the Order;
- Where applicable, the Customer shall maintain all firmware or software updates to all Customer-owned hardware, software, applications, devices, and systems in use with or protected by services provided by the Provider;
- Where applicable: contact all software, application, device, system, service, and service providers covered under the Order and add appropriate Provider’s personnel as approved contacts for the purposes of fulfilling this Service Schedule;
- Complete the Migration Provisioning Form provided by the Provider;
- Provide all current and existing documentation of the Customer’s Primary Site(s) to include; environment “as-built” documentation, application contact information, application dependencies, current backup strategy, and disaster recovery plans if applicable;
- Provide the Provider’s personnel with Customer’s asset discovery and documentation where applicable;
- Where applicable; provide all current process documentation in support of the Managed Migration outlined in the Order and provide all assistance necessary to modify existing or implement new processes to streamline the delivery of services;
- Where applicable, the Customer shall maintain all software and other devices or items provided to the Customer by the Provider located within the Customer’s Primary Site(s) in direct support of the delivery of the Managed Migration Service outlined in the Order (the “Equipment’) in good working order and in accordance with applicable manufacturers’ specifications. The Customer shall notify the Provider immediately upon determination that any Equipment is not in compliance with the foregoing, or is in material breach of the terms and conditions set forth in this Service Schedule; and
- The Customer shall cooperate with the Provider with regard to the performance of the
Provider’s obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to Customer’s Equipment, as may be reasonable to permit the Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the Managed Migration.
- Assets & Deliverables.
- 11:11 DRaaS for Zerto Cloud-to-Cloud. The terms and conditions of
this Section 3.6 are applicable to each Order for 11:11 DRaaS for Zerto Cloud-to-Cloud services.
- Resources. The Cloud Resources used in the Recovery Site mimic the Cloud
Resources used in the Primary Site, hence the available features will be the same as the Cloud
Resources specified in the Order for the Primary Site.
- Storage. The types of storage available are Advanced, Accelerated, and/or SSD Storage purchased by the Customer includes both protected data and Zerto Journal data; Zerto Journal data may not be displayed on the 11:11 Cloud Console, but the Customer is still responsible for paying for this storage and may request a report from the Provider if required. Storage types comprising the environment are specified in the Order;
- CPU & RAM. These Cloud Resources are available as Shared Resources. CPU & RAM comprising the environment are specified in the Order;
- Bandwidth. Bandwidth is available as a Shared Resource as specified in the Order. On Orders where network bandwidth is not specified, it is included, abiding by the Excessive Use Section on the Acceptable Use Policy;
- Replication License. Replication licensing per protected Virtual Machine as specified in the Order; and
- Business Models. Storage is available in a Reserved plus Burst model. CPU, RAM and Bandwidth are available in a Burst model.
- Provider's Obligations. The Provider is responsible for the following in
accordance with industry best practices:
- Onboarding the Customer into the Provider's Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Provide documentation, project management, and guiding the Customer through an initial set up;
- Provide ongoing support and education on the Service at the Customer's request;
- Creating Virtual Data Center(s) consisting of compute, memory, storage infrastructure, and network bandwidth per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following Provider’s guidelines for managing these environments;
- Providing the Customer with the URL and authentication credentials to access the Customer’s Cloud Resources;
- Assigning external and internal IP addresses for the Primary Site virtual router per Customer-provided requirements;
- Assigning external and internal IP addresses for the Recovery Site virtual router per Customer-provided requirements;
- Providing replication licensing and replication management for Virtual Machines as described in the Order as completed by the Customer;
- Configuring protection at the Primary Site using the 11:11 Cloud-to-Cloud Recovery replication and retention policy of 24 hours of data retention for replicated servers at Recovery Site with replication frequency occurring once or more per hour between sites;
- Creating Virtual Protection Groups, per environment, per vApp, and initiate replication on Virtual Machines selected for replication;
- In case of Provider-assisted Failover, assisting the Customer with initiating Failover at-time-of-Disaster;
- Maintaining exclusive control of system administration security (e.g. administrator or root) level access for Provider-managed firewall or load balancing infrastructure;
- In the event of a Disaster and Failover to the Recovery Site, the Provider can, if needed, assist the Customer with Failback from Disasters to the Customer's Primary Site for additional i-Tech fees;
- Re-advertise the Customer’s IP Address Block from in case of Disaster; and
- If the Customer is running the Standard Backups service defined in Section 3.1, in the event of either a failover or of a VM being active in the Recovery Site’s virtual environment, the Provider will automatically begin backing up the Customer’s live workloads within 24 hours.
- Customer's Obligations. The Customer is responsible for the following in
accordance with industry best practices:
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Providing compute, memory, storage and network requirements for each Virtual Data Center and creating Virtual Data Center network and role-based security policies;
- If the Customer chooses to Seed Data, then the Customer must follow the Provider’s then-current Data Seeding Guidelines;
- Ensuring Virtual Machines match specifications as defined in the Provider’s then-current Product Compatibility Matrix;
- Maintaining operating systems and applications installed on the Customer's Virtual Machines or in the Customer's Virtual Data Center, including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Fixing any problems resulting from upgrades to the Virtual Machines operating system;
- Providing Virtual Machine and application log monitoring;
- Providing support for operating systems and applications installed on the Customer-Managed Virtual Machines;
- Informing the Provider at the time any of these changes occur in the Primary Site:
- Adding a disk to a Virtual Machine or adding a Virtual Machine to a replicated vApp,
- Shutting down Virtual Machine in a protected vApp for an extended period (< 5 minutes),
- Deleting a Virtual Machine from a protected vApp, and
- Increasing resource capacity in Primary Site in relation to replicated Virtual Machines without increasing Cloud Resources at Recovery site;
- Initiating failover at-time-of-test and at-time-of-Disaster using the 11:11 Cloud Console;
- In case of Provider-assisted Failover, declaring a Disaster affecting the Primary Site following the Provider’s guidelines; and
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation.
- Service Levels. Recovery Time Objective (RTO) and Recovery Point Objective (RPO) SLAs are accessible at https://www.1111systems.com/legal/sla.
- Resources. The Cloud Resources used in the Recovery Site mimic the Cloud
Resources used in the Primary Site, hence the available features will be the same as the Cloud
Resources specified in the Order for the Primary Site.
- 11:11 Cloud Backup for Veeam Cloud Connect. The terms and conditions
of this Section 3.7 are applicable to each Order that includes 11:11 Cloud Backup for Veeam Cloud
Connect services.
- Resources.
- Storage and Bandwidth. The Cloud Resources that comprise the 11:11 Cloud Backup for Veeam Cloud Connect service include Archive Storage along with embedded unlimited incoming and outgoing network bandwidth as described in the Order. Unlimited network bandwidth shall be subject to Section 3.7.4 below;
- Licensing. Veeam Cloud Connect licensing is included in the service on the Target Site;
- Insider Protection. The Provider offers Veeam Insider Protection service to the Customer if purchased on the Order. This service feature is not available for service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”; and
- Business Models. Storage is available in a Reserved model only.
- Provider's Obligations. The Provider is responsible for the following in
accordance with industry best practices:
- Providing pool of Cloud Storage, Veeam Cloud Connect licensing, and network bandwidth at Target Site per specifications detailed in the Order;
- Maintaining Target Site Cloud Storage infrastructure including patching, upgrades and updates;
- Creating Cloud Resources per specifications detailed in the Order;
- Providing Customer the URL and authentication credentials to access the Customer’s Cloud Resources;
- Providing storage pool modification options to the Order as required by the Customer;
- Providing up to two active connections between the backup server at the Source Site and the Cloud Resources at the Target Site per set of credentials. Additional active connections can be requested with the Provider's approval. All other jobs running concurrently will sit idle until the job using the connection completes. The same set of credentials can be used to send to concurrent backups from different locations, or Source Sites to the same Target Site Alternatively, two different sets of credentials can be used to send backups concurrently from the same backup server at the Source Site;
- Insider Protection. Providing the Customer with Insider Protection if purchased on the
Order with the following parameters:
- Retention. Insider Protection retention shall be set at 7 calendar days for the entire cloud repository,
- Backup repository. After the Customer deletes a backup on a cloud repository, regardless if this was intentional, accidental or caused by malware, the backup file(s) will be moved from the cloud repository to a "recycle bin" folder on the Provider backup repository that's not accessible by the Customer. While backup metadata files are deleted from disk immediately, the Provider will retain only full and incremental backup files,
- Repository quota. Backup files retained by the Provider shall not consume the Customer's cloud repository quota, as they are stored in a different folder only accessible by the Provider, and
- Backup recovery. Should the Customer submit a request to the Provider to recover a backup via a support ticket along with the i-Tech fees for the professional services to perform the restoration tasks, the Provider shall locate the backup file(s) required for data restore in the "recycle bin" and pass it/them to the Customer over the network or on a portable drive on a best-effort basis; Once the support ticket is closed, the Provider shall delete the temporary copies of the backup files;
- Cloud Backup Restore to 11:11 Cloud Services. Providing the Customer with the option to
purchase a best-effort cloud restoration service of VMware backups to 11:11 Cloud
Services at an additional cost using the backup file chain stored at the Target Site
with the following parameters:
- The accuracy and success of the restoration depends on the reliability of the backup file chain backed up by the Customer,
- The creation of Virtual Data Center(s) will consist of the specifications detailed in the relevant Order,
- The network connectivity to the restored environment will be provided by the Provider,
- The restoration shall be limited to repositories smaller than 20,000 GB,
- The restoration shall be limited to VMware based environments, and
- The Provider will start the restoration process within 24 hours after the Customer has both declared a Disaster by notifying the Provider and approved the new Order that contains the cloud resources required to run the workloads along with the i-Tech fees for the professional services required to perform the restoration tasks; and
- Backup immutability. Providing the Customer with 30 days of immutability with the
following parameters:
- Availability. 30 days of built in immutability is only available in Data Centers identified with the reference "PC1",
- Retention. 30 days of immutability is applicable to any backup stored in the Veeam Cloud Connect Backup repository. Any backup created with a GFS policy, will remain immutable for the duration of the GFS retention. All backups stored will be held for a minimum of the retention period plus the immutability period of 30 days plus the block generation period of 30 days and cannot be removed or deleted by the Customer or Provider until all three periods have passed, and
- Repository quota. Immutability storage overhead shall be accounted for when the solution is sized.
- Customer's Obligations. The Customer is responsible for the following in
accordance with industry best practices:
- Providing the Provider with information reasonably required to fulfill its obligations, including without limitation backup requirement details;
- Procuring, implementing, and configuring of the correct licensed versions of Veeam Cloud Connect software on the Machines as specified in the Provider's then-current Product Compatibility Matrix;
- Configuring and performing of backups, recovery tasks, and Testing within the Veeam software installation;
- Managing applicable Customer-controlled firewall(s) including but not limited to the configuration of Network Address Translation (NAT), Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), and static routing in relation to the Customer's connectivity to the Target Site;
- Fixing any problems resulting from upgrades to the Veeam Cloud Connect software;
- Maintaining software (including without limitation the Veeam Cloud Connect software) on the Customer's machines including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Ensuring the functioning of services or software running on the Customer’s machines;
- Providing support for operating systems and applications installed on the Customer’s machines;
- Promptly notifying the Provider if the Cloud Resources are hacked, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar code;
- Ensuring that during the term of the Order the Customer maintains enough bandwidth to ensure the continued successful backup of the data. The Customer acknowledges that the Provider is not in breach of the agreement if there is not enough bandwidth available at Source Site;
- If the Customer provisions backup jobs in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation, loss of backup data, or errors caused by over allocation;
- Insider Protection. In case of requesting the Provider to recover a deleted backup:
- Making the request via a support ticket,
- Providing the Provider with the sufficient information about the deleted backup data so the Provider can locate the backup file(s) required for data restore,
- Importing the full backup file(s) to the backup server on the Customer side, and
- Restoring the data from the backup after successfully importing the backup file(s);
- Cloud Backup Restore. In case of requiring a cloud backup restore:
- Declaring a Disaster by notifying the Provider and approving the Order that contains the cloud resources required to run the workloads along with the i-Tech fees for the professional services required to perform the restoration tasks; and
- The Customer understands that restoring the environment from cloud backup files is a best-effort service and acknowledges that the Provider is not responsible for any performance degradation, loss of data, or errors on the VMware-based restored environment as the success of the restoration depends on the reliability of the backup file chain;
- Encryption at Rest. The Customer may optionally configure encryption for backup data using the Veeam software prior to transmitting the data to the Provider. Encryption of backup data shall be automatically enforced for service subscription Item Numbers and/or Data Centers identified in the Order with the reference "PC1".
- Data Egress
- Data egress charges are included if usage patterns are deemed reasonable for the service offering. Reasonable data egress shall mean allowed egress of up to 50% of total stored data, measured in GB per month per region, within the Customer account; and
- The Provider reserves the right to charge for any data egress exceeding the reasonable data egress standard above.
- Resources.
- 11:11 DRaaS for Veeam. The terms and conditions of this Section 3.8
are applicable to
each Order that includes 11:11 DRaaS for Veeam services, regardless as to whether the Order for public
or private cloud services.
- Resources.
- Storage and Bandwidth (Public or Private). The Cloud Resources that comprise the 11:11 DRaaS for Veeam service include Accelerated and/or SSD Storage along with embedded unlimited incoming and outgoing network bandwidth as described in the Order;
- CPU & RAM;
- Public. These Cloud Resources are available as Shared Resources as specified in the Order; and
- Private. These Cloud Resources are available as Dedicated Resources as specified in the Order. The Provider is responsible for architecting and deploying CPU & RAM in a high availability configuration;
- Licensing (Public or Private). Veeam Cloud Connect licensing is included in the service on the Recovery Site;
- Business Models (Public or Private). Cloud Resources are available in either
Reserved, Burst, or Reserved plus Burst models as specified in the Order. The business
model available depends on whether the Customer has a vCenter based environment or a
vCloud Director based environment;
- vCenter based environments (legacy) – Storage is available in a Reserved model only. CPU and RAM are available in Burst model only, and
- vCloud Director based environments – shared Cloud Resources (including Storage, CPU, and RAM) are available in either Reserved or Reserved plus Burst models; and
- Overhead (Private only). The Customer acknowledges that all applications and hypervisors require some amount of overhead resource capacity in order to run optimally. The Customer agrees that the Dedicated Resources on the Order will be used for the overhead capacity of the Customer’s applications/hypervisor and that it is the sole responsibility of the Customer to ensure sufficient resources exist.
- Resources.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Onboarding the Customer into the Provider’s Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Provide documentation, project management, and demonstrate the failover steps for a full site failover to the Customer on the Provider’s test environment. In the event that a Customer would like the Provider to assist with design, implementation or testing of a partial site failover, additional i-Tech fees will apply;
- Provide ongoing support and education on the service at the Customers’ request;
- Creating Virtual Data Center(s) for recovering VMware based workloads, consisting of compute, memory, storage infrastructure, per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following the Provider’s guidelines for managing these environments;
- Assigning external and internal IP addresses for the Recovery Site virtual router per the Customer-provided requirements;
- Providing the Customer the URL and authentication credentials to access the Customer’s Cloud Resources;
- Providing up to two active connections between the replication server at the Primary Site and the Cloud Resources at the Recovery Site per set of credentials. Additional active connections can be requested with the Provider’s approval. All other jobs running concurrently will sit idle until the job using the connection completes;
- In case of Provider-assisted Failover, assisting the Customer with initiating Failover at-time-of-Disaster; and
- In the event of a Disaster and Failover to the Recovery Site, the Provider can, if needed, assist the Customer with Failback from Disasters to the Customer’s Primary Site for additional i-Tech fees.
- Customer's Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Procuring, implementing, and configuring of the correct licensed versions of Veeam Cloud Connect software on the Machines as specified in the Provider’s then-current Product Compatibility Matrix to enable the Secure DRaaS for Veeam Service from the Customer’s Premises;
- Ensuring that only VMware based workloads are replicated to the Provider and that the Virtual Machine environment matches specifications as defined in the Provider’s then-current Product Compatibility Matrix;
- Configuring compute, memory, storage and network requirements for each Veeam Hardware Plan and/or Veeam Failover Plan(s), and initiating Veeam replication jobs to the Provider;
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Notifying the Provider before making any changes to the Primary site that might affect the DRaaS service, including, but not limited to, any upgrades or patches to Veeam, the underlying virtualization layer, or the network. The Customer notes that any such actions could break the ability of the Service to function;
- If the Customer chooses to Seed Data from the Primary site, following the Provider’s then-current Data Seeding Guidelines;
- Creating and testing Recovery Plan;
- Initiating Failover at-time-of-test and at-time-of-Disaster;
- In case of Provider-assisted Failover, declaring a Disaster via a support ticket;
- Monitoring available storage in Veeam Cloud Connect Repository to ensure the Service will continue to function properly;
- Maintaining operating systems and applications installed on the Customer’s Virtual Machines or in the Customer’s Virtual Data Center, including, but not limited to, providing support, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Providing Virtual Machine and application log monitoring;
- The Customer understands that Testing can be stopped by the Provider in the event that a Testing event has run long enough to impact replication or the underlying infrastructure;
- In the event of a Disaster and Failover to the Recovery Site, in order for the Customer to Failback to the Primary Site, the Customer needs to recreate the original environment in the Primary Site by providing similar compute, memory, storage and network resources, and Virtual Machines on the Customer’s hosts, enable site peering to Recovery Site, set up and configure Recovery Groups before replicating data from Recovery Site. The Customer is responsible for paying the associated i-Tech fees if assistance from the Provider is required;
- Promptly notifying the Provider if the Cloud Resources are compromised, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar malicious code;
- Ensuring that there is enough bandwidth at Primary Site to enable initial replication and successive incremental changes of data to Recovery Site;
- Ensuring that there are enough Cloud Resources at Recovery site in relation to replicated Virtual Machines from Primary Site;
- If the Customer provisions replication jobs in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation;
- Defining, configuring and managing the required number of restore points stored as part of each replication job; and
- If using Veeam Continuous Data Protection (CDP), installing and maintaining Veeam CDP proxy servers and Veeam CDP software installed on the VMware ESXi Servers.
- Encryption. Providing the Customer with Storage Encryption with the following
parameters:
- Storage Encryption. Storage is encrypted at rest with AES-256 in XTS cipher mode with FIPS 140-2 approved algorithms;
- VM Encryption;
- The Provider offers encryption on a per VM or per volume basis, and is available to the Customer if purchased on the Order,
- The Customer agrees and understands that when running VM Encryption some features in the 11:11 Cloud Console that require access to the Customer’s VMs may not function or provide information, since the Customer’s VM will be encrypted, and
- VM Encryption encrypts data using AES-128/256 algorithms and allows the Customer to manage the encryption keys. The Customer understands that the Provider has no access to encryption keys.
- Security Features (applicable to vCloud director-based environments only). The 11:11
Cloud Console performs the following function:
- Vulnerability Scanning. Assesses systems, networks and applications for weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack. The weekly predefined scan generates a report which is added to the historical data; and
- Service Levels Recovery Time Objective (RTO) and Recovery Point Objective (RPO) SLAs are accessible at https://www.1111systems.com/legal/sla.
- 11:11 Cloud. The terms and conditions of this Section
3.1 are applicable to each Order that includes 11:11 Cloud services.
- 11:11 Secure DRaaS for Veeam. The terms and conditions of this Section 3.9
and, to the extent
not inconsistent with this Section 3.9, Section 3.8, are applicable to each Order that includes 11:11 Secure
DRaaS for Veeam services, regardless as to whether the Order for public or private cloud services.
- Security Features (applicable to vCloud director-based environments only). Providing
the Customer with the following Security Features:
- The Provider offers internal and external vulnerability scanning and reporting on the Customer’s public Internet facing IPv4 address blocks and presents the information in the 11:11 Cloud Console;
- The 11:11 Cloud Console performs the following functions, if enabled, and displays them in
reports. In order to enable some features, a software agent may be required to be loaded on the
Virtual Machine:
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing
traffic for protocol deviations, policy violations, or content that signals an attack.
There are 2 types of scanning available:
- Weekly predefined scan and report, and
- On-demand scan that generates new reports ad-hoc,
- Malware Detection. Detects malware, viruses, spyware, trojans, and other malware,
- Firewall. Bidirectional host-based stateful firewall that audits all traffic incoming and outgoing from the VM,
- Configuration Auditing. Checks that IT assets are compliant with the Provider’s policies and standards,
- Compliance Reports. Provides logs and data necessary to fulfill audit requirements,
- Web Application Scanning. Discovers web server and services weaknesses and OWASP vulnerabilities, and
- Integrity Monitoring. Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time; and
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing
traffic for protocol deviations, policy violations, or content that signals an attack.
There are 2 types of scanning available:
- The information contained within the reports are intended solely to identify threats, vulnerabilities, and statuses of the Cloud environment components, and is provided “as is” without warranty of any kind, express or implied, including but not limited to warranties for fitness of purpose. The Provider does not warrant the completeness of accuracy of the report, nor does it make any recommendations based on the findings noted herein.
- Security Features (applicable to vCloud director-based environments only). Providing
the Customer with the following Security Features:
- 11:11 DRaaS for Zerto. The terms and conditions of this Section 3.10 are
applicable to each Order that includes 11:11 DRaaS for Zerto services, regardless as to whether the Order for
public or private cloud services.
- Resources.
- Storage (Public or Private). The types of storage available are Advanced, and/or SSD Storage purchased by the Customer includes both protected data and Zerto Journal data; Zerto Journal data may not be displayed on the 11:11 Cloud Console, but the Customer is still responsible for paying for this storage and may request a report from the Provider if required. Storage types comprising the environment are specified in the Order;
- CPU & RAM.
- Public. These Cloud Resources are available as Shared Resources as specified in the Order; and
- Private. These Cloud Resources are available as Dedicated Resources as specified in the Order. The Provider is responsible for architecting and deploying CPU & RAM in a high availability configuration;
- Bandwidth (Public or Private). Bandwidth is available as a Shared Resource as specified in the Order. On Orders where network bandwidth is not specified, it shall be considered to be embedded in storage;
- Replication License (Public or Private). Replication licensing per protected Virtual Machine as specified in the Order. On Orders where replication licensing is not specified, it shall be considered to be embedded in storage;
- Business Models (Public or Private). Cloud Resources are available in either Reserved or Reserved plus Burst models as specified in the Order; and
- Overhead (Private only). The Customer acknowledges that all applications and hypervisors require some amount of overhead resource capacity in order to run optimally. The Customer agrees that the Dedicated Resources on the Order will be used for the overhead capacity of the Customer’s applications/hypervisor and that it is the sole responsibility of the Customer to ensure sufficient resources exist.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Onboarding the Customer into the Provider's Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Provide documentation, project management, and demonstrate the failover steps for a full site failover to the Customer on the Provider's test environment. In the event that a Customer would like the Provider to assist with design, implementation or testing of a partial site failover, additional i-Tech fees will apply;
- Provide ongoing support and education on the Service at the Customers’ request;
- Creating Virtual Data Center(s) consisting of compute, memory, storage infrastructure, and network bandwidth per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following the Provider’s guidelines for managing these environments;
- Providing the Customer with the URL and authentication credentials to access the Customer’s Cloud Resources;
- Assigning external and internal IP addresses for the Recovery Site virtual router per the Customer-provided requirements;
- Providing Zerto Cloud Connector;
- Providing Zerto replication licensing for Virtual Machines as defined in the Provider's then-current Product Compatibility Matrix;
- In case of Provider-assisted Failover, assisting Customer with initiating Failover at-time-of-Disaster;
- In the event of a Disaster and Failover to the Recovery Site, the Provider can, if needed, assist the Customer with Failback from Disasters to Customer Primary Site for additional i-Tech fees; and
- If the Customer is running the Standard Backups service defined in Section 3.1, in the event of either a failover or of a VM being active in the Recovery Site’s virtual environment, the Provider will automatically begin backing up the Customer’s live workloads within 24 hours.
- Customer's Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Providing compute, memory, storage and network requirements for each Virtual Data Center and creating Virtual Data Center network and role-based security policies;
- Ensuring that only VMware based Workloads are replicated to the Provider and that the Virtual Machine environment matches specifications as defined in the Provider’s Product Compatibility Matrix. By purchasing this product, the Customer specifically acknowledges that Hyper-V Workloads are not supported;
- Creating Virtual Machines for Zerto Virtual Manager (ZVM), downloading and installing ZVM software and Zerto Virtual Replication Appliance (ZvRA) on Customer hosts;
- Configuring Zerto Protection at the Primary Site; Creating Recovery Groups and initiating replication on Virtual Machines selected for replication;
- Notifying the Provider before making any changes to the Primary site that might affect the DRaaS service, including but not limited to, any upgrades or patches to Zerto, the underlying virtualization layer, or the network. The Customer hereby acknowledges that any such actions could break the ability of the Service to function;
- If the Customer chooses to Seed Data, then the Customer must follow the Provider’s then-current Data Seeding Guidelines;
- Ensuring Virtual Machines match specifications as defined in the Provider’s then-current Product Compatibility Matrix;
- Creating and testing Recovery Plan;
- Initiating Failover at-time-of-test and at-time-of-Disaster;
- In case of Provider-assisted Failover, declaring a Disaster following the Provider’s guidelines;
- Ordering additional Zerto licenses when new VMs are added;
- Maintaining operating systems and applications installed on the Customer's Virtual Machines or in the Customer's Virtual Data Center, including, but not limited to, providing support, patching, upgrades, updates and anti-virus software in accordance with industry best practices. This includes a supported release of Zerto Virtual Manager. Should the Customer be running a version of Zerto Virtual Manager that is End of Support, the Provider reserves the right to disconnect the service until the Customer has upgraded to a supported version;
- Providing Virtual Machine and application log monitoring;
- The Customer understands that Testing can be stopped by the Provider in the event that a Testing event has run long enough to impact replication or the underlying infrastructure;
- In the event of a Disaster and Failover to the Recovery Site, in order for the Customer to Failback to the Primary Site, the Customer needs to recreate the original environment in the Primary Site by providing similar compute, memory, storage and network resources, Virtual Machines, Zerto Virtual Manager (ZVM) and Zerto Replication Appliance (ZvRA) on the Customer's hosts, enable site peering to Recovery Site, set up and configure Recovery Groups before replicating data from Recovery Site. The Customer is responsible for paying the associated i-Tech fees if assistance from the Provider is required;
- Promptly notifying the Provider if the Cloud Resources are compromised, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar malicious code;
- Informing the Provider at the time any of these changes occur in the Primary Site:
- Adding a Virtual Machine to a replicated vApp that exceeds the maximum number of Zerto replication licensing specified on the Order;
- Increasing resource capacity in Primary Site in relation to replicated Virtual Machines without increasing Cloud Resources at Recovery site; and
- Defining, configuring and managing the required journal retention setting within each VPG.
- Ensuring that there is enough bandwidth at Primary Site to enable initial replication and successive incremental changes of data to Recovery Site;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation; and
- Defining, configuring and managing the required journal retention setting within each VPG.
- Encryption.
- VM Encryption.
- The Provider offers encryption on a per VM or per volume basis, and is available to the Customer if purchased on the Order,
- The Customer agrees and understands that when running VM Encryption some features in the 11:11 Cloud Console that require access to the Customer's VMs may not function or provide information, since the Customer's VM will be encrypted, and
- VM Encryption encrypts data using AES-128/256 algorithms and allows the Customer to manage the encryption keys. The Customer understands that the Provider has no access to encryption keys.
- VM Encryption.
- Security Features. The 11:11 Cloud Console performs the following function:
- Vulnerability Scanning. Assesses systems, networks and applications for weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing traffic for protocol deviations, policy violations, or content that signals an attack. The weekly predefined scan generates a report which is added to the historical data.
- Service Levels. Recovery Time Objective (RTO) and Recovery Point Objective (RPO) SLAs are accessible at https://www.1111systems.com/legal/sla.
- Resources.
- 11:11 Secure DRaaS for Zerto. The terms and conditions of this Section 3.11
and, to the extent
not inconsistent with this Section 3.11, Section 3.10, are applicable to each Order that includes 11:11 Secure
DRaaS for Zerto services, regardless as to whether the Order for public or private cloud services.
- Resources.
- Storage. The types of storage available are Accelerated, and/or SSD Storage purchased by the Customer includes both protected data and Zerto Journal data; Zerto Journal data may not be displayed on the 11:11 Cloud Console, but the Customer is still responsible for paying for this storage and may request a report from the Provider if required. Storage types comprising the environment are specified in the Order.
- Encryption.
- Storage Encryption. Storage is encrypted at rest with AES-256 in XTS cipher mode with FIPS 140-2 approved algorithms.
- Security Features.
- The Provider offers internal and external vulnerability scanning and reporting on the Customer's public Internet facing IPv4 address blocks and presents the information in the 11:11 Cloud Console;
- The 11:11 Cloud Console performs the following functions, if enabled, and displays them in
reports. In order to enable some features, a software agent may be required to be loaded on the
Virtual Machine:
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing
traffic for protocol deviations, policy violations, or content that signals an
attack. There are 2 types of scanning available:
- Weekly predefined scan and report, and
- On-demand scan that generates new reports ad-hoc,
- Malware Detection. Detects malware, viruses, spyware, trojans, and other malware,
- Firewall. Bidirectional host-based stateful firewall that audits all traffic incoming and outgoing from the VM,
- Configuration Auditing. Checks that IT assets are compliant with the Provider’s policies and standards,
- Compliance Reports. Provides logs and data necessary to fulfill audit requirements,
- Web Application Scanning. Discovers web server and services weaknesses and OWASP vulnerabilities, and
- Integrity Monitoring. Monitors critical operating system and application files, such as directories, registry keys, and values, to detect and report malicious and unexpected changes in real time; and
- Vulnerability Scanning. Assesses systems, networks and applications for
weaknesses and detects known and zero-day attacks. Examines all incoming and outgoing
traffic for protocol deviations, policy violations, or content that signals an
attack. There are 2 types of scanning available:
- The information contained within the reports are intended solely to identify threats, vulnerabilities, and statuses of the Cloud environment components, and is provided “as is” without warranty of any kind, express or implied, including but not limited to warranties for fitness of purpose. The Provider does not warrant the completeness of accuracy of the report, nor does it make any recommendations based on the findings noted herein.
- Resources.
- 11:11 Secure DRaaS Carbonite Availability (formerly known as DoubleTake).
The terms and
conditions of this Section 3.12 are applicable to each Order for 11:11 Secure DRaaS with Carbonite Availability.
The Customer acknowledges that this product requires that the services listed in Section 3.1 or 3.2 to be
deployed in conjunction with it.
- Resources.
- Replication License. Either Physical or Virtual Edition Replication Licenses as described in the Order;
- Business Models. Replication licenses are available in a per job Reserved model with two
options as described in the Order:
- Constant replication, or
- Migration only.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Onboarding the Customer into the Provider’s DRaaS with Carbonite Availability service by guiding the Customer through the process of deploying the service;
- Building target VMs for each server requiring replication with Carbonite Availability;
- Deploying the Carbonite Availability agent and Carbonite Availability Metered Usage (DTMU) on each target VM for licensing purposes;
- Deploying a Carbonite Availability management server in the Provider's hosted infrastructure to act as the management console for the customer;
- Providing the Customer with a URL to download the Carbonite Availability agent and the corresponding license keys;
- Assisting the Customer in setting up replication jobs utilizing the Carbonite Availability management server;
- Providing documentation, project management, and demonstrate the DR failover steps to the Customer and successfully test failover;
- In case of Provider-assisted Failover, assisting the Customer with initiating Failover at-time-of-Disaster; and
- In the event of a Disaster and Failover to the Recovery Site, the Provider can, if needed, assist the Customer with Failback from Disasters to the Customer's Primary Site for additional i-Tech fees.
- Customer’s Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Providing the Provider with information reasonably required to fulfill its obligations, including without limitation backup requirement details;
- Ensuring that only VMware based workloads are replicated to the Provider and that the Virtual Machine environment matches specifications as defined in the Provider’s then-current Product Compatibility Matrix. By purchasing this product, the Customer specifically acknowledges that Hyper-V workloads are not supported;
- Downloading and installing the Carbonite Availability agent on each of the source servers that require replication;
- Working with the Provider to set up replication jobs utilizing the Carbonite Availability management server;
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance and managing Firewall(s) including, but not limited to, the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Notifying the Provider before making any changes to the Primary site that might affect the DRaaS service, including any upgrades or patches to Carbonite Availability, the underlying virtualization layer, the replication jobs, or the network. The Customer hereby acknowledges that any such actions could break the ability of the Service to function;
- Initiating Failover at-time-of-test and at-time-of-Disaster;
- In case of Provider-assisted Failover, declaring a Disaster via a support ticket;
- Monitoring available storage in the hosted environment to ensure the Service will continue to function properly;
- Maintaining operating systems and applications installed on the Customer’s Virtual Machines or in the Customer’s Virtual Data Center, including, but not limited to, patching, upgrades, updates and anti-virus software;
- Promptly notifying the Provider if the Cloud Resources are compromised, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar malicious code;
- Ensuring that there is enough bandwidth at Primary Site to enable initial replication and successive incremental changes of data to Recovery Site;
- Ensuring that during the term of the Order the Customer maintains enough bandwidth to ensure the continued successful replication of the data. The Customer acknowledges that the Provider is not in breach of the agreement if there is not enough bandwidth available at Primary Site; and
- If the Customer provisions replication jobs in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation and the Customer may incur in additional costs to cover the additional licenses.
- Resources.
- 11:11 Flexible Cloud Environment. The terms and conditions of this Section
3.13 are applicable to each Order that includes 11:11 Flexible Cloud Environment.
- Resources.
- Bare Metal Resources. CPU, RAM, Local Storage, Networking Backplane and Redundant Power comprise the Bare Metal server in the form of a blade or physical appliance as described in the Order;
- Licensing. Microsoft and/or Broadcom VMware licensing as described in the Order following the terms and conditions of Section 3.54 (Microsoft Licensing) and Section 3.55 (VMware Licensing) respectively;
- Virtualization Layer. VMware vSphere for compute virtualization and VMware NSX for network virtualization;
- Storage Layer. HPE storage arrays provide datastores to VMware for the provisioning of virtual machines; and
- Business Models. Bare Metal resources and licensing for Microsoft SPLA are available in Reserved model. Software licensing for Broadcom VMware is available in Reserved plus Burst model.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Providing Bare Metal resources and optional software licensing as specified on the relevant Order;
- Providing to the Customer vCenter server access to allow provisioning and workload management tasks to complete;
- Providing to the Customer, upon request via support ticket, Graphic Console access;
- Using commercially reasonable efforts to power on and ensure connectivity to the Bare Metal resources, and additionally VMware services for managed service Customers, before handoff to the Customer;
- Using commercially reasonable efforts to provide first and second tier support to ensure the connectivity of the Bare Metal resources; and
- For managed service Customers:
- Operating the VMware compute and network virtualization layers, and
- Applying security patches, and
- Yearly upgrades to decimal or major updates to a VMware vSphere and vCenter versions.
- Customer’s Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Selecting and securing the appropriate authentication procedures to allow access to the Bare Metal server OS and applications residing in it;
- Following the Provider's then-current Data Seeding Guidelines if the Customer chooses to seed data;
- Maintaining operating systems and applications installed on the Bare Metal server(s), including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practices;
- Fixing any problems resulting from upgrades to the Bare Metal server operating system;
- Providing Bare Metal server and application log monitoring;
- Providing support for operating systems and applications installed on the Bare Metal server(s);
- Maintaining all backups for all Customer data residing on the Bare Metal servers;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation or errors caused by over allocation.
- For Customers opting out of VMware as a Service, maintaining operating systems and applications installed on the Bare Metal server(s), including, but not limited to, patching, upgrades, updates and anti-virus software in accordance with industry best practice; and
- For managed service Customers:
- Providing the use case for vCenter server access to allow the Provider to configure the minimum required permissions for vCenter server access aligning with industry best practices.
- Risks
- Implementation and integration complexity. VMware’s advanced virtualization and cloud technologies (such as vSphere, vCenter and NSX) require precise configuration and seamless integration with existing Customer systems. Errors in setup or compatibility issues could disrupt services or degrade performance;
- Security and compliance. Virtualized environments are prime targets for cyberattacks. Even applying security best practices, misconfigurations or outdated software could lead to security breaches;
- Service reliability and performance. Downtime or performance hiccups in the VMware infrastructure could disrupt critical Customer workloads, potentially causing financial or operational harm. Overuse of shared resources in a virtualized setup might create bottlenecks, particularly during high-demand periods;
- Vendor lock-In. Heavy reliance on VMware’s ecosystem could limit future flexibility, making it costly or challenging to switch to other virtualization platforms. Shifts in Broadcom's strategy or product offerings (e.g., following VMware's acquisition by Broadcom) might affect service stability or features;
- Licensing and pricing changes. Broadcom's move to subscription-based licensing or changes driven by Broadcom could raise costs or alter terms, impacting the service’s financial model. Non-compliance with licensing rules might lead to penalties or service interruptions;
- Customer adoption and usage. Customers unfamiliar with VMware’s capabilities might underuse the service, reducing its value. Conversely, overuse or improper setup by Customers (especially in self-service scenarios) could strain resources and affect performance;
- Assumptions
- Customer Infrastructure and Readiness. Customer possesses the required Bare Metal Resources, including compatible hardware and networks, to support VMware deployment. Customers will provide accurate workload details to ensure the service is properly sized and configured;
- Stable Vendor Relationship. VMware, under Broadcom, will continue supporting and enhancing its products, ensuring the service’s long-term viability. The provider’s partnerships with VMware and hardware vendors like HPE will remain robust, providing access to updates and support; and
- Customer Collaboration. Customers will work closely with the provider during deployment, migration, and ongoing management to align the service with their goals. For managed services, Customers will engage in regular reviews to optimize performance and adapt to changing needs.
- Resources.
- 11:11 Cross Connects. The terms and conditions of this Section 3.14 are
applicable to each
Order that includes 11:11 Cross Connect services.
- Resources
- Cross Connect Resources. Copper or Fiber Cross Connects as described in the Order;
- Business Models. Colocation resources are available in Reserved Resources model; and
- The Provider does not include any rack space as part of the Cross Connect service
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Patching in the Provider’s side of the cross connect up to the Demarcation Point:
- On Cross Connects which media type is fiber, the Provider will supply a single-mode fiber optic patch cable to connect the cross connect to the Provider's switching infrastructure, unless otherwise specified on the Order, or
- On Cross Connects which media type is copper, the Provider will supply a 1000Base-LX patch cable to connect the cross connect to the Provider's switching infrastructure; and
- Supporting port configurations of 1 GB or 10 GB.
- Patching in the Provider’s side of the cross connect up to the Demarcation Point:
- Customer's and/or Carrier’s Obligations. The Customer is responsible for the following
in accordance with industry best practices:
- Ensuring that the Carrier has a presence in the specific Provider’s Data Center where the Cross Connect will be deployed as described in the Order. The Carrier’s presence should be within the acceptable range of the media type relative to the Provider’s presence within the Data Center;
- Managing the relationship with the Carrier;
- Providing the Provider with a signed Letter of Authorization (LOA), using the Carrier’s
letterhead, authorizing the Provider and the Data Center to connect the Carrier's Equipment to
the cross connect with the following information:
- Data Center address,
- Authorization excerpts – referencing the Provider to complete the work,
- Demarcation location (ports included),
- Media type, and
- Connector type;
- The Customer and the Customer’s Carrier shall be responsible for all circuit provisioning up to the Carrier Demarcation Point. This includes but is not limited to all the necessary access, timelines for completion, installation, and any other relevant items; and
- Contacting their Carrier and request that the cross connect be patched in.
- Resources
- 11:11 Shared Colocation. The terms and conditions of this Section 3.15 are
applicable to each
Order that includes 11:11 Shared Colocation services.
- Resources.
- Colocation Resources. Cabinet or Rack Units, Power, Bandwidth and Networking components comprise the Colocation service as described in the Order; and
- Business Models. Colocation resources are available in Reserved model.
- Grant of License. The Provider hereby grants to the Customer the right to use the Colocation Rack Space for the placement of Provider-Supplied Equipment and/or Customer-Provided Equipment during the term of the Order on the terms and subject to the conditions set out in this Schedule, provided that the Provider retains the right to access the Colocation Rack Space for any legitimate business purpose at any time.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Use commercially reasonable efforts to prepare any Colocation Rack Space to the relevant Specifications set in the Statement of Work (SOW) and/or the Order on or before the relevant Commencement Date;
- Once the Customer provides the tracking information for the Equipment upon shipment, the Provider will alert the Data Center of the shipment to ensure acceptance;
- Install the Equipment after it has arrived at the Data Center according to the cabling diagram provided by the Customer;
- Using commercially reasonable efforts to power on and ensure connectivity to the Equipment. On Customer-Provided Equipment, issues on the pre-configuration shall result in project timeline delays and the Customer may incur in additional costs to cover the additional time;
- The Provider shall not in any case be liable for any type of downtime, connectivity failure, or
service interruption and SLA shall not be applied for any of the following:
- Full or partial failure in the Customer-Provided Equipment,
- Misconfiguration of the Customer-Provided Equipment, and
- Failure in any external Customer-Provided Carrier;
- To the extent legally practicable, assign to the Customer any warranty received by the Provider from the manufacturer of the Provider-Supplied Equipment to allow the Customer to pursue a remedy from such manufacture in respect of defects in the Provider-Supplied Equipment. Other than as set out in the previous sentence, the Provider-Supplied Equipment shall be provided for Customer’s use "as is", with all faults and the Provider hereby disclaims all implied warranties including, without limitation, warranties of merchantability, fitness for a specific purpose, and warranties of satisfactory quality in respect of the Provider-Supplied Equipment; and
- The Provider shall not grant physical access to the Customer into the Data Center. Shall the Customer require physical access to the Equipment, the Provider will coordinate with the Customer and schedule remote hands services to gain physical access.
- Customer's Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Ensure that any Customer-Provided Equipment sent out to the Provider is in good working conditions in accordance with prevailing industry standards throughout the term of the relevant Colocation Order such that the Customer-Provided Equipment does not damage any other property within the Colocation Rack Space, Colocation Area or Data Center. The Provider shall have the right to take such actions, without liability under this Schedule, the Agreement or the Colocation Order, as are reasonably necessary to protect property in the Data Center from harm caused by the Customer-Provided Equipment, including without limitation by disconnecting the Equipment, if the Provider in its reasonable discretion believes that the Equipment poses a threat of damage to property within the Data Center;
- Ensure that any Customer-Provided Equipment sent out to the Provider is preconfigured with relevant information in such a way that the Customer can access them remotely as they are racked and cabled;
- Ensure that the Customer-Provided Equipment does not rely on Wi-Fi or radio frequency (RF) as it is not permitted;
- Ensure that the Customer-Provided Equipment supports dual power connected to redundant A+B power circuits. In the event of a power outage, the Provider shall not be liable for any power failure to the Customer-Provided Equipment if such Customer-Provided Equipment does not support redundant power supply or if the Customer does not provide the necessary cables to connect the redundant power supply;
- Provide a cabling diagram that includes a physical view of each port of the Equipment that needs to be plugged;
- Ensure that the Customer-Provided Equipment is properly labeled;
- Provide all the necessary network patch and power cables;
- Provide the tracking information for the Customer-Provided Equipment upon shipment;
- In the event that the Customer-Provided Equipment fails:
- The Customer is responsible for troubleshooting the Equipment,
- The Customer is responsible for applying any warranty with the manufacturer to pursue a remedy from such manufacture in respect of defects in the Customer-Provided Equipment, and
- If a replacement is required, the Customer shall be responsible for, but not limited to, the costs and management of the removal, packaging, and logistics of the Customer-Provided Equipment and the corresponding replacement. The Provider shall not be liable for any loss of data or hardware, or damage incurred by the Customer arising out of the Provider’s disconnection, removal, or disposal of the Customer-Provided Equipment if the Customer fails to respond after several communication attempts from the Provider. The obligations of this Section 3.14.4 are applicable to the Customer-Provided Equipment that shall act as a replacement and managed under a new Order.
- In the event that a Colocation Order is terminated, the Customer shall be financially responsible for the disconnection, removal, packaging, logistics, and/or disposal of Customer-Provided Equipment. If the Customer leaves Customer-Provided Equipment in the Provider's Data Center for thirty (30) days after the termination of a Colocation Order, the Provider reserves the right to dispose of any such hardware and shall not be liable to the Customer for any associated loss of data or hardware.
- Risks.
- Power. If the Customer does not purchase redundant power or if any of the Customer-Provided Equipment does not support redundant power, the Customer is at risk if a power failure occurs. Provider’s best practice recommendation is to purchase redundant power and to utilize the Customer-Provided Equipment that supports redundant power;
- Rack Mounting. The Equipment cannot be racked back-to-back, such that the rear of two devices is facing each other in the middle of a rack. Only one device shall be used per shelf or unit (U). If the Provider finds that the Customer did not supply the rack-mounting materials, or the Customer-Provided Equipment is not rack-mountable and an additional shelf or tray is needed to securely mount the Equipment to the rack, the Customer shall incur an additional cost to correctly rack the Equipment, and the project timeline may be delayed while additional colocation space is allocated;
- Shelves. If the Customer uses a shelf and the combined height of the Customer-Provided Equipment and shelf use more than the allotted space, the Customer shall incur an additional cost for additional U(s). The project timeline shall also be delayed while additional colocation space is allocated;
- Shipping. All Customer-Provided Equipment that is shipped must follow the Provider’s Shipping Process and must be handled through the Provider's project manager. This ensures the Provider's ability to effectively track the Equipment to ensure it does not get lost. If the Equipment is shipped without following the Provider’s shipping requirements or without the Provider's project managers involvement, the likelihood the Equipment is lost is increased;
- Reject Equipment. Provider reserves the right to reject any Customer-Provided Equipment that appears unsafe. In this event, the Customer-Provided Equipment will be shipped back to Customer and the project timeline shall be delayed while new hardware is shipped or a new solution is devised;
- Equipment Size. If the Customer-Provided Equipment is larger than the space allocated, Provider shall increase the monthly cost, and the project timeline may be delayed while additional colocation space is allocated;
- Required Cables. It is the Customer's responsibility to ship the Customer-Provided Equipment with all required cables and to test the cables prior to shipping, ensuring they work as intended. If the Equipment is shipped with missing or defective cables, Customer shall be charged for the required cables and the corresponding Provider’s i-Tech fee for any additional time required to install the cables, and the project timeline shall be delayed; and
- Shipping Materials. All shipping and packaging materials are destroyed once equipment arrives at the Data Center. The Provider will not return any boxes, manuals, packing materials, or any other items that are shipped.
- Storage of Equipment. Following the request of the Customer, the Provider may, at its option, store Customer-Provided Equipment that the Customer intends to collocate in the Colocation Rack for not more than five days prior to the Commencement Date as a courtesy incidental to the license granted to the Customer by the Provider under this Schedule. The Provider will not charge the Customer a fee for such storage. Absent the Provider's gross negligence or intentional misconduct, the Provider shall have no liability to the Customer or any third-party arising from such storage services. If the Customer stores Customer-Provided Equipment for longer than ten days, the Provider may, but shall not be obligated to, return the Customer's equipment to the Customer without liability, at the Customer's sole cost and expense.
- Changes. The Provider reserves the right to change from time to time, and at the Provider's cost, the location or configuration of the Colocation Rack Space in which the Customer-Provided Equipment and/or the Provider-Supplied Equipment is located, provided that the Provider shall not arbitrarily require such changes. The Provider and the Customer shall work in good faith to minimize any disruption in the Customer's services that may be caused by such changes in location or configuration of the Colocation Rack Space.
- Resources.
- 11:11 Dedicated Colocation. The terms and conditions of this Section 3.16 are applicable to each Order that includes 11:11 Dedicated Colocation services and are accessible at https://1111systems.com/legal/1111-colocation-service-terms/
- Multi-Cloud Connect (formerly known as Zipline). The terms and conditions of
this Section 3.17
are applicable to each Order that includes 11:11 Multi-Cloud Connect services.
- Resources.
- Multi-Cloud Connect Resources. Bandwidth, access to the elastic interconnection fabric based on a Software Defined Network, and a shared physical Cross Connect in the Provider's Data Center comprise the Multi-Cloud Connect connection as described in the Order; and
- Business Models. Multi-Cloud Connect resources are available in a Reserved model.
- Provider's Obligations.
- Patching in the Provider’s side of the Cross Connect up to the Demarcation Point;
- Creating and maintaining a subscription to the elastic interconnection fabric based on a Software Defined Network service;
- Creating and maintaining the required number of virtual Cross Connects to support Multi-Cloud Connect connectivity as defined in the Order;
- Using commercially reasonable efforts to provide first and second tier support to ensure the performance and connectivity of the Multi-Cloud Connect resources; and
- Escalating support request(s) on the Customer's behalf for tier 3 support, if performance or connectivity issues are determined to be on the Provider's side.
- Resources.
- 11:11 Secure Cloud Backup for Microsoft 365. The terms and conditions of this
Section 3.18 are applicable to each Order that includes 11:11 Secure Cloud Backup for Microsoft 365 services.
The terms Office 365 and Microsoft 365 can be used interchangeably as they refer to the same service.
- Resources.
- Storage and Bandwidth. The Cloud Resources that comprise the Secure Cloud Backup for Microsoft 365 service include unlimited shared storage per user account along with embedded unlimited incoming and outgoing network bandwidth used for backup purposes;
- Licensing. Veeam Backup for Microsoft Office 365 licensing is included in the service on the Provider's site, unless explicitly specified in the Order;
- Business Models. All subscription licenses are sold per user account in a Reserved plus Burst model as described in the Order according to the minimum license commitment and incremental guidelines specified by the Provider; and
- Secondary Copies. In addition to the standard subscription licenses, Customers could opt in for secondary copies of the data as described in the Order. Where applicable, location pairings between primary and secondary copies can be found in the Success Center article available at https://success.1111systems.com/article/xUJlTC. This service feature is only available for service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Providing a user-based cloud backup service comprised of cloud storage, Veeam Backup for Microsoft Office 365 licensing, unless explicitly specified in the Order and network bandwidth at the Provider's Site to store Microsoft 365 data per user account as specified in the Order;
- Maintaining the Provider's Cloud Storage infrastructure including patching, upgrades and updates;
- Providing the Customer the URL and authentication credentials to access the Microsoft 365 user's data via the Veeam Explorer applications through Veeam Cloud Connect;
- During initial setup, assisting the Customer in creating an inclusion and exclusion groups that can be used in the backup jobs to manage user license counts;
- Backing up Exchange Online mailbox items (email, calendar and contacts), as well as OneDrive for
Business, SharePoint Online files and folders, and Teams data on the Microsoft 365 organization
that hosts the licensed Microsoft 365 user accounts for, as specified by the Customer, either
(a) the entire Microsoft 365 organization, or (b) a subset of Microsoft 365 users via an Active
Directory security group. Each Microsoft 365 user account consist of the following objects:
- A personal mailbox,
- An online Archive mailbox,
- OneDrive documents,
- Personal SharePoint sites, and
- Teams data;
- Backing up Microsoft 365 items for shared and group mailboxes, group SharePoint sites, as well as user objects that do not have a Microsoft 365 license applied, without requiring an 11:11 Secure Cloud Backup for Microsoft 365 license, as specified by the Customer;
- The Provider considers licensed users based on the requirements by object type as described in the Success Center article accessible at https://success.1111systems.com/article/YPXbCN. The Customer can designate specific user accounts for deletion from backups from the Provider’s infrastructure; once all backups have been deleted for an account designated for deletion, the licenses associated with such deleted accounts can be reassigned by the Customer.
- During initial setup, configuring and performing backups, that shall occur at least once a day;
- Retaining backups while a Veeam Backup for Microsoft Office 365 license is assigned to a Microsoft 365 user according to the Customer's required retention policy during onboarding, for the primary and secondary copies, if applicable, and such retention policy will not affect the price specified in the Order. Shall the Customer require immutability for the secondary copy, its retention shall be linked directly to the retention policy since they are the same; and
- Providing the following recovery options to the Customer:
- Restoring Organization Mailbox, OneDrive, SharePoint, or Teams data,
- Exporting Exchange mailbox objects to a PST file,
- Saving Exchange email items as a Microsoft Exchange Mail Document (.msg) file,
- Saving items as HyperText Markup Language (.html) files,
- Sending items as attachments to specified recipients, and
- Saving OneDrive, SharePoint, or Teams files and folders as a ZIP file.
- Customer's Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Providing a list of either (a) the entire Microsoft 365 organization’s users, or (b) a subset of Microsoft 365 users via an Active Directory security group in addition to a list of Group SharePoint sites, and/or a list of Teams' teams that are to be protected by the Provider with 11:11 Secure Cloud Backup for Microsoft 365 licenses. If the Customer provides a subset of Microsoft 365 users in accordance with part (b) of the preceding sentence, the Customer shall be responsible for any charges associated to the mailboxes, documents, sites, and/or items selected explicitly or implicitly under the security group;
- Providing the Provider with information reasonably required to fulfill its obligations,
including, but not limited to, the Microsoft 365 organization name that contains the user
accounts to back up, and a Microsoft 365 account with the following criteria and rights:
- An account that belongs to the Microsoft 365 organization that shall be backed up. Having a mailbox in that organization is optional,
- Role Management role. To grant ApplicationImpersonation role,
- ApplicationImpersonation role. To allow this role assignment, the account must be granted the Organization Management permission,
- Organizations Configuration role. To manage role assignments,
- View-Only Configuration role. To obtain the necessary organization configuration parameters,
- View-Only Recipients role. To view mailbox recipients (required for job creation),
- MailboxSearch or MailRecipients. To backup groups,
- Global Administrator role, or the SharePoint Administrator role. To connect to the Microsoft SharePoint organization,
- This account may optionally use modern authentication including app ID, client secret and app password, and
- Or this account may optionally use modern application authentication which will automatically configure the proper roles needed to connect to the service;
- Procuring, implementing, and configuring of the correct licensed versions of Microsoft 365;
- Procuring, implementing, and configuring an appropriate method of payment against the customer's Azure subscription to support any additional costs incurred by accessing data through Microsoft Graph API calls. Microsoft Teams channel chat data will include an additional charge imposed and collected by Microsoft. For more information, please review our Success Center article available at https://success.1111systems.com/article/KcGTRO;
- Ensuring the functionality of Microsoft 365 services and contacting Microsoft, or the Microsoft 365 reseller, for any type of support related to the Microsoft 365 service as the Provider is not responsible for this service including, but not limited to, performance, malfunction, or downtime;
- During initial setup, informing the Provider if Teams channel chats are required to be backed up, as those are not backed up by default;
- During initial setup, informing the Provider about the retention policy, and, when applicable, immutability;
- Utilizing its own Microsoft 365 credentials, with the appropriate administration and impersonation permissions, to access the organization's data backups via the Veeam Explorer applications through Veeam Cloud Connect. This account shall use modern application authentication;
- Configuring and performing self-service recovery tasks based on the recovery options listed by the Provider;
- Promptly notifying the Provider if the Microsoft 365 service has been hacked, accessed by a person lacking permission to access the Microsoft 365 and/or the Microsoft 365 cloud backups stored at the Provider's site, or infected with a virus, worm or similar code;
- Informing the Provider when a retention policy change needs to be made, except when immutability is present, since retention period and immutability period are the same, and cannot be changed once set;
- Unless immutability is present, removing specific user accounts from backups and purging the user accounts from the Provider’s infrastructure, so that the licenses associated with such deleted accounts can be revoked and potentially reassigned in order for the Customer to avoid incurring Burst charges for the then-current month. The Customer shall reduce license count prior to the end of the month or the Customer will be responsible for any applicable Burst Resource charges incurred for the then-current month;
- Sorting specific user accounts into inclusion or exclusion groups as appropriate to manage licenses and prevent exceeding the contracted license count;
- Monitoring daily service summary e-mails which may include information about backup job failures;
- Rectifying any job failures related to something outside of the Providers control, which shall include, but not be limited to, credentials issues for accessing Microsoft 365. The Customer may contact the Provider for assistance in rectifying backup job failures; and
- Updating existing backup job(s) or creating new ones subsequent to the initial setup.
- Risks.
- Redundant Backups. If the Customer is running multiple backups of their Microsoft 365 environment, either on-prem or with another cloud provider, the Customer acknowledges that there could be performance and/or data loss situations. These situations arise due to connectivity restrictions and rate limiting throttling that is set outside of the Provider’s control.
- Immutability.
- This service feature is only available for service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”;
- By configuring immutability on backup jobs, data stored by such jobs won't be susceptible to alteration or deletion by neither the Customer nor the Provider during its retention period. The exception would be applicable only when the Customer wishes to stop consuming the services under this Section 3.18, by cancelling the corresponding Order, resulting in the removal of the entire Customer data associated to these services;
- Immutability is optional and shall be configured during the initial setup as requested by the Customer. Immutability shall only be applicable to secondary copies;
- The immutability period is determined by the retention period, which is linked to the retention period. Once it is set, it cannot be changed, or removed;
- Unlimited retention for data that has been configured to be immutable is not supported; and
- The ability to delete and purge users or data when immutability is present is not supported as it defeats the purpose.
- Resources.
- 11:11 Cloud Object Storage. The terms and conditions of this Section 3.19
are applicable to each Order that includes 11:11 Cloud Object Storage services.
- Resources.
- Storage, bandwidth, operations, and fees on objects. The Cloud Resources that comprise the Cloud Object Storage service include shared storage along with embedded unlimited incoming and outgoing network bandwidth and unlimited operations on objects as described in the Order but shall be subject to Sections 3.19.5 and 3.19.6 below. Storage is represented in gibibytes (GiB), defined by the International Electrotechnical Commission (IEC) where 1 GiB is 2^30 bytes. Other representations may be found in different systems but shall refer to the same base2 unit, for example binary gigabytes (GB). Similarly, 1 TiB is 2^40 bytes, i.e. 1024 GiB; and
- Business Model. Object Storage is available in a Reserved model, except for service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1” where the model is Reserved plus Burst for the Standard Infrequent Access class plus a burst component on all non-contracted usage for operation costs and non-reserved storage classes.
- Provider’s Obligations.
- Providing Cloud Storage and network bandwidth at Target Site as per specifications detailed in the Order;
- Maintaining Target Site Cloud Storage infrastructure including patching, upgrades and updates;
- Creating Cloud Resources as per specifications detailed in the Order;
- Providing Customer the initial URL and Object Storage Access Credentials to access the Customer’s Cloud Resources upon completion of the Order;
- Providing storage modification options to the Order as required by the Customer;
- Providing an industry-standard method of protecting, either through replication or erasure coding, of Customer data uploaded to the Provider's Cloud Object Storage at the Data Center described by the Order. For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, data stored in any S3 storage class, except for the S3 One Zone Infrequent Access class, is always stored across a minimum of three Availability Zones; and
- Non-Contracted burst charges. For service subscription item Numbers and/or Data Centers identified in the Order with the reference “PC1”, Non-Contracted burst charges are based on AWS’ then current rates and are subject to change. Rate changes take effect on the 1st day of the calendar month in which the change was made. These charges will be reflected on your invoice as BLEND and/or DT (Data Transfer) burst costs.
- Customer’s Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Management and creation of all data stored and consumed on the Provider’s Cloud Object Storage;
- Consuming only the resources reserved as described in the Order;
- Verifying and adhering to all S3-compatibility requirements for all third-party applications or client software used to connect, store and consume the Customer's data on the Provider’s Cloud Object Storage;
- Installation, version control, patching and updates on all third-party applications or client software used to connect, store and consume the Customer's data on the Provider’s Cloud Object Storage;
- Creating and managing of all subsequent security rights, access controls, S3-credentials and retention policies for the Customer's data stored and consumed on the Provider’s Cloud Object Storage once the Customer has been provided initial URL and Object Storage Access Credentials from the Provider. For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, the Customer can request additional credentials to be generated by the Provider's Support team;
- Performance response of any and all third-party applications used to connect, store and consume the Customer's data on the Provider's Cloud Object Storage;
- Tracking and maintaining all Object Storage Access Credentials used to store and consume the Customer's data on the Provider’s Cloud Object Storage;
- Encrypt and maintain encryption keys for any data uploaded to the Provider’s Cloud Object Storage; and
- If available, understanding the implications that enabling immutability and data versioning might impact the total consumed storage.
- Service Support.
- Storage Encryption. All Cloud Object Storage support for clients is provided as “best effort” as there are many clients that all implement Object Storage functionality in different ways. The Provider can demonstrate functionality with known clients, but individual implementations may vary.
- Data Egress.
- Data egress, from an acceptable use policy perspective, is comprised of two components: Data Retrieval API calls and Data Transfer out to the Internet;
- For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1” and S3 Standard Infrequent Access class, data egress charges are included if usage patterns are deemed reasonable for the service offering. Reasonable data egress shall mean allowed egress of up to 50% of the highest of contracted or total stored data, measured in GB per month per region, within the Customer account;
- If the Provider determines (in its sole discretion) that the Customer has exceeded the reasonable usage of data egress, the Provider will (1) notify the Customer of such usage and (2) advise the Customer to upgrade its Order to reflect the additional usage. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to charge for any data egress exceeding the reasonable data egress standard above. The Customer agrees to pay any invoices or charges for any additional data egress allowed under this Section; and
- For all other S3 storage classes, data egress usage shall be charged at the current rate found in the Provider’s Account Management Application.
- API Requests.
- For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, some API requests charges are included in the 11:11 Object Storage service if usage patterns are deemed reasonable for the service offering. These thresholds would use the highest of contracted or total S3 Standard Infrequent Access class storage usage as the determining factor;
- Exclusively for S3 Standard Infrequent Access class, reasonable API requests shall mean the
following:
- PUT/COPY/POST/LIST requests <= 1,100 per GB per month per region, and
- GET/SELECT requests <= 300 per GB per month per region;
- Exclusively for S3 Standard class, reasonable API requests shall mean the following:
- PUT/COPY/POST/LIST requests <= 2,200 per GB per month per region;
- If the Provider determines (in its sole discretion) that the Customer has exceeded the reasonable usage of API requests, the Provider will (1) notify the Customer of such usage and (2) advise the Customer to upgrade its Order in to reflect the additional usage. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to charge for any API requests usage exceeding the predefined limits defined above. The Customer agrees to pay any invoices or charges for any additional API requests allowed under this Section; and
- For all other request types and/or S3 storage classes, API requests usage shall be charged at the current rate found in the Provider’s Account Management Application.
- Minimum Object Size.
- For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, S3 Standard Infrequent Access, S3 One Zone Infrequent Access, and Glacier Instant Retrieval classes have a minimum billable object size of 128 KB. Smaller objects may be stored but will be considered as 128 KB of storage at the appropriate small object storage class rate. Small objects under the S3 Standard Infrequent Access class, will be tracked as part of the contracted quota, although they won’t contribute to the API Requests or Data Egress thresholds defined above.
- Data Retention.
- For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, S3 Standard Infrequent Access and S3 One Zone Infrequent Access classes shall be charged for a minimum storage duration of 30 days. Objects that are deleted, overwritten, or transitioned to a different storage class before 30 days will incur the normal storage usage charge plus a pro-rated charge for the remainder of the 30-day minimum, and they will be tracked as part of the contracted quota, although they won’t contribute to the API Requests or Data Egress thresholds defined above.
- Service operations.
- For service subscription Item Numbers and/or Data Centers identified in the Order with the reference “PC1”, permissions to modify resources shall be limited to s3:*, except for s3:CreateBucket, which is restricted to the region where the service subscription has been procured. All other AWS operations are restricted.
- Resources.
- Veeam Licensing. The terms and conditions of this Section 3.20 are
applicable to each Order that includes Veeam Licensing.
- Resources.
- License Key. A digital key that defines the scope of the license, terms and options for
Agent, Backup & Replication Edition, Veeam Backup for Microsoft 365, Veeam Recovery
Orchestrator, or Veeam ONE rental licenses as described in the Order. The license unit options
are:
- VM. A protected Virtual Machine that is backed up, replicated, copied or otherwise consumed by the software,
- Server. A physical or virtual host, that contains an application or applications that serves one or more client workstations, where the software is installed. Each node of a clustered setup needs to be licensed separately,
- Workstation. A physical or virtual host, typically used as a personal computer, where the software is installed. Each node of the clustered setup needs to be licensed separately,
- Unstructured data. Unstructured data backup, typically NAS, File to Tape or Object Storage data is licensed in increments of 500GB. Each 500GB of data protected requires one Unstructured Data license,
- Plug-ins for Enterprise Applications. An enterprise application as defined by and supported by Veeam Plug-ins. Typically additional integration with enterprise applications like database applications. Each Application Server must be licensed separately,
- Public Cloud Workloads. Backup for supported public cloud Virtual Machine, Database and File Server workloads. Each workload must be licensed separately,
- Veeam ONE. Monitored workloads including Veeam Backup and Replication and VMware vSphere virtual infrastructure. Each monitored workload must be licensed separately,
- Veeam Backup for Microsoft 365. A protected Microsoft 365 user that has one or more of its Exchange Online, OneDrive, SharePoint or Teams resources backed up, or
- Veeam Recovery Orchestrator. A Virtual Machine that is protected by and forms part of a Veeam Recovery Orchestrator recovery plan.
- License Key. A digital key that defines the scope of the license, terms and options for
Agent, Backup & Replication Edition, Veeam Backup for Microsoft 365, Veeam Recovery
Orchestrator, or Veeam ONE rental licenses as described in the Order. The license unit options
are:
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Creating and deleting the corresponding Veeam Cloud Connect Tenant(s) that links the license key(s) to specific Customer(s);
- Provide the security credentials to the Customer for pairing with the Provider’s cloud infrastructure for delivery of the license key(s);
- Procuring the license key(s) associated to the Veeam products as described in the Order;
- Maintaining the cloud infrastructure needed to deliver the Veeam licenses to the Customer; and
- Troubleshooting and Supporting issues related to both the procured Veeam license and the corresponding Veeam software using it. Provider shall not troubleshoot or support issues related to other licenses not procured by the Provider, including, but not limited to, Evaluation, "Not for Resale", Free, and Community Licenses.
- Customer’s Obligations. The Customer is responsible for the following in accordance
with industry best practices:
- Verifying the system requirements for both hardware and software compatible with Veeam's compatibility matrix available at www.veeam.com;
- Installing and updating the Veeam software on the corresponding workstations, servers, or Virtual Machines;
- Pairing the Veeam Agent(s), Backup & Replication server(s), Veeam ONE, Veeam Backup for Microsoft 365, and/or Veeam Recovery orchestrator Servers to the Provider in order to receive and maintain the license key(s);
- Managing and monitoring any alarms, reports, audits, and logs generated by the Veeam software and its configuration;
- Providing the information to the Provider necessary for troubleshooting the Veeam license and the corresponding Veeam software using it; and
- Except for Evaluation, "Not for Resale", Free, and Community Licenses, adhering to Veeam's End User License Agreement (EULA) found at https://www.veeam.com/eula.html
- Resources.
- 11:11 Autopilot Managed Recovery for DRaaS. The terms and conditions of this
Section 3.21 are applicable to each Order that includes 11:11 Autopilot Managed Recovery for DRaaS in
combination with 11:11 Secure DRaaS.
- Assets & Deliverables.
- Connectivity Design Documentation. Technical documents and/or diagrams providing engineering level information and configuration details for the purpose of interconnecting the Customer's Primary Site(s) to the designated Provider's Recovery Site(s) delivering the DRaaS service capabilities;
- On-boarding Project Plan A documented detailed overview of all tasks associated with the Provider on-boarding process for interconnectivity and delivery of the services protecting Workloads replicated from the Customer's Primary Site(s) Workloads within scope of the mutually agreed upon service contract. The purpose of this document is to track ownership, progress and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider;
- On-boarding Provisioning Form. A detailed discovery document used for information gathering and collection of all Customer specific technical and infrastructure related information for the sole purpose of the Provider providing the onboarding service, integration, and management services to the Customer as part of the Secure DRaaS service contract;
- Recovery Action Plan. A disaster recovery process document providing enhanced details for all steps and tasks required for proper failover or failback of the Customer's replicated Workloads to the designated Provider's Recovery Site(s). Additional details include task ownership, estimated/actual task duration times, and Customer's specific and managed application acceptance criteria testing processes. This document is developed and managed in collaboration between the Customer and the Provider; and
- Recovery Service Guide. A process document providing a business level view of the DRaaS solution. Key content includes general service description, service capabilities, the Customer's Primary Site(s) and the designated Provider's Recovery Site(s) location information, recoverable application service catalog, protected workload inventories, and failover process overview with key metrics (RTO / RPO).
- On-boarding Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager each who will serve as the primary contact point; and
- On-boarding Project Management Engagement. The Provider's project manager and the Customer's project manager shall meet as required for the duration of the on-boarding process for the purpose of facilitating a successful relationship and overseeing the implementation of all Cloud Resources and services outlined in the Order and the On-boarding Provisioning Form, including but not limited to, (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the onboarding of the Cloud Resources and services, (c) Weekly status reports to review the Provider’s performance in execution of the on-boarding project for delivery of all Cloud Resources and services, (d) coordinating and planning for any new equipment or software acquisitions specific to supporting the completion of on-boarding all Cloud Resources and services.
- On-Boarding Acceptance Test.
- The On-Boarding Acceptance Test consists of non-service impacting Failover Test operation performed by Provider, as well as Application Testing and Verification performed by Customer. Fully committed Failover and Failback are not supported. The Test does not include modification of Primary Site resources including Virtual Machines and networking;
- The On-Boarding Acceptance Test is performed during the Provider’s normal business hours of Monday-Friday 8:00 am – 5:00 pm with the time zone being based on data center location where services are located;
- Onboarding Acceptance Test Scheduling. Upon completion of the on-boarding project tasks required for implementing the Cloud Resources within the scope identified in the Onboarding Provisioning Form, the Customer will be notified and will have fourteen (14) days from the day of notice in which to schedule a final On-Boarding Acceptance Test;
- On-Boarding Acceptance Test Success Criteria. Successful completion of the On-boarding Acceptance Test shall be determined by validation of the Provider’s ability to meet the RTO agreed during the planning phase of the onboarding project. The Target Objectives will be documented in the Recovery Action Plan and Recovery Service Guide. In the event that the On-Boarding Acceptance Test exceeds the RTO agreed in the planning phase, the Customer agrees to provide the Provider with any data or information reasonably requested by the Provider in order to enable the Provider to diagnose and resolve any problems associated with any failure to meet that RTO in the On-Boarding Acceptance Testing. The Provider project manager will notify the Customer via email or phone upon resolution of any such issues. After the Provider has notified the Customer that the problem has been resolved, the Customer and the Provider will promptly conduct a follow-up On-Boarding Acceptance Test to validate that the RTO with such follow-up test no longer exceeds the RTO provided in the original the On-Boarding Acceptance Test. This process will continue, if necessary, until the On-Boarding Acceptance Test Criteria meets the required success criteria. Notwithstanding anything to the contrary in this Service Schedule, if the Customer fails to respond to the On-Boarding Acceptance Test reschedule notice within fourteen (14) days of the date of notification, then the Provider shall consider the on-boarding completed and will have no further obligations to the Customer in regard to the On-Boarding Acceptance Test. Under these circumstances in which the Provider deems on-boarding completion due to failure of response by the Customer, the Customer shall reserve the right to exercise unlimited self-service testing or the allocated (2) Recovery Test per 12-months as outlined in Section 1.5 of the Autopilot Managed Recovery for DRaaS SLA for completion of the On-Boarding Acceptance Testing; and
- On-boarding Acceptance Test Failure. Failure of the Onboarding Acceptance Testing shall be defined as the inability for the Provider to meet the RTO SLA target objectives as outlined in Section 1.2.1 of the Autopilot Managed Recovery for DRaaS SLA. The Customer agrees to provide the Provider with any data or information reasonably requested by the Provider in order to enable the Provider to diagnose and resolve any problems associated with a failure in the On-boarding Acceptance Testing. The Provider project manager will notify the Customer via email or phone upon resolution of any such issues. After the Provider has notified the Customer that the problem has been resolved, the Customer and the Provider will promptly conduct a follow-up On-boarding Acceptance Test to validate that all test criteria associated with the On-boarding Acceptance Test have now been met. This process will continue, if necessary, until the On-boarding Acceptance Test Criteria meets the required success criteria. Notwithstanding anything to the contrary in this Service Schedule, if the Customer fails to respond to the On-boarding Acceptance Test reschedule notice within fourteen (14) days of the date of notification, then the Provider shall consider the on-boarding completed and will have no further obligations to the Customer in regard to the On-boarding Acceptance Test. Under these circumstances in which the Provider deems on-boarding completion due to failure of response by the Customer, the Customer shall reserve the right to exercise unlimited self-service testing, where self service is available, or the allocated (2) Recovery Test per 12-months as outlined in Section 1.5 of the Autopilot Managed Recovery for DRaaS SLA for completion of the Onboarding Acceptance Testing.
- Service Delivery Management.
- Service Delivery Management Contacts. The Customer shall appoint an individual who will serve as the primary contact point for the Provider in connection with ongoing lifecycle management and delivery of the services (the “Customer Primary Contact”), and the Provider shall appoint a project manager (the “Enterprise Solutions Manager”); and
- Service Delivery Management Engagement. The Provider and the appointed Customer's project contact shall meet as required during the term of each service for the purpose of facilitating a successful relationship and overseeing the delivery and performance of each service, including but not limited to, (a) tracking the progress of the on-boarding and implementation process and all associated tasks, (b) reviewing other current or future projects or business plans that may impact all services and/or delivery of all services, (c) reviewing the Provider’s performance in the delivery of the service levels set forth in the Service Level Agreement, (d) coordinating and planning for any new equipment or software acquisitions or needs, (e) reviewing strategic and tactical decisions for the Customer in respect of the establishment, budgeting and implementation of the Customer’s priorities and plans for information technology that may impact services and/or delivery of all services, (f) monitoring and resolving concerns that may arise regarding the provision of all services, this SLA and/or the Service Schedule;
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best-practices:
- Providing enhanced onboarding project management deliverables, to include:
- Weekly status call between the Provider on-boarding personnel and applicable Customer's contacts, and
- Weekly status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing and managing all supporting Service documentation to include:
- Documented inventory and workload specifications (e.g. compute, storage, networking) of all Workloads within scope of the Order,
- Documented L2/L3 network design for compatibility and integration between the Customer Primary Site(s) and 11:11 Secure DRaaS networking services and design guidelines, and
- Documented Customer network security configurations, including firewall security policies, NAT policies and network security segmentation design;
- Providing full installation, configuration and ongoing management of all services components
required for delivery of 11:11 Secure DRaaS, to include;
- Replication software installation, setup and configuration both in the Customer's premises and the Provider’s cloud data center environments (where applicable),
- Setup and configuration of VPN connections (where applicable),
- Setup and configuration of all the Provider's side networking components support dedicated circuits for WAN connectivity (where applicable), and
- Setup & configuration of any cross-connects to support networking connectivity in accordance with Section 3.14 of this Service Schedule;
- Providing full setup and configuration for replication of the Recovery Groups for all Workloads within scope and applicable to the Order and the Onboarding Provisioning Form;
- Providing full assistance with development and creation of the Customer’s Disaster Recovery Runbook(s) within the 11:11 Cloud Console (where applicable);
- Providing full assistance with development and creation of the Customer’s Recovery Activation Plan;
- Providing managed failover testing and live failover/fallback declaration events. Managed failback operations are only provided for live declaration events when required;
- Providing a completed Recovery Service Guide at the completion of the on-boarding process and manage all ongoing updates;
- Fulfilling Customer requests for new Recovery Groups, increased capacity, VPN connections, and other change requests; and
- Providing ongoing updates, patching and maintenance for all the Provider provided service
components required for delivery of the 11:11 Secure DRaaS, to include:
- Replication software, and
- Network virtual appliances sold and provided on the Order.
- Providing enhanced onboarding project management deliverables, to include:
- Customer’s Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Autopilot Managed Recovery for DRaaS and industry best-practices:
- Ensure all Customer-owned software, applications, devices, systems, processes, and services that maintain Customer Data to be protected by the services delivered as part of this Agreement are covered as specified under Section 2.3.5 of this Service Schedule for the purposes of fulfilling this Agreement;
- Where applicable, the Customer shall maintain all firmware or software updates to all Customer-owned hardware, software, applications, devices, and systems in use with or protected by Cloud Resources provided by the Provider;
- Where applicable, contact all software, application, device, system, service, and service providers covered under this Agreement and add the appropriate Provider’s personnel as approved contacts for the purposes of fulfilling this Service Schedule;
- Complete the On-boarding Provisioning Form provided by the Provider;
- Provide all current and existing documentation of the Customer Primary Site(s) to include; environment “as-built” documentation, application contact information, application dependencies, current backup strategy, and disaster recovery plans if applicable;
- Provide the Provider’s personnel with the Customer's asset discovery and documentation where applicable;
- Where applicable; provide all current process documentation in support of the services outlined in this Agreement and provide all assistance necessary to modify existing or implement new processes to streamline the delivery of services;
- Where applicable, the Customer shall maintain all software and other devices or items provided to the Customer by the Provider located within the Customer's Primary Site(s) in direct support of the delivery of Cloud Resources outlined in the Order (the “Equipment’) in good working order and in accordance with applicable manufacturers’ specifications. The Customer shall notify the Provider immediately upon determination that any Equipment is not in compliance with the foregoing, or is in material breach of the terms and conditions set forth in this Service Schedule; and
- The Customer shall cooperate with the Provider with regard to the performance of the Provider’s
obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to the Customer’s Equipment, as may be reasonable to permit Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the services.
- Service Levels. All applicable SLAs are defined in the Autopilot Managed Recovery for DRaaS Service Level Agreement.
- Assets & Deliverables.
- 11:11 Network Support. The terms and conditions of this Section 3.22 are applicable to
each Order that includes both the Provider’s Network Support and at least one of the Providers services that are
identified in Section 3.1, Section 3.2, Section 3.8, Section 3.9, Section 3.10, and Section 3.11 of this
Schedule, regardless as to whether the Order is for public or private cloud services.
- Assets & Deliverables.
- On-boarding Provisioning Form. A documented overview of the network details associated with the Provider’s network on-boarding process for delivery of the Network Support within scope of the mutually agreed upon SOW. The purpose of this document is to document applicable on-boarding network details in collaboration between the Customer and the Provider; and
- Network Diagram. Technical diagrams providing engineering level information and configuration details for the purpose of detailing network connectivity within the Provider Site(s) delivering the service capabilities to the Customer within scope of the mutually agreed upon SOW.
- Provider’s Obligations. The Provider is responsible for the following in accordance with industry
best-practices:
- Providing and managing all supporting service documentation to include:
- Documented L2/L3 network details within the Provider’s networking services and design guidelines;
- Providing full installation and configuration of virtual network components, as described in the
Network Support components on the Order, to include:
- Setup, licensing and configuration of virtual network device(s), and
- Setup, licensing and configuration is limited to no more than 5 hours in aggregate to plan, implement and test; and
- Ongoing support of virtual network components, as described in the Order, to include technical support as initiated by the Customer for routine configuration changes and basic troubleshooting activities; and
- Individual support activities which take the Provider more than two hours to plan and execute are out of scope for this service and are considered projects. Project work will require a separate SOW and may result in additional fees.
- Providing and managing all supporting service documentation to include:
- Customer’s Obligations. The Customer is responsible for the following in accordance with
Provider’s delivery of the 11:11 Network Support and industry best-practices:
- The Customer shall complete the On-boarding Provisioning Form provided by the Provider;
- The Customer shall cooperate with the Provider with regard to the performance of the Provider’s
obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to the Customer’s Equipment and/or Workloads, as may be reasonable to permit the Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the 11:11 Network Support; and
- The Customer shall sign a confirmation that it accepts the potential risks for any Customer requests that fall outside of industry and security best-practices.
- Service Levels.
- The Provider shall use commercially reasonable efforts to make sure that the Technical Ticket Response Management process adheres to the Targets set out in the current Service Level Agreement accessible at https://www.1111systems.com/legal/sla.
- Assets & Deliverables.
- 11:11 Backup Deployment. The terms and conditions of this Section 3.23 are
applicable to each Order that includes the Provider’s Backup Deployment Service in combination with 11:11 Cloud
Backup for Veeam Cloud Connect.
- Assets & Deliverables.
- Statement of Work. Overall project document defining the terms of the engagement, steps and expected outcomes with sign-off by the Customer;
- Kick-off Call. Initial project call for introductions, defining timeframes and ensuring project alignment from Provider and Customer;
- Onboarding Provisioning Form. Documentation of existing environment including list of servers, VMs and backup jobs;
- Backup Deployment Service Guide. As-built documentation provided at the end of the engagement describing the architecture and environment that has been designed and deployed on the Customer site by the Provider; and
- Sign-off document validating knowledge transfer. Sign-off documentation validating that the Customer has received adequate instruction and education on the Provider-built environment.
- Backup Deployment Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager each who will serve as the primary contact point; and
- Backup Deployment Project Management Engagement. The Provider’s project manager and the Customer’s project manager shall meet as required for the duration of the migration process for the purposes of facilitating a successful relationship and overseeing the implementation of all tasks outlined in the Statement of Work, including but not limited to, (a) tracking the progress of the implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the Backup Deployment Service, (c) reviewing weekly status reports in order to review the Provider’s performance in execution of the project for delivery of all Backup Deployment Service, (d) coordinating and planning for any new equipment or software acquisitions specific to supporting the completion of the Backup Deployment Service.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best-practices:
- Providing enhanced onboarding project management deliverables, to include:
- Statement of Work documentation at the beginning of the project,
- Kick-off call between the Provider’s deployment personnel and the applicable Customer’s contacts, and
- Backup Deployment Service guide at the end of the engagement to the applicable Customer's contacts;
- Providing and managing supporting service documentation to include the Onboarding Provisioning Form detailing inventory and job specifications of all Workloads to be protected within scope of the Order;
- Providing installation, configuration and management of all services components required for the
Backup Deployment Service, to include:
- Backup software installation, guiding the Customer through setup and configuration both in the Customer on-premises and to the Provider’s cloud data center environments,
- Setup and configuration of backup jobs and schedules, and
- Setup and configuration of all Provider’s side software components to support Customer's backup jobs.
- Providing enhanced onboarding project management deliverables, to include:
- Customer’s Obligations. The Customer is responsible for the following in accordance
with this Section 3.23 and industry best-practices:
- Ensuring that all required assets and services are obtained, and, where applicable, installed on the Customer’s environment that are needed as part of the Order to include software, licenses, operating systems, bandwidth, hardware, storage, etc.;
- Ensuring that all required assets and services are deployed and configured in accordance with the applicable manufacturers' specifications and supportability requirements;
- Providing and managing supporting service documentation to include the Onboarding Provisioning Form detailing inventory and job specifications of all Workloads to be protected within scope of the Order;
- Ensuring all Customer-owned software, applications, devices, systems, processes, and services that maintain the Customer’s data to be protected as part of the Order are documented as part of the Onboarding Provisioning Form;
- Providing all current and existing documentation of the Customer’s Site(s) to include; environment “as-built” documentation, application contact information, application dependencies, current backup strategy, and disaster recovery plans if applicable;
- Providing the Provider’s personnel with Customer’s asset discovery and documentation where applicable;
- Where applicable, maintaining all software and other devices or items provided to the Customer by the Provider located within the Customer’s Site(s) in direct support of the delivery of the Backup Deployment Service outlined in the Order (the “Equipment’) in good working order and in accordance with applicable manufacturers’ specifications. The Customer shall notify the Provider immediately upon determination that any Equipment is not in compliance with the foregoing, or is in material breach of the terms and conditions set forth in this Service Schedule; and
- Cooperating with the Provider with regard to the performance of the Provider’s obligations
hereunder, including (without limitation):
- Providing the Provider with the required remote access to Customer’s Equipment, as may be reasonable to permit the Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the Backup Deployment Service.
- Assets & Deliverables.
- 11:11 DRaaS Deployment. The terms and conditions of this Section 3.24 are
applicable to each
Order that includes 11:11 DRaaS Deployment in combination with 11:11 Secure DRaaS.
- Assets & Deliverables.
- Connectivity Design Documentation. Technical documents and/or diagrams providing engineering level information and configuration details for the purpose of interconnecting the Customer’s Primary Site(s) to the designated Provider’s Recovery Site(s) delivering the DRaaS service capabilities;
- On-boarding Project Plan. A documented detailed overview of all tasks associated with the Provider on-boarding process for interconnectivity and delivery of the services protecting Workloads replicated from the Customer’s Primary Site(s) Workloads within scope of the mutually agreed upon service contract. The purpose of this document is to track ownership, progress and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider;
- On-boarding Provisioning Form. A detail discovery document used for information gathering and collection of all Customer specific technical and infrastructure related information for the sole purpose of the Provider providing the onboarding service, integration, and management services to the Customer as part of the Secure DRaaS service contract;
- Recovery Action Plan. The initial disaster recovery process document developed between the Customer and the Provider which provides enhanced details for all steps and tasks required for proper failover or failback of the Customer’s replicated Workloads to the designated Provider’s Recovery Site(s). The Customer will own any changes after the initial development of the document; and
- Recovery Service Guide. A process document providing a business level view of the DRaaS solution. Key content includes general service description, service capabilities, the Customer’s Primary Site(s) and the designated Provider’s Recovery Site(s) location information, recoverable application service catalog, protected workload inventories, and failover process overview with key metrics (RTO / RPO).
- On-boarding Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager each who will serve as the primary contact point; and
- On-boarding Project Management Engagement. The Provider’s project manager and the Customer’s project manager shall meet as required for the duration of the on-boarding process for the purpose of facilitating a successful relationship and overseeing the implementation of all Cloud Resources and services outlined in the Order and the On-boarding Provisioning Form, including but not limited to, (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the onboarding of the Cloud Resources and services, (c) Weekly status reports to review the Provider’s performance in execution of the on-boarding project for delivery of all Cloud Resources and services, (d) coordinating and planning for any new equipment or software acquisitions specific to supporting the completion of on-boarding all Cloud Resources and services.
- On-boarding Acceptance Test.
- The On-Boarding Acceptance Test consists of non-service impacting Failover Test operation performed by Provider, as well as Application Testing and Verification performed by Customer. Fully committed Failover and Failback are not supported. The Test does not include modification of Primary Site resources including Virtual Machines and networking;
- The On-Boarding Acceptance Test is performed during the Provider’s normal business hours of Monday-Friday 8:00 am – 5:00 pm with the time zone being based on data center location where services are located;
- On-Boarding Acceptance Test Scheduling. Upon completion of the on-boarding project tasks required for implementing the Cloud Resources within the scope identified in the Onboarding Provisioning Form, the Customer will be notified and will have fourteen (14) days from the day of notice in which to schedule a final On-Boarding Acceptance Test;
- On-Boarding Acceptance Test Success Criteria. Successful completion of the On-boarding Acceptance Test shall be determined by validation of the Provider’s ability to meet the RTO agreed during the planning phase of the onboarding project. The Target Objectives will be documented in Recovery Action Plan and Recovery Service Guide; and
- In the event that the On-Boarding Acceptance Test does not meet the RTO agreed in the planning phase, the Customer agrees to provide the Provider with any data or information reasonably requested by the Provider in order to enable the Provider to diagnose and resolve any problems associated with any failure to meet that RTO in the On-Boarding Acceptance Testing. The Provider project manager will notify the Customer via email or phone upon resolution of any such issues. After the Provider has notified the Customer that the problem has been resolved, the Customer and the Provider will promptly conduct a follow-up On-Boarding Acceptance Test to validate that the RTO associated with the On-Boarding Acceptance Test have now been met. This process will continue, if necessary, until the On-Boarding Acceptance Test Criteria meets the required success criteria. Notwithstanding anything to the contrary in this Service Schedule, if the Customer fails to respond to the On-Boarding Acceptance Test reschedule notice within fourteen (14) days of the date of notification, then the Provider shall consider the on-boarding completed and will have no further obligations to the Customer in regard to the On-Boarding Acceptance Test.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best-practices:
- Providing enhanced onboarding project management deliverables, to include:
- Weekly status call between the Provider on-boarding personnel and applicable Customer’s contacts, and
- Weekly status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing all supporting Service documentation to include:
- Documented inventory and workload specifications (e.g. compute, storage, networking) of all Workloads within scope of the Order,
- Documented L2/L3 network design for compatibility and integration between the Customer Primary Site(s) and 11:11 Secure DRaaS networking services and design guidelines, and
- Documented Customer network security configurations, including firewall security policies, NAT policies and network security segmentation design;
- Providing full installation and configuration of all services components required for delivery
of 11:11 Secure DRaaS, to include:
- Replication software installation, setup and configuration both in the Customer’s premises and the Provider’s cloud data center environments,
- Setup and configuration of VPN connections (where applicable),
- Setup and configuration of all the Provider’s side networking components support dedicated circuits for WAN connectivity (where applicable), and
- Setup & configuration of any cross-connects to support networking connectivity in accordance with Section 3.14 of this Service Schedule;
- Providing full setup and configuration for replication of the Recovery Groups for all Workloads within scope and applicable to the Order and the Onboarding Provisioning Form;
- Providing full assistance with development and creation of the Customer’s Disaster Recovery Runbook(s) within the 11:11 Cloud Console;
- Providing full assistance with development and creation of the Customer’s Recovery Activation Plan;
- Providing the initial managed failover test; and
- Providing a completed Recovery Service Guide at the completion of the on-boarding process.
- Providing enhanced onboarding project management deliverables, to include:
- Customer Obligations. The Customer is responsible for the following in accordance with
Provider’s delivery of the 11:11 DRaaS Deployment and industry best-practices:
- Ensure all Customer-owned software, applications, devices, systems, processes, and services that maintain Customer Data to be protected by the services delivered as part of this Agreement are covered as specified under Section 2.3.5 of this Service Schedule for the purposes of fulfilling this Agreement;
- Where applicable, the Customer shall maintain all firmware or software updates to all Customer-owned hardware, software, applications, devices, and systems in use with or protected by Cloud Resources provided by the Provider;
- Where applicable, contact all software, application, device, system, service, and service providers covered under this Agreement and add the appropriate Provider’s personnel as approved contacts for the purposes of fulfilling this Service Schedule;
- Complete the On-boarding Provisioning Form provided by the Provider;
- Provide all current and existing documentation of the Customer Primary Site(s) to include; environment “as-built” documentation, application contact information, application dependencies, current backup strategy, and disaster recovery plans if applicable;
- Provide the Provider’s personnel with the Customer’s asset discovery and documentation where applicable;
- Where applicable; provide all current process documentation in support of the services outlined in this Agreement and provide all assistance necessary to modify existing or implement new processes to streamline the delivery of services;
- Where applicable, the Customer shall maintain all software and other devices or items provided to the Customer by the Provider located within the Customer’s Primary Site(s) in direct support of the delivery of Cloud Resources outlined in the Order (the “Equipment’) in good working order and in accordance with applicable manufacturers’ specifications. The Customer shall notify the Provider immediately upon determination that any Equipment is not in compliance with the foregoing, or is in material breach of the terms and conditions set forth in this Service Schedule;
- The Customer shall cooperate with the Provider with regard to the performance of the Provider’s
obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to the Customer’s Equipment, as may be reasonable to permit Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the services;
- Manages and updates to any documentation after the initial handoff of the documentation to the Customer; and
- All other obligations as outlined in Section 3.10.3
- Assets & Deliverables.
- Managed Appliance. The terms and conditions of this Section 3.25 are
applicable to each Order
that includes the Provider’s Managed Appliance Services as described in the Order.
- Service options (applicable only to Managed Firewalls). Either Managed Firewall service
offering can be delivered to physical or virtual firewalls running on premises or cloud infrastructure.
Firewall management service options encompass net new firewall deployments for greenfield environments,
firewall replacement for existing brownfield environments, and management takeover of existing
brownfield environments. Major re-architectures and redesigns, as identified at Provider’s discretion,
are out of scope for Basic and Advanced management service options and would require a separate
Professional Services engagement with Provider.
- Basic. Basic Firewall Management provides basic management of the firewall appliance with basic NOC monitoring and reporting as defined at https://success.1111systems.com/article/0rdysi;
- Advanced. Advanced Firewall Management includes management of the full Unified Threat Protection (UTP) capabilities of the firewall appliance and includes custom advanced monitoring by the NOC; and
- SD-WAN. SD-WAN expands the traditional basic management of the firewall appliance to include configuration and implementation assistance, and device administration when such device(s) is/are part of an SD-WAN architecture. The SD-WAN service definition is further explained in Section 3.36.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Procuring any appliance hardware, licensing, and/or support identified in the Order as Provider-Supplied Equipment;
- Onboarding Managed Device(s) into the Provider’s infrastructure;
- Providing recommended firmware upgrades based on critical Common Vulnerabilities and Exposures (CVEs) ratings, which may not always align with the most recent firmware from the vendor;
- Completing firmware upgrades as deemed appropriate and necessary by the Provider;
- Use best efforts to coordinate all firmware upgrades with the Customer prior to completion of the upgrade;
- Providing commercially reasonable Change Management support such as;
- The Provider will make reasonable attempts to discuss and notify the Customer of any changes prior to making changes to the configuration of the appliance, and
- In the case of an Emergency, where the Provider determines (in its sole discretion) that the security, confidentiality, integrity, or availability of the switch is at risk, changes may be made without prior notification to the Customer in order to attempt to mitigate the risk;
- Maintaining backup configurations after changes are made to the supported appliance to ensure rollback and recovery capability; and
- Supporting Next Business Day (NBD) or Premium 4-hour replacement for the Provider-Supplied Equipment, as specified in the Order. RMA delivery may be impacted by customer location. Provider is not liable for RMA gear delivered late due to delays caused by location constraints and/or shipping and receiving issues;
- For Managed Firewalls.
- As supported by hardware, software, and licensing specified in Order, configuration of zones, rules, objects, NATs, site-to-site VPNs, user access VPNs, routing, and UTM configuration in accordance with Customer’s completed Customer Design Requirements (CDR) form,
- Basic configuration review of NGFWs for high level best practices around zones and rules. This does not include automated rule analysis via tools, or manual line by line review of the entire ruleset, which remains Customer’s obligation in absence of a separated professional services agreement between Customer and Provider,
- Configuring remote access VPN to provide Customer’s end-user access to the internal network requested by Customer in accordance with CDR form. This includes local user setup or Lightweight Directory Access Protocol (LDAP). The Provider will make commercial best efforts to configure VPN client connectivity, however VPN connectivity is subject to a variety of factors, including, but not limited to, local ISP issues, local or home office network issues, and public WiFi port blocking,
- Providing seven (7) days of active log retention from each supported NGFW.
- When the specified seven (7) day log limit is exceeded, the oldest logs shall be overwritten to make room for new logs.
- Destruction of logs upon termination in accordance with the terms of the Agreement; and
- Exclusively for the Advanced Managed Firewall:
- Providing UTM feature configuration and optimization as per the Provider’s then
current Product Compatibility Matrix, including but not limited to:
1. IDS/IPS. Configuring Intrusion Detection and Prevention Services (IDS/IPS) to detect and block traffic patterns that contain malicious threats on Equipment.2. Application Control. Configuring application control to provide detailed visibility into user traffic.3. Web Filtering. Configuring web content filtering to monitor and block websites based on category. - Performing UTM security updates.
- Providing performance & utilization monitoring.
- Providing a monthly activity report.
- Supporting High Availability (HA) deployments.
- Providing a ninety (90) day active log retention.
- Specific to Fortinet firewalls, providing a one (1) year long archive.
- Providing UTM feature configuration and optimization as per the Provider’s then
current Product Compatibility Matrix, including but not limited to:
- For Managed Routers. As supported by hardware, software and licensing specified in Order, configuration support for interfaces, routing, route maps, ACLs, Zone Based Firewall (ZBFW), Dynamic Multipoint VPN (DMVPN), and IPSec VPNs; and
- For Managed Switches. As supported by hardware, software and licensing specified in Order, configuration support for VLANs, access ports, trunks, LACP, vPC, HSRP/VRRP, layer 3 SVIs, VRFs, static routes and dynamic routing.
- Customer’s Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Managed Appliance services and industry best practices:
- Promptly providing all information requested by Provider’s technical team related to existing network policies and configurations associated with the old equipment, if applicable, to ensure a seamless migration process and to minimize any potential conflicts or challenges that may arise during the transition. In the event Customer requires additional assistance or expertise for the actual transfer of rules from the old equipment to the new SD-WAN infrastructure, then Provider is prepared to offer such services as part of a separate paid professional services engagement the terms of which will be mutually agreed to in writing signed by the Parties;
- Providing architectural design for network and applications;
- Installing and cabling the Provider's Equipment at the Customer’s location(s). Upon request, the Provider offers installation services as an add-on, based on availability at the respective location(s);
- For Customer-provided appliances, either physical or virtual, ensuring that the hardware is
supported by the Provider’s then-current Product Compatibility Matrix.
- For Customer-provided Managed Firewalls, either physical or virtual, ensuring that the NGFW(s) is exclusively powered by Fortinet FortiGate or Cisco Firepower and supported by the Provider’s then-current Product Compatibility Matrix;
- For Customer-provided appliances, either physical or virtual, ensuring that up-to-date vendor support is attached to all applicable hardware, software and licensing;
- Providing an approved network diagram;
- Providing access to existing appliance configuration;
- Providing applicable specifications to the Provider to allow for configuration of network interfaces, VLANs, access ports, trunks, LACP, vPC, HSRP/VRRP, layer 3 SVIs, VRFs, static routes and dynamic routing;
- Providing access to the customer’s internal network to allow provider to configure remote access VPN;
- Providing a technical resource for the duration of the implementation project;
- Providing coordination for scheduling necessary maintenance windows to complete the implementation;
- Providing a technical resource to assist in troubleshooting issues for hardware at customer premises as Provider does not provide on-site support for physical appliance;
- Notifying the Provider with Change Management requests;
- For Managed Appliance services in a DR environment where the Provider does not manage the
production environment:
- Adopting strict change management control processes to capture all changes made to production devices,
- Analyzing all changes in production for applicability in the DR environment,
- Translating any changes in production to equivalent changes required on the DR Managed Appliance, including but not limited to, re-mapping of ACLs, NATs, VLANs, etc. as needed if the DR environment employs different public or private IP addressing schemes or VLANs,
- Notifying the Provider with Change Management requests as applicable for the DR environment, and
- Regularly auditing and maintaining ownership of configuration sync between production and DR;
- Notifying the Provider in the event of any major changes that may potentially impact the Managed
appliance service, including, but not limited to:
- Changing Internet service at the location where the appliance resides,
- Changing internal networking scheme,
- Moving the appliance to a different location,
- For Managed Firewalls, significantly increasing the users of SSL VPN (as determined by the Provider at the Provider’s sole discretion),
- For physical appliances only:
- Ensuring proper power is available at the location where the appliance resides.
- Ensuring that the necessary rack space has been allocated.
- Ensuring that proper environmental requirements are met for any new Equipment installations.
- Providing the physical address of the appliance to the Provider.
- For virtual appliances only:
- Providing all vCPU, RAM, and storage resources to host the virtual appliance.
- If deployed on a Customer-managed cluster or cloud environment, Customer is responsible for virtual appliance deployment and providing console access to Provider
- For Managed Firewalls.
- Filling out the Customer Design Requirements (CDR) form in its entirety to capture all firewall configuration requirements, including but not limited to: zones, rules, objects, NATs, site to site VPNs, user access VPNs, routing, and UTM configuration,
- If migrating from a different vendor platform, Customer is responsible for translating existing configuration to populate in the Customer Design Requirements (CDR) form,
- Providing applicable specifications to the Provider to allow for configuring Network Address Translation (NAT) and inbound and outbound stateful firewall rules, and
- Customer is responsible for defining all inbound and outbound rules and VPN configuration and is responsible for following best practices around network segmentation and least-privileged access. Customer is responsible for any security incidents or a breach resulting from unsecured ACLs, public NATs, VPN or any other customer defined configuration; and
- For Managed Routers and Switches. Providing applicable specifications to the Provider to allow for configuration of network interfaces, VLANs, access ports, trunks, LACP, vPC, HSRP/VRRP, layer 3 SVIs, VRFs, static routes and dynamic routing.
- Service options (applicable only to Managed Firewalls). Either Managed Firewall service
offering can be delivered to physical or virtual firewalls running on premises or cloud infrastructure.
Firewall management service options encompass net new firewall deployments for greenfield environments,
firewall replacement for existing brownfield environments, and management takeover of existing
brownfield environments. Major re-architectures and redesigns, as identified at Provider’s discretion,
are out of scope for Basic and Advanced management service options and would require a separate
Professional Services engagement with Provider.
- Managed SIEM (Security Information and Event Management). The terms and
conditions of this Section 3.26 are applicable to each Order that includes Managed SIEM services.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Assisting the Customer in deploying the collector and/or agent on the agreed Customer locations;
- Ensuring that all event sources are properly sending logs to the SIEM;
- Optimizing the data collection and tuning of alerts;
- Creating custom alerting and notifications;
- Log Ingestion:
- Log files will be subjected to automated analysis procedures designed to identify attacks, operational problems, or compromises,
- Anomalies discovered by this process shall be communicated to the Customer, and
- A ticket with a monthly report shall be provided to the Customer summarizing the results of the analysis and any applicable network traffic trends;
- Log File Analysis:
- Log files will be subjected to automated analysis procedures designed to identify attacks, operational problems, or compromises,
- Anomalies discovered by this process shall be communicated to the Customer, and
- A ticket with a monthly report shall be provided to the Customer summarizing the results of the analysis and any applicable network traffic trends; and
- Log Retention:
- Providing a ninety (90) day active log retention. When the specified ninety (90) day limit is exceeded, the oldest logs will be overwritten to make room for new logs,
- Providing a one (1) year archive of log files, and
- Destruction of logs upon termination in accordance with the terms of the Agreement.
- Customer's Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Managed SIEM services and industry best practices:
- Populating Provider provided security questionnaire;
- Providing an approved network diagram and any other information relevant to the security of the environment that will aid the Provider in security monitoring;
- Providing a technical resource for the duration of the implementation project, including, but not limited to, installing and uninstalling the collectors and/or agents, and configuring log sources;
- Providing hardware to collect event logs. In the event that the collector is part of the Customer’s virtual Data Center, providing virtual resources to deploy the collector;
- As needed for certain deployments, providing the Provider with an admin account to pull information from the environment;
- Providing a list of log sources on the Customer’s network;
- Configuring the event sources for log data ingestion based on the Provider’s instructions;
- Notifying the Provider in the event of any changes to the list of log sources or if the network environment changes, including, but not limited to, adding or removing devices; and
- Responding in a timely manner to Provider’s incident escalations and any other issues that arise related to the health of the system or the health of any data sources.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Managed CRS (Continuous Risk Scanning). The terms and conditions of this
Section 3.27 are
applicable to each Order that includes Managed CRS services.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Providing network discovery and asset prioritization;
- Identifying critical vulnerabilities;
- Providing a remediation workflow engine;
- Performing distributed scanning;
- Providing visibility to reporting and scorecards;
- Creating tenant in the Managed Security Portal;
- Setting up Customer’s user(s) in the Managed Security Portal;
- Creating an agent installer and supporting the Customer in the deployment of the scanning agent. Agent support shall be limited to Windows OS;
- If necessary, assisting the Customer in the deployment of the virtual scanning appliance; and
- Setting up the external cloud scanner for external asset scanning.
- Customer's Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Managed CRS services and industry best practices:
- Providing all documented IP space (including subnets);
- Providing any changes to the network;
- Providing an Access Control List (ACL) to allow the Provider’s scanner to reach all devices;
- Maintaining proper access to the network and assets being scanned by the Provider;
- Assisting the Provider in the deployment of the agenda and/or virtual scanner;
- Assisting the Provider in the grouping of assets into business contexts;
- Remediating threats and vulnerabilities; and
- Notifying the Provider in the event of any major changes that could potentially impact the
service, including, but not limited to:
- Changing Internet service at the Customer location,
- Changing internal networking scheme,
- Moving to a different location,
- Removing agents,
- Adding new endpoints, and
- Replacing endpoints.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Managed EDR (Endpoint Detection and Response). The terms and conditions of
this Section 3.28 are applicable to each Order that includes Managed EDR services.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Guiding the Customer in the deployment of the agent(s), which shall be limited to Fortinet FortiEDR or Trend Micro Vision One XDR agents;
- Creating and optimizing the policies and tuning alerts;
- Creating and optimizing the Playbook according to threat data and Customer’s business requirements;
- Analyzing logs and notifying the Customer of suspicious activity or identified threats;
- Creating custom alerting and notifications;
- For Fortinet FortiEDR only, providing a six (6) month log retention;
- When the specified six (6) month log limit is exceeded, the oldest logs shall be overwritten to make room for new logs, and
- Destruction of logs upon termination in accordance with the terms of the Agreement;
- Optionally, for Fortinet FortiEDR only, configuring the following external integrations:
- Custom SIEM target(s), upon Customer’s reasonable request, that are publicly accessible.
- Customer's Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Managed EDR services and industry best practices:
- Providing an approved network diagram;
- Providing a technical resource for the duration of the implementation project;
- Assisting the Provider in deployment of agents on endpoints;
- Ensuring that the endpoints, on which the Fortinet FortiEDR or Trend Micro Vision One XDR agents are deployed, match the specifications as defined in the Provider’s then-current Product Compatibility Matrix;
- Assisting the Provider in the customization of Playbooks and policies during the tuning period and ongoing;
- Providing incident response and remediating threats; and
- Notifying the Provider in the event of any major changes that could potentially impact the
service, including, but not limited to:
- Changing Internet service at the Customer location,
- Changing internal networking scheme,
- Moving to a different location,
- Removing agents,
- Adding new endpoints, and
- Replacing endpoints.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Professional Security Services. The terms and conditions of this Section 3.29
are applicable to each Order that includes Professional Security services.
- Service options.
- Network Architecture Review and Design. This service includes professional services by the Provider’s security professionals to review the Customer’s existing architecture, and design a network solution driven by both security and business objectives;
- Appliance Configuration and Implementation. This service includes professional services by the Provider’s security professionals to configure and optimize the Customer’s Fortinet FortiGate appliance(s), and test the Customer’s Equipment for readiness and quality before deployment. This service is limited to Fortinet products only; and
- Health Check. This service includes professional services by the Provider’s security professionals to perform a detailed review of the Customer’s security solution and identify potential areas of improvement within the scope of the mutually agreed upon SOW.
- Provider’s Obligations. The Provider is responsible for the following in accordance
with commercially reasonable efforts:
- Developing a Statement of Work based on Customer’s provided business objectives and/or goals; and
- Performing duties necessary to deliver the service as defined in the Statement of Work.
- Customer's Obligations. The Customer is responsible for the following in accordance
with Provider’s delivery of the Professional Security services and industry best practices:
- Providing a technical resource for the duration of the engagement;
- Providing an approved network diagram;
- Providing business objectives and/or goals for the engagement;
- Acknowledging that the Provider does not guarantee prevention of security breaches;
- Exclusively for the Appliance Configuration and Implementation service, accurately identifying the Equipment that needs to be replaced and provide the Provider with the current configuration for the Equipment; and
- Exclusively for the Health Check service, providing the Provider with all relevant and necessary details for the Customer’s current security posture and existing system controls.
- Service options.
- Managed Backup for Cohesity. The terms and conditions of this Section 3.30
are applicable to
each Order that includes the Provider's Managed Backup for Cohesity service.
- Resources.
- Storage. The resources that comprise the Managed Backup for Cohesity service include dedicated Equipment that provide storage capacity in pre-determined cluster sizes as specified in the Order;
- Licensing. All required licensing is included in the Managed Backup for Cohesity service as specified in the Order; and
- Business Models. Capacity is available in a reserved business model as specified in the Order.
- Assets & Deliverables. The Provider is responsible for the following in accordance
with commercially reasonable efforts:
- On-Boarding Project Plan. A documented detailed overview of all tasks associated with the Provider on-boarding process defined within scope of the mutually agreed upon Statement of Work. The purpose of this document is to track ownership, progress and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider;
- On-Boarding Provisioning Form. A detailed discovery document used for information gathering and collection of all Customer-specific technical and infrastructure-related information for the sole purpose of the Provider providing the onboarding service, integration, and management services to the Customer;
- Backup Policies. The policies define the managed backup schedule of how often and when to take a backup and the retention timeframe for that backup. The policies also define how often full backups should be taken and how often to retry in the event of backup failure; and
- Backup Groups. Groups define what resources are backed up and assigns the applicable Backup Policy to those resources.
- On-Boarding Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager to serve as the primary contact point; and
- On-Boarding Project Management Engagement. The Provider's project manager and the Customer's project manager shall meet as required for the duration of the on-boarding process for the purpose of facilitating a successful relationship and overseeing the implementation of all backup resources and services outlined in the Order and the On-boarding Provisioning Form, including but not limited to: (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the onboarding of the Equipment and services; (c) weekly status reports to review the Provider’s performance in execution of the on-boarding project for delivery of all Equipment and services; and (d) coordinating and planning for any new Equipment or software acquisitions specific to supporting the completion of on-boarding the Managed Backup for Cohesity service.
- On-Boarding Acceptance Test.
- The On-Boarding Acceptance Test consists of non-service impacting backup recovery test operation performed by the Provider in conjunction with the Customer, as well as data recovery verification performed by the Customer, in each case as defined in the On-Boarding Project Plan;
- The On-Boarding Acceptance Test is performed during the Provider’s normal business hours of Monday-Friday 8:00 am – 5:00 pm with the time zone being based on the location where services are located, excluding any federal or other holidays observed by the Provider in such location;
- On-Boarding Acceptance Test Success Criteria. Successful completion of the On-boarding Acceptance Test shall be determined by validation to recover data either to the original location or an alternative location. Any other target objectives will be documented in the On-Boarding Project Plan. If the On-Boarding Acceptance Test cannot be completed for technical reasons, the Customer will provide the Provider with any data or information reasonably requested by the Provider in order to enable the Provider to diagnose and resolve any problems associated with any failure to recover data during the On-Boarding Acceptance Testing. The Provider project manager will notify the Customer via email or phone upon resolution of any such issues. After the Provider has notified the Customer that the problem has been resolved, the Customer and the Provider will promptly conduct a follow-up On-Boarding Acceptance Test to verify data recovery. This process will continue, if necessary, until the On-Boarding Acceptance Test Criteria meets the required success criteria; and
- Notwithstanding anything to the contrary in this Service Schedule, if the Customer fails to timely participate in the On-Boarding Acceptance Test process as identified in the On-Boarding Project Plan, all of the Provider’s on-boarding obligations will be considered completed and Provider will have no further obligations to the Customer regarding the On-Boarding Acceptance Test. In such event, the Customer may continue to exercise unlimited self-service testing.
- Service Delivery Management.
- Service Delivery Management Contacts. The Customer shall appoint an individual who will serve as the primary contact point for the Provider in connection with ongoing lifecycle management and delivery of the services, and the Provider shall appoint a point of contact; and
- Service Delivery Management Engagement. The Provider and the appointed Customer's project contact shall meet as required during the term of each service for the purpose of facilitating a successful relationship and overseeing the delivery and performance of each service, including but not limited to, (a) tracking the progress of the onboarding and implementation process and all associated tasks, (b) reviewing other current or future projects or business plans that may impact all services and/or delivery of all services, (c) coordinating and planning for any new equipment or software acquisitions or needs, (d) reviewing strategic and tactical decisions for the Customer in respect of the establishment, budgeting and implementation of the Customer’s priorities and plans for information technology that may impact services and/or delivery of all services, and (e) monitoring and resolving concerns that may arise regarding the provision of the Service Schedule.
- Provider's Obligations. The Provider is responsible for the following in accordance
with industry best practices:
- Providing the Equipment as specified by the Order;
- Providing documentation and guiding the Customer through the On-Boarding Acceptance Test and related process;
- Providing ongoing support and education about Customer’s self-service data recovery features of the Managed Backup for Cohesity service at the Customer's request;
- Maintaining the underlying cloud infrastructure components to support the Managed Backup for Cohesity service such as compute, memory, storage and networking by following Provider's guidelines for managing these environments;
- Providing backup Equipment capacity increase options via Order as recommended by the Provider or as otherwise requested by the Customer;
- In case of Provider-assisted restoration, assisting the Customer with initiating the restore from the Provider-Supplied Equipment at-time-of-Disaster;
- Monitoring performance and status of the Managed Backup for Cohesity service in compliance with the Backup Policies for each of the Backup Groups;
- Providing enhanced onboarding project management deliverables, to include:
- Weekly status call between the Provider on-boarding personnel and applicable Customer's contacts, and
- Weekly status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing the Provider’s published Managed Backup for Cohesity service documentation and
managing supporting documentation, including:
- Documented inventory and workload specifications (e.g. compute, storage, networking) of all Workloads within the scope of the Order, and
- Documented Customer network security configurations, including firewall security policies, NAT policies and network security segmentation design.
- Providing full installation, configuration and ongoing management of all services components
required for delivery of Managed Backup for Cohesity service, to include (as applicable):
- Backup hardware & software installation, setup and configuration in the Customer's on-premises environments used for provision of such services;
- Providing full setup and configuration for backup of the Backup Policies for all Workloads within the scope and applicable to the Order and the On-Boarding Provisioning Form;
- Providing full assistance with the development and creation of the Customer’s Backup Policy definitions;
- Providing managed data recovery testing from backup and live data recovery from backup declaration events;
- Fulfilling Customer requests for new Backup Policies, increased capacity, and other change requests; and
- Providing ongoing updates, patching and maintenance for all the Provider-supplied service
components required for delivery of the Managed Backup for Cohesity service, to include:
- Customer’s on-premises Equipment, and
- Software components used by the Managed Backup for Cohesity service; and
- Provided the Customer has returned the Equipment to the Provider in accordance with the requirements of this Service Schedule, the Provider will permanently destroy the Equipment and provide the Customer with a Certification of Destruction within a reasonable period following such destruction.
- Resources.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing the Provider with full and timely cooperation in the Provider’s provision of the Managed Backup for Cohesity service, including without limitation by: (a) providing the Provider with all information reasonably requested by the Provider, such as backup requirement details and site access details and (b) making available Customer’s designated contact reasonably accessible to the Provider;
- Restoring backups from the Provider-Supplied Equipment provided with the Managed Backup for Cohesity service. While the Provider will provide Customer with reasonable support with restoring its backups upon request, Customer remains responsible for performing granular recovery of individual items from agent-based application aware backups. Customer further acknowledges that the Provider does not guarantee the recoverability of individual applications running on the Virtual Machines, such as databases or email messaging systems;
- Promptly notifying the Provider if the protected Resources are compromised, modified or infected by an unauthorized user, malware, virus, worm, or similar code or otherwise Hacked or accessed by a person lacking permission to access the protected Resources;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, including the storage necessary for processing the snapshot-based backups, the Provider is not responsible for any performance degradation, loss of backup data, or errors caused by over allocation;
- Ensuring all Customer-owned software, applications, devices, systems, processes, and services that maintain Customer data to be protected by the services delivered as part of this Agreement are covered as specified under Section 2.3.5 of this Service Schedule for the purposes of fulfilling the Agreement;
- Maintaining all firmware or software updates to all Customer-owned hardware, software, applications, devices, and systems in use with or protected by the Managed Backup for Cohesity service provided by the Provider;
- Contacting all software, application, device, system, service, and service providers covered under this Agreement and add the appropriate Provider’s personnel as approved contacts for the purposes of fulfilling this Service Schedule;
- Assisting with the completion of the On-boarding Provisioning Form provided by the Provider;
- Providing all current and existing documentation of the Customer Primary Site(s) including without limitation, environment “as-built” documentation, application contact information, application dependencies, current backup strategy, disaster recovery plans and any other documentation reasonably requested by the Provider;
- Providing the Provider’s personnel with the Customer's asset discovery and documentation;
- Providing all current process documentation in support of the Managed Backup for Cohesity service and provide all assistance to the Provider as necessary to modify existing or implement new processes to streamline the delivery of the Managed Backup for Cohesity service;
- Maintaining all software and Provider-Supplied Equipment or items provided to the Customer by the Provider located within the Customer's Primary Site(s) in direct support of the delivery of Managed Backup for Cohesity service outlined in the Order in good working order and in accordance with applicable manufacturers’ specifications. The Customer shall notify the Provider immediately upon determination that any Provider-Supplied Equipment is not in compliance with the foregoing or is otherwise not working;
- The Customer shall cooperate with the Provider with regard to the performance of the Provider’s
obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to the Customer’s Equipment, as may be reasonable to permit Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the services. For example, any data protection gaps such as a new virtual machine or physical server not being protected because the Customer did not inform the Provider.
- Prior to the expiration or termination of any Order for the Managed Backup for Cohesity service, migrating and permanently deleting all of its Customer data residing on any Equipment prior to returning the Equipment to the Provider. Such data migration and deletion obligations are at the Customer’s expense, unless otherwise agreed between the Customer and the Provider in a SOW for data migration services; and
- Within thirty (30) days after the expiration or termination of any Order for the Managed Backup for Cohesity service where such Order covers Equipment, Customer will return the Equipment to the Provider by shipping the Equipment to Provider’s designated address at Customer’s expense. Risk of loss to the Equipment will remain with Customer until Equipment is delivered to the Provider. Customer acknowledges and agrees if Customer does not ship the Equipment to Provider within such thirty (30) day period, Customer will pay the applicable Provider the cost of the Equipment.
- Resources.
- Storage. The resources that comprise the Managed Off-Site Backup for Cohesity service could
include one of the following as specified in the Order:
- Dedicated Equipment that provides storage capacity in pre-determined cluster sizes, or
- Shared Equipment that provide storage capacity in a multi-tenant environment;
- Licensing. All required licensing is included in the Managed Off-Site Backup for Cohesity service unless explicitly specified in the Order for Bring-Your-Own-Device (BYOD) environments; and
- Business Models. Capacity is available in a reserved business model for Dedicated Equipment and reserved plus burst business model for Shared Equipment as specified in the Order.
- Storage. The resources that comprise the Managed Off-Site Backup for Cohesity service could
include one of the following as specified in the Order:
- Assets & Deliverables.
- On-Boarding Project Plan. A documented detailed overview of all tasks associated with the Provider on-boarding process defined within scope of the mutually agreed upon Statement of Work. The purpose of this document is to track ownership, progress, and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider; and
- On-Boarding Provisioning Form. A detailed discovery document used for information gathering and collection of all Customer specific technical and infrastructure-related information for the sole purpose of the Provider providing the on-boarding service, integration, and management services to the Customer.
- On-Boarding Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager to serve as the primary contact point; and
- On-Boarding Project Management Engagement. The Provider's project manager and the Customer's project manager shall meet as required for the duration of the on-boarding process for the purpose of facilitating a successful relationship and overseeing the implementation of all backup resources and services outlined in the Order and the On-boarding Provisioning Form, including but not limited to: (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) when applicable, reviewing other current or future projects or business plans that may impact the onboarding of the Equipment and services; and (c) when applicable, weekly status reports to review the Provider’s performance in execution of the on-boarding project for delivery of services.
- Service Delivery Management.
- Service Delivery Management Contacts. The Customer shall appoint an individual who will serve as the primary contact point for the Provider in connection with ongoing lifecycle management and delivery of the services, and the Provider shall appoint a point of contact; and
- Service Delivery Management Engagement. The Provider and the appointed Customer's project contact shall meet as required during the term of each service for the purpose of facilitating a successful relationship and overseeing the delivery and performance of each service, including but not limited to, (a) tracking the progress of the onboarding and implementation process and all associated tasks, (b) reviewing other current or future projects or business plans that may impact all services and/or delivery of all services, (c) coordinating and planning for any new equipment or software acquisitions or needs, and (d) monitoring and resolving concerns that may arise regarding the provision of the Service Schedule.
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Providing the storage infrastructure and licensing as specified by the Order;
- Providing documentation and guiding the Customer through the On-Boarding process;
- Maintaining the underlying cloud infrastructure components to support the Managed Off-Site Backup for Cohesity service such as compute, memory, storage and networking by following Provider's guidelines for managing these environments;
- Providing Off-Site Backup capacity increase options via Order as recommended by the Provider or as otherwise requested by the Customer;
- Providing the Customer with the option to purchase a best-effort cloud restoration service to 11:11
Cloud Services at an additional cost using the backups stored at the Target Site with the following
parameters:
- The creation of Virtual Data Center(s) will consist of the specifications detailed in the relevant Order,
- The network connectivity to the restored environment will be provided by the Provider,
- The restoration shall be limited to VMware based environments, and
- The Provider will start the restoration process within 24 hours after the Customer has both declared a Disaster by notifying the Provider and approved the new Order that contains the cloud resources required to run the workloads along with the i-Tech fees for the professional services required to perform the restoration tasks;
- Providing enhanced onboarding project management deliverables, to include:
- Weekly status call between the Provider on-boarding personnel and applicable Customer's contacts, and
- Weekly status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing the Provider’s published Managed Off-Site Backup for Cohesity service documentation and managing supporting documentation;
- Providing full installation, configuration and ongoing management of all services components
required for delivery of Managed Off-Site Backup for Cohesity service, to include (as applicable):
- Backup hardware & software installation, setup and configuration;
- Fulfilling Customer requests for increased capacity and other change requests; and
- Providing ongoing updates, patching and maintenance for all the Provider-supplied service
components required for delivery of the Managed Off-Site Backup for Cohesity service, to include:
- Infrastructure hosting the off-site backups, and
- Software components used by the Managed Off-Site Backup for Cohesity service.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing the Provider with full and timely cooperation in the Provider’s provision of the Managed Off-Site Backup for Cohesity service, including without limitation by: (a) providing the Provider with all information reasonably requested by the Provider, such as backup requirement details and (b) making available Customer’s designated contact reasonably accessible to the Provider;
- Promptly notifying the Provider if the protected Resources are compromised, modified or infected by an unauthorized user, malware, virus, worm, or similar code or otherwise hacked or accessed by a person lacking permission to access the protected Resources;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, including the storage necessary for processing the snapshot-based backups, the Provider is not responsible for any performance degradation, loss of backup data, or errors caused by over allocation;
- Maintaining compatible firmware or software updates to all Customer-owned Cohesity hardware, and software used in production that replicates to the Provider’s target;
- Assisting with the completion of the On-boarding Provisioning Form provided by the Provider;
- Providing the Provider’s personnel with the Customer's asset discovery and documentation;
- Providing all current process documentation in support of the Managed Off-Site Backup for Cohesity service and provide all assistance to the Provider as necessary to modify existing or implement new processes to streamline the delivery of the Managed Off-Site Backup for Cohesity service;
- The Customer shall cooperate with the Provider regarding the performance of the Provider’s
obligations hereunder, including (without limitation):
- Notifying the Provider of any changes to its configurations that could potentially impact the services. For example, any data protection gaps such as a new virtual machine or physical server not being replicated because the Customer did not include the server in the Backup Policy; and
- Prior to the expiration or termination of any Order for the Managed Off-Site Backup for Cohesity service, migrating and permanently deleting all of its Customer data residing on the Provider’s target environment. Such data migration and deletion obligations are at the Customer’s expense, unless otherwise agreed between the Customer and the Provider in a SOW for data migration services.
- Resources.
- Licensing. All required licensing is included in the Managed SteelDome InfiniVault service; and
- Business Models. Storage capacity is available in a reserved business model as specified in the Order.
- Assets & Deliverables.
- On-Boarding Project Plan. A documented detailed overview of all tasks associated with the Provider on-boarding process defined within scope of the mutually agreed upon Statement of Work. The purpose of this document is to track the ownership, progress, and completion of all applicable on-boarding tasks in collaboration between the Customer and the Provider;
- On-Boarding Provisioning Form. A detailed discovery document used for information gathering and collection of all Customer specific technical and infrastructure-related information for the sole purpose of the Provider providing the on-boarding service, integration, and management services to the Customer; and
- Protection Policies. The policies define the Managed SteelDome InfiniVault schedule of how often and when to take a snapshot of the data and the retention timeframe for that snapshot.
- On-Boarding Project Management.
- Project managers. Both the Provider and the Customer shall appoint a project manager to serve as the primary contact point; and
- On-Boarding Project Management Engagement. The Provider's project manager and the Customer's project manager shall meet as required for the duration of the on-boarding process for the purpose of facilitating a successful relationship and overseeing the implementation of all resources and services defined in the Order and the On-boarding Provisioning Form, including but not limited to: (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact the on-boarding of the backup resources and services; (c) weekly status reports to review the Provider’s performance in execution of the on-boarding project for delivery of all Cloud Resources and services; and (d) coordinating and planning for any new Equipment or software acquisitions specific to supporting the completion of on-boarding all Cloud Resources and services.
- On-Boarding Acceptance Test.
- The On-Boarding Acceptance Test consists of non-service impacting data recovery test operations performed by the Provider in conjunction with the Customer, as well as data recovery verification performed by the Customer, in each case as defined in the On-Boarding Project Plan;
- The On-Boarding Acceptance Test is performed during the Provider’s normal business hours of Monday to Friday, between 8:00 a.m. and 5:00 p.m., with the time zone being based on the data center location where services are located, excluding any federal or other holidays observed by the Provider in such location;
- On-Boarding Acceptance Test Success Criteria. Successful completion of the On-boarding Acceptance Test shall be determined by validation of data recovery either to the original location or an alternative location. Any other target objectives will be documented in the On-Boarding Project Plan. If the On-Boarding Acceptance Test cannot be completed for technical reasons, the Customer will provide the Provider with any data or information reasonably requested by the Provider in order to enable the Provider to diagnose and resolve any problems associated with any failure to recover data during the On-Boarding Acceptance Testing. The Provider’s project manager will notify the Customer via email or phone upon resolution of any such issues. After the Provider has notified the Customer that the problem has been resolved, the Customer and the Provider will promptly conduct a follow-up On-Boarding Acceptance Test to verify data recovery. This process will continue, if necessary, until the On-Boarding Acceptance Test Criteria meets the required success criteria; and
- Notwithstanding anything to the contrary in this Service Schedule, if the Customer fails to timely participate in the On-Boarding Acceptance Test process as identified in the On-Boarding Project Plan, all of the Provider’s on-boarding obligations will be considered completed and Provider will have no further obligations to the Customer regarding the On-Boarding Acceptance Test. In such event, the Customer may continue to exercise unlimited self-service testing.
- Service Delivery Management.
- Service Delivery Management Contacts. The Customer shall appoint an individual who will serve as the primary point of contact for the Provider in connection with ongoing lifecycle management and delivery of the services, and the Provider shall appoint a point of contact; and
- Service Delivery Management Engagement. The Provider’s and the appointed Customer's points of contact shall meet as required during the term of each service for the purpose of facilitating a successful relationship and overseeing the delivery and performance of each service, including but not limited to: (a) tracking the progress of the on-boarding and implementation process and all associated tasks; (b) reviewing other current or future projects or business plans that may impact all services and/or delivery of all services; (c) coordinating and planning for any new equipment or software acquisitions or needs; (d) reviewing strategic and tactical decisions for the Customer in respect of the establishment, budgeting and implementation of the Customer’s priorities and plans for information technology that may impact services and/or delivery of all services; and (e) monitoring and resolving concerns that may arise regarding the provision of all services, this SLA and/or the Service Schedule.
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Providing the software solution as specified by the Order;
- Providing documentation and guiding the Customer through the On-Boarding Acceptance Test and related processes;
- Providing ongoing support and education about the Customer’s Managed SteelDome InfiniVault service at the Customer's request;
- Maintaining the underlying cloud infrastructure components to support the Managed SteelDome InfiniVault services such as compute, memory, storage and networking by following the Provider's guidelines for managing these environments;
- Providing Managed SteelDome InfiniVault capacity increase options via Order as recommended by the Provider or as otherwise requested by the Customer;
- In case of Provider-assisted restoration, assisting the Customer with initiating restoration from the Customer Managed SteelDome InfiniVault at the time of Disaster;
- Monitoring performance and status of the Managed SteelDome InfiniVault service in compliance with virtual appliance operating at expected CPU, memory and storage requirements;
- Providing enhanced on-boarding project management deliverables, to include:
- Weekly status call between the Provider on-boarding personnel and applicable Customer's contacts, and
- Weekly status report summarizing project tasks progress, project milestones, estimated and actual durations/completion dates and critical path items;
- Providing the Provider’s published Managed SteelDome InfiniVault service documentation and managing
supporting documentation, including:
- Documented inventory and workload specifications (e.g., compute, storage, networking) of all Workloads within the scope of the Order, and
- Documented Customer network security configurations, including firewall security policies, NAT policies and network security segmentation design;
- Providing full installation, configuration and ongoing management of all services components required for delivery of Managed SteelDome InfiniVault service, to include (as applicable): software installation, setup and configuration both in the Customer's premises and the Provider’s cloud data center environments used for provision of such services;
- Providing full setup and configuration for backup of the protection policies for all Workloads within the scope and applicable to the Order and the On-Boarding Provisioning Form;
- Providing full assistance with the development and creation of the Customer’s protection policy definitions;
- Providing live data recovery from Disaster declaration events;
- Fulfilling Customer requests for increased capacity and other change requests; and
- Providing ongoing updates, patching and maintenance for all the Provider-supplied service components required for delivery of the Managed SteelDome InfiniVault service, to include: software components used by the Managed SteelDome InfiniVault service.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing the Provider with full and timely cooperation in the Provider’s provision of the Managed SteelDome InfiniVault services, including without limitation by: (a) providing the Provider with all information reasonably requested by the Provider, such as snapshot frequency and retention requirement details and (b) making available Customer’s designated contact reasonably accessible to the Provider;
- At the Customer’s discretion, restoring data by requesting support from the Provider in restoring data from the Managed SteelDome InfiniVault service;
- Promptly notifying the Provider if the Reserved Resources are compromised, modified or infected by an unauthorized user, malware, virus, worm, or similar code or otherwise accessed by a person lacking permission to access the protected Reserved Resources;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, including the storage necessary for processing the snapshot-based recovery points, the Provider is not responsible for any performance degradation, loss of data, or errors caused by over allocation;
- Ensuring all Customer-owned software, applications, devices, systems, processes, and services that maintain Customer data to be protected by the services delivered as part of this Agreement are covered as specified under Section 2.3.5 of this Service Schedule for the purposes of fulfilling the Agreement;
- Maintaining all firmware or software updates to all Customer owned hardware, software, applications, devices, and systems in use with or protected by the Managed SteelDome InfiniVault services provided by the Provider;
- Contacting all software, application, device, system, service, and service providers covered under this Agreement and adding the appropriate Provider’s personnel as approved contacts for the purposes of fulfilling this Service Schedule;
- Assisting with the completion of the On-boarding Provisioning Form provided by the Provider;
- Providing all current and existing documentation of the Customer Primary Site(s) including without limitation, environment “as-built” documentation, application contact information, application dependencies, current backup strategy, disaster recovery plans, and any other documentation reasonably requested by the Provider;
- Providing the Provider’s personnel with the Customer's asset discovery and documentation;
- Providing all current process documentation in support of the Managed SteelDome InfiniVault services and provide all assistance to the Provider as necessary to modify existing or implement new processes to streamline the delivery of the Managed SteelDome InfiniVault services;
- The Customer shall cooperate with the Provider with regard to the performance of the Provider’s
obligations hereunder, including (without limitation):
- Providing the Provider with the required remote access to the Customer Equipment, as may be reasonable to permit the Provider to perform its obligations hereunder, and
- Notifying the Provider of any changes to its configurations that could potentially impact the services. For example, new data being added to the Managed SteelDome InfiniVault services because the Customer did not inform the Provider;
- Prior to the expiration or termination of any Order for the Managed SteelDome InfiniVault service, migrating and permanently deleting all of its Customer data residing on any Equipment. Such data migration and deletion obligations are at the Customer’s expense, unless otherwise agreed between the Customer and the Provider in a SOW for data migration services.
- Risks
- There may be times when the Managed SteelDome InfiniVault service is unable to perform scheduled snapshots. Reasons for a snapshot failure include, but are not limited to, situations where a snapshot is unable to start during retry windows, services are temporarily unavailable, conflicts occur between resources, etc. In such events, the Provider will use reasonable efforts to attempt to remedy any potential snapshot failures, and Customer shall hold Provider harmless if a snapshot did not occur successfully.
- Order Effective Date. Notwithstanding anything to the contrary in the Agreement, all Orders for Connectivity Services will be effective and binding as of the date of execution by the last Party to execute.
- Service Jurisdiction. Customer acknowledges and agrees that no intrastate circuit provided
hereunder may:
- be extended by Customer from any Customer Location to an out of state location;
- be used for switched termination of interstate calls; or
- be used to transmit or otherwise carry more than 10% Interstate Traffic even if the physical end
points of the circuit are both within the same state.
“Interstate Traffic” includes Internet, interstate switched access, and/or any data or switched voice traffic that originates and terminates in different states. If Customer wishes to use or extend any intrastate circuit for the foregoing purposes, Customer must provide Provider with a written request ten (10) business days prior to any such use or extension.
- Service Delivery and Requirements.
- Customer must procure, at its sole cost and expense, all necessary connections within each Customer Location to access and interconnect with the Connectivity Services. Customer is solely responsible for all cross-connection charges necessary to connect to the Connectivity Services. Customer is not permitted to access the Provider Network except at Customer’s side of the Service Demarc;
- Customer must procure and maintain, at its sole cost and expense, Customer Equipment which is technically compatible with the Connectivity Services and the Provider Network; and
- Unless otherwise noted in the Order, Customer is responsible for obtaining and maintaining, for the duration of the related Order Term, any necessary third-party licenses, approvals or permissions (“Location License(s)”) for Provider to connect the Connectivity Services from the public rights-of-way to the Customer Equipment and Customer Location and/or to the Customer Location and install and/or utilize the necessary inside plant facilities and equipment, including power, riser conduit and fiber optics. Such Location License(s) must extend to the installation, maintenance, and retrieval of any Provider equipment.
- Compensation.
- Without limiting Section 5.6.1 of the Agreement (Consequences of Termination), if the Customer cancels an Order prior to commencement of the Connectivity Services, Customer will be responsible for any and all third-party costs incurred by Provider, including the costs of carrier circuits, equipment costs, construction costs and building access costs. Notwithstanding Section 4.2 of the Agreement (Payment), Provider will invoice those costs to Customer and the invoice will be due immediately upon receipt; and
- Customer is responsible for and will pay any and all fees (i) associated with obtaining and maintaining the Location Licenses, and (ii) assessed by any building owner, landlord or other third-party for the necessary license, approval and/or permission to install and maintain the Connectivity Service to a Customer Location.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Supplying the Provider with information reasonably required to fulfill its obligations;
- Promptly notifying the Provider if the CPE is compromised, accessed by an unauthorized person, or infected with a virus, worm or similar malicious code; and
- When applicable, configuring the appropriate organization access permissions including the creation, modification, and deletion of end-user 11:11 Cloud Console account(s).
- Service Level Agreement. The Service Level Agreement would be accessible at https://1111systems.com/legal/sla.
- Service Delivery and Requirements
- Subject to the terms and conditions contained herein, the Order and the Agreement, Provider will provide the Lit Services set forth in the Order. Provider shall use reasonable commercial efforts to cause the Service Commencement Date to occur by the Requested Install Date but Provider does not guarantee that installation will be completed by such Requested Install Date. After completing installation and testing, Provider will notify Customer that the Lit Services are ready. Customer is not entitled to any credits, SLA or otherwise, for claims related to the circuits arising more than (3) days after the installation or where Customer delays in testing the circuits;
- If installation is delayed as a result of Customer’s failure to fulfill its obligations under the Agreement (including, failure to obtain any necessary Location License(s)) (defined below), Provider will give Customer written notice to cure such failure within thirty (30) days. If Customer fails to cure within such period, the Service will be deemed to be delivered and the Service Commencement Date will be deemed to have occurred on the last day of such 30-day period;
- If an Order requires a site survey or special construction in order to be completed (each, a “Site Survey”), then Customer may incur additional Monthly Recurring Charges or Non-Recurring Charges. Customer may cancel an Order with no early termination fees if additional fees of any kind arise after the Site Survey is conducted for the Services covered by the Order; and
- Cross Connects are not included. Customer is responsible for all cross connects unless otherwise provided in the Order.
- Provider Network; Equipment
- The Provider Network remains the sole and exclusive property of Provider or its supplier and nothing contained herein shall give or convey to Customer any right, title, or interest whatsoever in or to the Provider Network, which may never be deemed a fixture to real property. Customer may not adjust, encumber, repair, or attempt to repair the Provider Network, and may not remove or relocate any portion of the Provider Network without the prior written consent of Provider. Customer shall not pledge, lease, sell, transfer, mortgage, otherwise encumber, give away, remove, relocate, alter, or tamper with any portion of the Provider Network (or any notice of ownership thereon) or attach any electrical or other devices to the Provider Network. Provider reserves the right to make such filings or take such other actions as Provider, in its sole discretion, deems necessary or appropriate to evidence its ownership rights in the equipment. Customer agrees to execute all documents required to make such filings or accomplish such actions. If Customer causes any liens to be placed on the Provider Network, it must cause any such liens to be removed within thirty (30) days of Customer’s knowledge thereof. Customer is liable to Provider for any loss or damage to the Provider Network other than loss or damage resulting from an act or omission of Provider, its employees, contractors, or agents;
- Provider reserves the right to, at any time, alter the Provider Network and any equipment therein or therewith and the features and functionality of the Provider Network or equipment. Provider will use reasonable efforts to schedule maintenance and replacement of equipment to minimize interference with, or interruption of, Services, but shall have no liability for interruptions in Services arising out of, or related to, maintenance or replacements. Provider may charge Customer for any repairs or replacement required due to damage or misuse of the Provider Network or equipment (normal wear and tear excepted). If any of Provider’s equipment or any portion of the Provider Network is defective, damaged, destroyed, tampered with, stolen or otherwise removed, Customer must notify Provider immediately and may be held liable for repair or replacement if such notification is not immediately provided;
- The Customer is responsible for installing and cabling the Provider's Network Equipment at the Customer’s location(s). Upon request, the Provider offers installation services as an add-on, based on availability at the respective location(s);
- Upon termination of Services, the Customer will contact Provider to schedule return of Provider-Supplied Equipment and any portion of the Provider Network and will be responsible for the costs of shipping the equipment to Provider. All equipment and the Provider Network must be returned within thirty (30) business days of circuit termination, in undamaged and full working order (normal wear and tear excepted). If the provided equipment or any portion of the Provider Network is not returned by Customer or is not returned in such condition as originally provided, Customer shall pay Provider the cost of repair or replacement, at fair market value, as reasonably determined by Provider;
- If an Order specifies that the Customer is required to obtain space and power to support Provider equipment or any portion of the Provider Network for the Services, Customer must provide, at its sole cost and expense, the Site Environmental Specifications;
- If applicable, the Customer agrees to provide all reasonable assistance to Provider in procuring and installing or activating necessary telecommunication circuits and facilities as necessary to provide telemetry from the Customer Locations to Provider’s monitoring center(s) to enable out of band management. Customer shall provide adequate space and power to support the related telemetry equipment; and
- If Provider deems it necessary, the Customer may be required to renumber the IP addresses assigned to Customer by Provider. Upon expiration, cancellation, or termination of a Service for any reason, Customer agrees to return to Provider any IP addresses or address blocks assigned to the Customer.
- Monitoring and Maintenance
- Provider will perform all maintenance and repairs to the Provider Network as it deems necessary to ensure proper functioning of the Service. Provider will maintain the Provider Network at no additional charge to the Customer, except as provided in Section 3.34.3(b). Should any condition exist in any portion of the Provider Network that may impair the integrity of the Service or if Provider determines that it is necessary to conduct tests and adjustments to maintain the efficient working order of the Service, Provider will initiate and coordinate planned maintenance (or will cause such action to occur) which may include the deactivation of a network segment or other facility that supports the Service; and
- If all or part of the Provider Network requires restoration, replacement or repair by reason of an act or omission of Customer, or its employees, agents or contractors, such repair, replacement and/or restoration may be made by Provider, at Customer’s sole expense, in accordance with Provider’s then current time and materials rates plus applicable Taxes. If Provider dispatches personnel for a Provider Network failure caused by Customer equipment or personnel or due to an issue caused by Customer’s equipment or other service providers, Provider will invoice, and Customer agrees to pay Provider’s actual costs for time and travel associated with the dispatch.
- Burst Usage Payment Terms (Applies only if any Order provides for a Service with Burstable
Usage)
- Provider will measure Customer’s bandwidth usage in five-minute intervals, for each point of connection between Customer and Provider (or its up-stream provider) in two categories: incoming and outgoing. At the end of each billing cycle, all data samples in each category will be sorted from highest to lowest and the top five percent (5%) of measurements will be discarded. The highest remaining data sample in the higher of the two categories will then constitute the bandwidth usage level for that particular billing cycle. “Burst Usage” means the amount of bandwidth usage for the particular billing cycle exceeding Customer’s Minimum Committed Data Amount (as specified on the applicable Order.).
- Internet Over Wireless Service.
- Internet of Wireless (“IOW”) Services use cellular radio technologies to transmit data. IOW services
have the following limitations:
- IOW Services may be subject to transmission and service area limitations, interruptions caused by atmospheric, topographical or environmental conditions (including location topology or equipment positioning), or other conditions or activities affecting wireless transmission,
- An external antenna may be required in some cases (for an additional charge) to boost signal strength, and
- IOW Services may not be available at all locations;
- Antenna or Dish Installation
- Customer is responsible for installation of any required satellite dish or cellular antenna (antenna) and associated equipment unless Customer purchases Provider’s optional managed installation service,
- If Customer purchases the managed installation service, Provider will coordinate deployment of the dish or antenna, including site survey and installation support, subject to feasibility and clear line-of-sight requirements, and
- In all cases, Customer is responsible for ensuring that the dish or antenna installation locations are accessible and that any necessary permissions (e.g., roof rights, landlord consent) have been obtained;
- Acceptable Use
- Customer must obtain Provider’s prior written approval and execute a written agreement before it may install, deploy or use any of its own regeneration equipment or similar mechanism (for example, a repeater) to originate, amplify, enhance, retransmit or regenerate IOW Service, and
- USE OF IOW SERVICES FOR REMOTE MEDICAL MONITORING IS EXPRESSLY PROHIBITED;
- Wireless Data Usage: Wireless data usage is the sum of all data transferred, typically measured in megabytes (MB) or gigabytes (GB), across the subscribed IOW Services during the usage period. Customer is responsible for all wireless data usage, including any usage and the associated charges that exceed the Customer’s data plan, regardless of the cause for that usage;
- Usage-based Data Plans:
- Usage-based data plans are based on the maximum amount of data usage available to the Customer before overage charges apply,
- Provider’s usage-based IOW Services are meant to be used as a back-up to primary office Internet service, as a temporary primary Internet service, machine to machine communication, or as an Access Transport for the Internet of Things (“IOT”),
- Customers may not use IOW Services as a permanent primary Internet service without the express permission of Provider,
- Nevertheless, regardless of Customer’s intended use, Customer is responsible for choosing an adequate data plan,
- Provider is not responsible for providing Customer with high data usage alerts. Customer has the option to purchase an edge device configured with software license to monitor its data usage for an additional fee, and
- Customer understands that certain applications drive high data usage. Highest among these is video, including security cameras, YouTube videos, live video streams, video conferences, etc. If Customer expects to use IOW Services for such applications, a minimum data plan of 50 GB or 100 GB is recommended, which still may not be adequate. Provider recommends that Customers who choose low data plans block such applications from using its IOW Services;
- Data Usage with Managed Services (including SD-WAN and Firewalls)
- Customer understands that some SD-WAN applications and failover firewall configurations allow for active-active configurations in which a Virtual Private Network (“VPN”) tunnel is kept active across the IOW Services with some data traffic routed through that tunnel in order to optimize quality of service. Customer must specify to Provider if it intends to use the IOW Services in active-active mode prior to implementation as certain underlying providers expressly prohibit this configuration,
- Customer also understands that active-active configuration often results in high data usage and that if Customer intends to maintain IOW Services in an active-active configuration, a minimum data plan of 5 GB per location is advised, which still may not be adequate depending on the amount of traffic traversing the tunnel,
- Customers who choose low data plans will ensure all device configurations are in an active-passive configuration and not active-active mode, and
- In addition, certain managed service applications such as SD-WAN and Firewall may require configurations to “poll” for software updates frequently which can drive up data usage. It is the responsibility of the Customer to optimally configure all managed service equipment in order to minimize IOW Services usage or, if Customer works with a managed services provider (be it Provider or a third-party), ensure said provider optimally configures all equipment in order to minimize IOW Services usage;
- Speed-based Data Plans
- Speed-based data plans are based on maximum service speeds measured in Megabits per second (Mbps); however, the maximum speeds are not guaranteed and are subject to network availability,
- Speed-based data plans are intended for official business use only for business-critical data applications. Authorized business applications do not include streaming video, streaming audio, web hosting, public Wi-Fi or guest Wi-Fi. Customer warrants that it will only use a speed-based data plan and the Services arising therefrom or related thereto for business-critical data applications and such usage does not include any unauthorized applications,
- Provider may slow speeds on plans after the committed data usage is reached; the Customer has the option to buy additional data usage to restore speeds, and
- For speed-based data plan users, Provider will identify users with excessive usage and review if the usage is in line with official business use for business-critical applications and business critical data. If excessive usage does not comply with these terms, Customer must immediately bring the service usage within the terms. Notwithstanding anything to the contrary in the Agreement, if usage is not brought within compliance, Provider may discontinue service or move the user to a traditional usage-based data plan with overage charges. If excessive usage is within business use, Provider will work with Customer to identify and implement an alternative solution, included alternative Internet over Anything (IOA) Services, discussing opportunities for Wi-Fi offload, application settings, and other network efficiency adjustments such as using a managed services to restrict usage.
- Internet of Wireless (“IOW”) Services use cellular radio technologies to transmit data. IOW services
have the following limitations:
- Service Delivery and Requirements
- Subject to the terms and conditions contained herein, the Order and the Agreement, Provider will lease to Customer the Dark Fiber which will constitute the Service set forth in the Order. After completing installation and testing the Dark Fiber to determine that it meets the Dark Fiber Specifications, Provider will deliver the Dark Fiber by notifying Customer and providing testing results demonstrating compliance with the Dark Fiber Specifications. Provider shall use reasonable commercial efforts to cause the Service Commencement Date to occur by the requested Install Date set forth in the Order but Provider does not guarantee that installation will be completed by such Requested Install Date; and
- If delivery is delayed as a result of Customer’s failure to fulfill its obligations under the Agreement (including failure to obtain any necessary Location License(s)), Provider will give Customer written notice to cure such failure within thirty (30) calendar days. If Customer fails to cure within such period, the Service will be deemed to be delivered and the Service Commencement Date will be deemed to have occurred on the last day of such 30-day period.
- Network Relocation and Underlying Rights
- Provider may relocate all or any portion of the Provider Network segments or any of the facilities required to provide Customer with the Dark Fiber: (i) if a third-party with legal authority orders or threatens to order such relocation (e.g. through eminent domain, nationalization, or expropriation), (ii) in order to comply with applicable laws, or (iii) for bona fide operational reasons;
- Provider agrees to provide Customer fourteen (14) calendar days prior notice of a relocation, if reasonably feasible;
- Provider has the right to direct such relocation, including the right to determine the extent of,
the timing of, and methods to be used for such relocation, provided that any relocation:
- is constructed and tested in accordance with the Dark Fiber Specifications,
- does not result in a materially adverse change to the operations, performance, or connection points with the Provider Network of Customer, and
- does not unreasonably interrupt service on the Dark Fiber;
- Notwithstanding anything to the contrary contained herein, all Dark Fiber Services to be delivered under an Order are subject and subordinate to the Underlying Rights. “Underlying Rights” means the right of way, franchise, access rights and other agreements obtained by Provider for the construction, operation, and maintenance of its network. All Dark Fiber Services provided to Customer are expressly made subject and subordinate to each and every limitation, restriction or reservation affecting the Underlying Rights. Upon the expiration or other termination of an Underlying Right that is necessary in order to grant, continue or maintain any Dark Fiber Services, Provider shall use commercially reasonable efforts to renew such Underlying Right or to obtain an alternate right of way. If Provider is required to relocate any part of its network facilities used or required in providing Dark Fiber Services to Customer as the result of a lack of an Underlying Rights, Provider shall determine the extent of, the timing of, and methods to be used for such relocation. Should Provider determine that the cost of relocation or obtaining the necessary Underlying Rights are not commercially reasonable, Provider in its sole discretion may terminate the Agreement or the applicable Order upon thirty (30) days’ notice to Customer.
- Use of Dark Fiber
- Customer may use the Dark Fiber for any lawful purpose, including for the provision of telecommunications services, information services and capacity to its customers;
- Customer may not, without the express written consent of Provider, perform, or contract with any third-party to perform, any repairs or maintenance to any Dark Fiber. Customer will not install any equipment to be used with the Dark Fiber that does or could damage or interfere with the Provider Network; and
- Customer shall not, directly or indirectly, create or be permitted to impose any lien on the Dark Fiber or on the rights or title relating thereto, or any interest therein, or in the Agreement. Customer shall promptly, at its own expense, take such action as may be necessary to duly discharge any lien created by it or permitted by it to be imposed on the Dark Fiber.
- Maintenance
- Provider will perform all maintenance and repairs to the Provider Network as it deems necessary to ensure proper functioning of the Service. Provider will maintain the Provider Network at no additional charge to Customer, except as provided in Section 3.35.4.b. Should any condition exist in any portion of the Provider Network that may impair the integrity of the Service or if Provider determines that it is necessary to conduct tests and adjustments to maintain the efficient working order of the Service, Provider will initiate and coordinate planned maintenance (or will cause such action to occur) which may include the deactivation of a network segment or other facility that supports the Service;
- If all or part of the Provider Network requires restoration, replacement, or repair by reason of an act or omission of Customer, or its employees, agents or contractors, such repair, replacement and/or restoration may be made by Provider, at Customer’s sole expense, in accordance with Provider’s then current time and materials rates plus applicable Taxes. In the event that Provider dispatches personnel for a reported Provider Network failure caused by Customer equipment or personnel or due to an issue caused by Customer’s equipment or other service providers, Provider will invoice, and Customer agrees to pay Provider’s actual costs for time and travel associated with the dispatch; and
- Customer is responsible, at its sole cost and expense, for acquiring, installing, operating, or otherwise making provision for and maintaining all electronic and optronic equipment necessary for Customer to light the Dark Fiber and/or for Customer’s transmissions over the Dark Fiber.
- Dark Fiber Specifications and Fiber Optic Cable Splicing, Testing and Acceptance Standards
Specification Specification Value Attenuation at 1310 nm
Non-Dispersion Shifted Fiber (NDSF)< 0.35 dB/km Attenuation at 1550 nm
Non-Dispersion Shifted Fiber (NDSF)< 0.25 dB/km Fiber Cable Construction Outside Plant Lose Tube or Ribbon Fiber Suitable for Aerial, Underground and Directly Buried Applications Strength Member Embedded Strands Parallel to Glass Core for Strength up to 600psi tensile pull without stretching or introduction of microbending Cable Jacket Covering Polyethylene Jacketed for Protection and Dielectric Stability - The maximum loss value measured between Customer Locations with an industry-accepted laser source
and power meter, or an OTDR, shall have an attenuation of less than or equal to the
following:
1. At 1310 nm: (0.4 dB/km x km of fiber) + (number of connectors x 0.50 dB) + (0.15 dB x number of splices) + 1.0 dB
2. At 1550 nm: (0.3 dB/km x km of fiber) + (number of connectors x 0.50 dB) + (0.15 dB x number of splices) + 1.0 dB
- The maximum loss value measured between Customer Locations with an industry-accepted laser source
and power meter, or an OTDR, shall have an attenuation of less than or equal to the
following:
- Service.
- SD-WAN and Managed Connectivity services expand the traditional network services (as described in the Lit Services and Dark Fiber Service Supplements) to include Customer Premises Equipment (CPE) and its support. Standard service deployment includes Provider-Supplied CPE, device configuration, installation, device maintenance, warranty support, device administration, proactive monitoring, and proactive support. Devices vary based on the Customer’s requirements and include. Still, they are not limited to SD-WAN-enabled managed Firewalls (as described in section 3.1), Network Switches, Network Routers, Broadband/Cable Modem, Wireless Router/Modems, and Network Interface Devices (NID). Standard service delivery for SD-WAN deployment includes engineering effort of 10 hours per each SD-WAN site managed by Provider. At the end of service delivery, Provider may charge Customer for engineering efforts exceeding a collective 10 hours per site, based on current market rates.
- Service Demarcation.
- CPE provided and managed by the Provider as Provider-Supplied Equipment, shall be placed on the Customer premises between the Wide Area Network (WAN) (lit or dark fiber services) and the Customer Local Area Network (LAN) environment. The point of service demarcation shall be extended for managed services to the LAN side of the router, firewall or other managed CPE device. For unmanaged telecommunications service, the demarcation shall be the output jack (typically an RJ45 or fiber optic ports) of the network equipment. Systems maintenance, testing, and support shall be extended to the demarcation on the LAN side of the CPE. It shall not extend into the Customer LAN. While the Provider’s technicians may assist the Customer with trouble isolation into the LAN, the Customer remains solely responsible for maintenance and repair of the LAN environment. The Provider accepts no responsibility for the accuracy of any tests, suggested outage causes, or repair costs for any part of the Customer LAN after the point of demarcation on the managed device.
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Configuring the managed devices per an agreed configuration plan based on the Customer’s requirements, infrastructure, and availability;
- Designing the Customer network based on the Customer's requirements and configure the managed devices to support that design once the Customer approves;
- Providing replacement hardware in the event of a failure; and
- In some cases, the Provider may agree to provide monitoring services for CPE not supplied by Provider. In such cases, the Provider will provide services, as authorized by and agreed with the Customer, that may include some or all of the following: device configuration, backup configuration support, device administration and change management, proactive monitoring, VPN administration, network management portal access for real-time performance monitoring, graphs and reports.
- Customer’s Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Promptly providing all information requested by Provider’s technical team related to existing network policies and configurations associated with the old equipment, if applicable, to ensure a seamless migration process and to minimize any potential conflicts or challenges that may arise during the transition. In the event Customer requires additional assistance or expertise for the actual transfer of rules from the old equipment to the new SD-WAN infrastructure, then Provider is prepared to offer such services as part of a separate paid professional services engagement the terms of which will be mutually agreed to in writing signed by the Parties;
- Providing environmentally controlled rack space and power for the managed devices;
- Providing the Provider with out-of-band access;
- Installing and cabling the Provider-Supplied Equipment at the Customer’s location(s);
- Providing unobstructed access to the equipment for maintenance, troubleshooting, and replacement;
- Informing the Provider of its existing network design, the applicable IP addresses, the need for high availability, SD-WAN policies, the desired network operation with the managed CPE, and the VPN layout if included;
- Confirming the configuration plan prior to installation and that the managed devices are configured per the Customer’s preferences after service activation;
- Confirming the network design for implementation and its correct operation upon installation;
- Upon service connection, providing a test plan to confirm that the network's performance and failover are functioning per the plan. The Customer will allow the Provider ample time to resolve the issue identified during the testing period;
- Procuring and maintaining the hardware and software components required for the Local Monitoring Probe. Customer will ensure the proper installation of the Local Monitoring Probe within the premises and shall be responsible for securing and configuring it to align with its corporate policies and specific network requirements. Customer is responsible for ongoing management tasks, including, but not limited to, patching, upgrades, and updates in accordance with industry best practices; and
- Should the Provider provide the Customer monitoring services for CPE not supplied by Provider, the
Customer will be required to:
- Authorizing Provider access the Customer’s equipment and making changes to settings and configurations,
- Providing the Provider with the necessary login credentials, including login names, passwords, and IP addresses, to access their equipment for management and administration purposes,
- Acknowledging that such services may not be as extensive for CPE not supplied by Provider as for Provider-Supplied Equipment due to differences in manufacture and technology from the standard equipment deployed by the Provider and using the Provider’s network management platform and expertise, and
- Agreeing and acknowledging that, except in cases of gross negligence or willful misconduct, to hold the Provider harmless for any damage to CPE, associated devices, associated services, or data resulting from actions taken by the Provider in the process of monitoring, administering, and managing the CPE.
- Resources.
- Application Services. For each quantity of “Cloudflare Application Business Plan+ (Per Zone)”
specified in Order:
- Customer shall be entitled to a bundle of WAF, DDOS, DNS, and CDN features enabled for a single apex domain,
- Customer shall be entitled to 1TB monthly throughput usage capacity specific to each Zone,
- Unused throughput capacity for any given Zone cannot carry over month to month or contribute to other Zones, and
- Throughput capacity usage exceeding the monthly 1TB allowance will be billed monthly in arrears per TB;
- Zero Trust Services. Customer shall be entitled to one (1) unique seat for each quantity of
the following services specified in the Order:
- Cloudflare Access,
- Cloudflare Gateway,
- Cloudflare Advanced Browser Isolation,
- Cloudflare Area 1 Enterprise,
- Cloudflare Zero Trust Essentials.
- Cloudflare Zero Trust Essentials bundle includes Cloudflare’s: Access, Gateway, Tunnel, mTLS, and WARP.
- Cloudflare Zero Trust Essentials Plus bundle includes Cloudflare’s: Access, Gateway, Tunnel, mTLS, WARP, and Area 1 Email Security.
- Cloudflare Zero Trust Advanced.
- Cloudflare Zero Trust Advanced bundle includes Cloudflare’s: Access, Gateway, Tunnel, mTLS, WARP, RBI, and CASB.
- Cloudflare Zero Trust Advanced Plus bundle includes Access, Gateway, Tunnel, mTLS, WARP, RBI, CASB, and Area 1 Email Security.
- Cloudflare Zero Trust Premier.
- Cloudflare Zero Trust Premier bundle includes Access, Gateway, Tunnel, mTLS, WARP, RBI, CASB and DLP.
- Cloudflare Zero Trust Premier Plus bundle includes Access, Gateway, Tunnel, mTLS, WARP, RBI, CASB, DLP, and Area 1 Email Security.
- Application Services. For each quantity of “Cloudflare Application Business Plan+ (Per Zone)”
specified in Order:
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Provisioning Customer account within the Cloudflare portal;
- Enabling feature/license entitlements as defined in Order;
- Providing quick-start guides referencing Cloudflare developer documentation for customer self-deployment and self-management of the service;
- Billing in the arrears for consumption / usage-based overages; and
- If Premium Management is specified in Order, Provider is responsible for:
- Providing project management services to deploy Cloudflare services in Order,
- Providing guided onboarding configuration in Cloudflare portal,
- Providing ongoing change configuration in Cloudflare portal at Customer request,
- Providing troubleshooting in Cloudflare portal at Customer request, and
- Providing initial tuning of WAF and CDN policies with ongoing tuning at Customer request.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Adherence to Cloudflare’s Enterprise Subscription Agreement set out at https://www.cloudflare.com/enterpriseterms/ which may be modified from time to time;
- To the extent not inconsistent with Provider’s terms and conditions, adherence to Cloudflare’s Service-Specific Terms set out at https://www.cloudflare.com/service-specific-terms-application-services/, which may be modified from time to time;
- Payment for any usage-based overages billed in the arrears;
- Assisting with the completion of the On-boarding Provisioning Form provided by Provider;
- Installation, configuration, ongoing administration and troubleshooting of WARP client software, cloudflared service, and any other software or service component on end user client and server machines to facilitate Cloudflare connectivity; and
- Maintaining up to date versions of Cloudflare WARP, cloudflared, and all other Cloudflare software and service components to facilitate Cloudflare connectivity.
- Modifications and Usage Based Components: Customer is responsible for the following in
accordance with industry best practices (as applicable):
- Cloudflare may change product bundles, features, services, and pricing at any time. Provider reserves the right to modify Customer order, service terms, and pricing at any time as necessary to align with Cloudflare provided offerings; and
- Certain Cloudflare products or services may have usage-based components which bill in the arrears. All capacity usage that is over the monthly allowance will be billed in arrears on a monthly basis.
- Provider's Obligations. The Provider is responsible
for the following in accordance with industry best practices (as applicable):
- For each quantity of 11:11 Managed AWS Direct Connect Hosted On-ramp connection specified in Offer, provision an AWS Direct Connect Hosted connection with the corresponding bandwidth; and
- For each quantity of 11:11 Managed AWS Direct Connect Dedicated On-ramp connection specified in Offer, provision an AWS Direct Connect Dedicated connection via a physical cross connect to the AWS on-ramp router.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- AWS Direct Connect (DX) port hour charges and data transfer charges as outlined at https://aws.amazon.com/directconnect/pricing/;
- Public IP addresses to support public Virtual Interface (VIF) peering;
- Providing AWS Account ID, VLAN IDs, and other details as necessary for Provider to provision the service;
- Ordering the Dedicated DX port from AWS and providing LOA to Provider for physical extension for each 11:11 Managed AWS Direct Connect On-ramp (Dedicated DX) service specified in the Order;
- Hosted Connection Cancellation. If Customer chooses to cancel an 11:11 Managed AWS Direct Connect
Hosted On-ramp connection, the following obligations and responsibilities apply:
- Decommissioning of AWS side connection. Prior to submitting a request for disconnection to the Provider, Customer agrees to undertake the decommissioning of the AWS side of the Direct Connect connection. Decommissioning entails the removal of all network configurations, resources, and associated infrastructure pertaining to the AWS Direct Connect service. This includes, but is not limited to, the termination of Virtual Private Gateways (VGWs), Virtual Interfaces (VIFs), Direct Connect Gateway (DXGW), and associated networking components within the AWS environment,
- Confirmation of decommissioning. Customer shall provide evidence of the decommissioning of the AWS side of the Direct Connect connection to Provider. This evidence may include screenshots, network diagrams, or other documentation demonstrating the removal and cessation of relevant AWS resources and configurations,
- Compliance with Provider Procedures: Customer acknowledges and agrees to comply with any additional procedures or requirements stipulated by Provider regarding the cancellation and decommissioning process for AWS Direct Connect services, and
- Non-Compliance: Failure to adhere to the decommissioning requirements outlined herein may result in additional charges, penalties, or liabilities imposed by Provider.
- Provider's Obligations. The Provider is responsible
for the following in accordance with industry best practices (as applicable):
- Providing contact information for Customer to report Customer-Owned telecommunications degradation or service disruptions;
- Investigating reported issues and work with the telecommunications vendors to identify root causes;
- Managing the lifecycle of reported incidents from initial identification through resolution and closure;
- Escalating complex or severe issues to higher-tier Support teams within the telecommunications provider for further investigation and resolution;
- Keeping Customer informed periodically of progress updates, expected resolution timelines, and any Customer action items; and
- If necessary, assisting the Customer in obtaining an LOA to allow the Provider’s Support team to raise issues on its behalf.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Reporting Customer-Owned telecommunications incidents, circuit degradation or service disruptions to the Provider’s Support team;
- Notifying the Provider of any changes in circuit type, ranging from upgrades or downgrades to cancellations with third-party vendors;
- Cooperating with Provider’s Support technicians and telecommunication service providers, providing information, and following provided guidance and instructions for troubleshooting technical difficulties and/or incident management;
- Allowing for escalation of issues by the Provider’s Support team when necessary; and
- Providing the necessary LOA to the Provider authorizing its Support team to raise issues on its behalf.
- Resources.
- Operating System (OS). Customer licensed Operating Systems contracted to receive Managed Operating
System services.
- OS updates are contracted on a per VM basis,
- OS updates with OS management services are contracted on a per VM basis, and
- OS updates and OS updates with OS management services are mutually exclusive and may not be associated with the same VM.
- Operating System (OS). Customer licensed Operating Systems contracted to receive Managed Operating
System services.
- Service Delivery Management. The Customer shall appoint an individual who will serve as the primary contact point for the Provider in connection with ongoing lifecycle management and delivery of the services, and the Provider shall appoint a point of contact.
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Maintaining the underlying OS monitoring and software update tools and processes to facilitate delivery of Managed Operating System services;
- Maintaining a secure process for managing administrative rights and password security for each Managed OS;
- Providing Customer with one or more methods of access to Provider resources, supporting communications related to both scheduled and reactive OS management tasks and functions;
- Providing initial configuration of Managed Operating System services, including automated OS update scheduling for OS updates;
- Identifying specific change control processes as applicable;
- Establishing monitoring thresholds and notification preferences for OS Updates with OS Management services;
- In case of Provider-assisted OS restoration, initiating the OS restore process from the most recent available backup or as directed by Customer; and
- In-place OS version upgrades (e.g. 1.x to 2.x) are not included with either OS updates or OS updates with OS management services and are not generally recommended, however, in-place OSS version upgrade services are available under certain conditions and may be contracted for an additional per incident per OS fee if Customer accepts the associated risks.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Providing and maintaining vendor supported versions of OS software either directly or through
Provider’s Services via a separate licensing Order;
- For Customer provided OS licenses, providing verification of licenses and necessary license keys applicable to Customer-provided software prior to service provision by Provider
- Providing system administration security-level (e.g. admin or root-level) access for each managed OS and, if Customer retains system administration security-level access, permit such access to be traced by Provider;
- Providing information reasonably requested to fulfill its obligations, including, without limitation, OS configuration and support parameters and access to backup data specific to any supported OS;
- At the Customer’s discretion, restoring an OS either through the self-service 11:11 Cloud Console or by requesting support from the Provider; and
- Having sufficient storage available to support each Managed OS per OS vendor recommendations.
- Providing and maintaining vendor supported versions of OS software either directly or through
Provider’s Services via a separate licensing Order;
- Risks.
- Should an applied OS patch, OS update or OS upgrade result in a failure of the OS to restart or if any other functional problems are introduced via the referenced OS changes, the sole remediation action available from Provider is the restoration of the effected VM(s) from an available backup as directed by Customer;
- Resources. Managed Database(DB). Customer licensed
database contracted to receive Managed DB services:
- Initial database installation and configuration on pre-provisioned 11:11 infrastructure, which must include 11:11 OS updates with 11:11 Managed Operating System services and backup services that are compatible with the contracted database.
- Service Delivery Management - Points of Contact. The Customer and Provider shall each appoint an individual who will serve as the primary points of contact points for ongoing lifecycle management and delivery of the services.
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Maintaining the underlying database monitoring and software update tools and processes to facilitate delivery of Managed Database services;
- Establishing monitoring thresholds and notification preferences for database software updates;
- 24x7x365 database incident management;
- Database Change and problem management;
- Database configuration changes, subject to Customer's approval;
- Escalation and coordination of issues and recommendations with database vendors as and when required, subject to Customer approval;
- Database cloning from production data;
- Database restores from exports, database dumps or backups;
- Maintaining a secure process for managing administrative rights and password security for each managed database;
- Outside of available Per Incident Database Upgrade services, database software updates are limited to minor/point releases, which are subject to testing in a Customer’s environment (unless under emergency maintenance conditions) and Customer approval;
- Providing Customer with one or more methods of access to Provider resources, supporting communications related to both scheduled and reactive database management tasks and functions; and
- In case of Provider-assisted database restoration, Provider will initiate the database restore process from the most recent available backup or as directed by Customer.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Providing and maintaining vendor supported versions of database software either directly or through Provider’s Services via a separate licensing Order;
- Providing verification of Customer provided database licenses and necessary license keys applicable to Customer-provided software prior to service provision by Provider;
- Providing system administration security-level (e.g. admin level) access for each managed database and, if Customer retains system administration security-level access, permit such access to be traced by Provider;
- Providing information reasonably requested to fulfil its obligations, including, without limitation, database configuration and support parameters and access to backup data specific to any supported database;
- Having sufficient storage available to support each managed database per database vendor recommendations; and
- Providing a means of testing applied database patches, database updates or database upgrades to facilitate Customer validation of database performance and functionality.
- Risks.
- Should an applied database patch, database update or database upgrade result in a failure of the database to restart or if any other functional problems are introduced via the referenced database changes, the sole remediation action available to Customer by Provider is the restoration of the impacted database from an available backup as directed by Customer.
- Managed Database Services do not include:
- Support for any database configurations that are not supported or recommended by the database vendors,
- Application security policy definition, creation or enforcement,
- Application, modification or deletion of database objects, schemas, views, procedures, functions and jobs via database management tools,
- Resolution of issues caused by software or applications not managed by Provider, and
- Major database version upgrades, which are subject to additional fees and an Order.
- Resources.
- Replication Storage. The resources that comprise the 11:11 DRaaS for Cohesity service are provided by Shared Equipment that provides storage capacity in a multi-tenant environment;
- IaaS Storage. The types of storage available are Accelerated, and/or SSD. Storage types comprising the environment are specified in the Order;
- CPU & RAM. These Cloud Resources are available as Shared Resources. CPU & RAM comprising the environment are specified in the Order;
- Bandwidth. Bandwidth is included, subject to abiding by the Excessive Use Section on the Acceptable Use Policy;
- Licensing. All required licensing is included in the 11:11 DRaaS for Cohesity service; and
- Business Models. Capacity is available in a reserved plus burst business model for Shared Equipment as specified in the Order.
- Provider’s Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Onboarding the Customer into the Provider's Cloud Services by giving access to the service and guiding the Customer through the process of deploying the service;
- Providing documentation, project management, and demonstrate the failover steps for a full site failover to the Customer on the Provider's test environment. In the event that a Customer would like the Provider to assist with design, implementation or testing of a partial site failover, additional i-Tech fees will apply;
- Providing ongoing support and education to the Customer about the Service upon request;
- Creating Virtual Data Center(s) consisting of compute, memory, storage infrastructure, and network bandwidth per specifications detailed in the Order;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage and networking by following the Provider’s guidelines for managing these environments;
- Providing the Customer with the URL and authentication credentials to access the Customer’s Cloud Resources;
- Assigning external and internal IP addresses for the Recovery Site virtual router per the Customer-provided requirements;
- In case of Provider-assisted Failover, assisting Customer with initiating Failover at-time-of-Disaster;
- In the event of a Disaster and Failover to the Recovery Site, the Provider can, if needed, assist the Customer with Failback from Disasters to Customer Primary Site for additional i-Tech fees;
- Fulfilling Customer requests for increased capacity and other change; and
- Providing ongoing updates, patching and maintenance for all the Provider-supplied service components
required for delivery of the 11:11 DRaaS for Cohesity service, to include:
- Infrastructure hosting the off-site replicas, and
- Software components used by the 11:11 DRaaS for Cohesity service.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Unless specified on the Order, implementing dedicated physical or virtual network security appliance, managing Firewall(s) including but not limited to the configuration of Network Address Translation (NAT) Access List, Virtual Private Network (VPN), Dynamic Host Configuration Protocol (DHCP), Load Balancing, and static routing;
- Providing compute, memory, storage and network requirements for each Virtual Data Center and creating Virtual Data Center network and role-based security policies;
- Ensuring that only VMware based Workloads are replicated to the Provider and that the Virtual Machine environment matches specifications as defined in the Provider’s Product Compatibility Matrix. By purchasing this product, the Customer specifically acknowledges that workloads other than VMware vSphere are not supported;
- Configuring Cohesity Protection at the Primary Site; Creating Recovery Groups and initiating replication on Virtual Machines selected for replication;
- Notifying the Provider before making any changes to the Primary Site that might affect the DRaaS service, including but not limited to, any upgrades or patches to Cohesity, the underlying virtualization layer, or the network;
- Ensuring Virtual Machines match specifications as defined in the Provider’s then-current Product Compatibility Matrix;
- Creating and testing Recovery Plan;
- Initiating Failover at-time-of-test and at-time-of-Disaster;
- In case of Provider-assisted Failover, declaring a Disaster following the Provider’s guidelines;
- Maintaining operating systems and applications installed on the Customer's Virtual Machines or in the Customer's Virtual Data Center, including, but not limited to, providing support, patching, upgrades, updates and anti-virus software in accordance with industry best practices. Compatible firmware or software updates to all Customer-owned Cohesity hardware, and software used in production that replicates to the Provider’s target;
- Providing Virtual Machine and application log monitoring;
- In the event of a Disaster and Failover to the Recovery Site, in order for the Customer to Failback to the Primary Site, the Customer needs to recreate the original environment in the Primary Site by providing similar compute, memory, storage and network resources, Virtual Machines on the Customer's hosts, Cohesity Cluster, enable site peering to Recovery Site, set up and configure Replication Groups and Policies before replicating data from Recovery Site. The Customer is responsible for paying the associated i-Tech fees if assistance from the Provider is required;
- Promptly notifying the Provider if the Cloud Resources are compromised, accessed by a person lacking permission to access the Cloud Resources, or infected with a virus, worm or similar malicious code;
- Informing the Provider at the time any of these changes occur in the Primary Site:
- Increasing resource capacity in Primary Site in relation to replicated Virtual Machines without increasing Cloud Resources at Recovery site, and
- Ensuring that there is enough bandwidth at Primary Site to enable initial replication and successive incremental changes of data to Recovery Site; and
- Prior to the expiration or termination of any 11:11 DRaaS for Cohesity service, migrating and permanently deleting all of its Customer data residing on the Provider’s target environment. Such data migration and deletion obligations are at the Customer’s expense, unless otherwise agreed between the Customer and the Provider in a SOW for data migration services.
- Risks.
- Failing to notify Provider before making any changes to the Primary Site may impact the performance and functionality of the DRaaS service;
- Testing can be interrupted and/or stopped by the Provider if a Testing event has run long enough to impact replication or the underlying infrastructure; and
- Where Customer’s utilization exceeds the specifications set out on the Order, Customer may experience performance degradation or errors caused by over allocation.
- Encryption.
- Storage Encryption. Replication Storage is encrypted at rest with AES-256 CBC (Cipher Block Chaining).
- Service Levels.
- Service Levels. Recovery Time Objective (RTO) and Recovery Point Objective (RPO) SLAs are accessible at https://1111systems.com/legal/sla/
- Recovery Testing.
- All recovery testing should last no longer than seventy-two (72) hours. If the failover test is to exceed 72 hours, this will be considered a permanent failover, and the Customer must commit to migrating virtual machines from Replication Storage to IaaS Storage;
- If the Customer is unable to migrate failover workloads after seventy-two (72) hours
- The Provider holds the right to power down the failover test environment, and
- The Customer can ask for assistance from the Provider to migrate workloads for an agreed upon i-Tech fee.
- Provider's Obligations. For network environments
within scope, Provider is responsible for the following in accordance with industry best practices:
- Providing an audit of preexisting customer network documentation;
- Providing a review and analysis of overall network performance;
- Providing a review and analysis of overall network health;
- Providing a review and analysis of overall appliance health; and
- Providing a review and analysis of overall network security across OSI Layers 1 — 3.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing Provider’s engineers full administrative access to network appliances, portals, and environments within scope;
- Providing Provider’s engineers with one (or more) technical points of contact;
- Providing Provider with up-to-date network documentation for sites within scope (where available);
- Engaging and coordinating with Provider’s engineers on any network changes required to facilitate the delivery of services; and
- Ensuring any necessary vendor support contracts and licensing required for completion of project objectives are in place and active.
- Provider's Obligations. The Provider is responsible
for the following in accordance with industry best practices:
- Providing a review and analysis of WAN-specific firewall policies for each edge firewall appliance within scope;
- Providing a review and analysis of current and historical bandwidth trends for each edge firewall appliance within scope;
- Providing a review and analysis of current and historical bandwidth trends for each edge network appliance within scope;
- Providing a review and analysis of advanced WAN metrics (where applicable) for each WAN circuit or logical connection within scope;
- Providing a review and analysis of provider cost and resiliency posture against Provider’s services for each WAN circuit within scope; and
- Providing a review and analysis of edge network appliance, circuit, and configuration redundancy across OSI Layers 1 — 3 for each site within scope.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing Provider’s engineers full administrative access to network appliances within scope;
- Providing Provider’s engineers with (one or more) technical points of contact;
- Providing Provider with up-to-date network documentation for sites within scope (where available);
- Providing Provider with necessary circuit details which are not discoverable; and
- Ensuring any necessary vendor support contracts and licensing required for completion of project objectives are in place and active.
- Resources. The Provider is responsible for the
following in accordance with industry best practices:
- Network Device Monitoring - Basic. For each quantity of Network Device Monitoring – Basic on an Order, Provider shall provide 1 license capable of ICMP up/down monitoring for a single network endpoint;
- Network Device Monitoring - Advanced. For each quantity of Network Device Monitoring – Advanced on an Order, Provider shall provide 1 license capable of SNMPv3 monitoring for a single network endpoint;
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- 24x7 monitoring of network devices, with email notifications to Customer for critical events and thresholds as defined at https://success.1111systems.com/article/0rdysi
- Onboarding customer design requirements form;
- Adding monitored devices into Providers monitoring collection platform;
- Verifying connectivity to Customer;
- Configuring Customer email contacts within Providers monitoring collection platform; and
- Coordinating testing and monitoring notification with Customer during planned maintenance window.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Completing Customer’s onboarding form for network devices to be monitored;
- Providing compute resources for local probe collectors;
- Installing and configurating local probe collectors;
- Configuring SNMP configuration for monitored network devices;
- Configuring local network and firewall policies as necessary to facilitate connectivity for local probe collectors and Provider monitoring collection platform;
- Providing a list of Customer email addresses for monitoring notifications;
- Notifying Provider of any changes to Customer email addresses;
- Notifying Provider of any network device removals that are being monitored by Provider;
- Notifying Provider of any new network devices to be monitored by Provider; and
- Contracting for additional Network Device Monitoring resources as required for new network devices
- Compatibility.
- Network Device Monitoring - Basic. All make and model network devices with a layer 3 ipv4 address that can respond to ICMP ping requests are supported; and
- Network Device Monitoring - Advanced. Refer to https://success.1111systems.com/article/0rdysi for a list of known supported network devices. Not all metrics or thresholds are guaranteed to be monitorable. Device metrics and available thresholds to monitor against may vary from device to device and may vary depending on the monitored network device SNMP version.
- Scope. The Fortinet Firewall Migration Service is
comprised of the following:
- Basic - Firewall migration of Access Control Lists (ACLs), Network Address Translations (NATs), Virtual Private Networks (VPNs), network objects, and routing configuration;
- Advanced - Basic + Software-Defined Wide Area Network (SD-WAN), and Next-Generation Firewall (NGFW) security profile configuration; and
- Complex - Advanced + third-party software integrations, complex/niche custom configurations, and any Basic/Advanced elements that require extensive manual modifications.
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Assessing current network state via network discovery process;
- Developing a migration plan in coordination with customer which includes: identifying required change procedures, plan phases, timeline, goals and requirements, network tests, and criteria for success;
- Migrating firewall(s) based on migration planning; and
- Providing up to four (4) hours of post-migration troubleshooting and support.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Providing full administrative access to network appliances, portals, and environments within scope to Provider’s engineers;
- Providing one (or more) technical points of contact to Provider’s engineers;
- Providing any points of contact necessary to facilitate firewall configuration and testing against Customer-managed resources (e.g., authentication services, remote VPN gateways, WAN circuits, etc.) to Provider’s engineers;
- Providing up-to-date network documentation for sites within scope (where available) to Provider’s engineers;
- Engaging and coordinating with Provider’s engineers on any network changes required to facilitate the delivery of services; and
- Providing application testing plans and criteria for success to Provider’s engineers.
- Assumptions and Risks. The Provider utilizes purpose-built software for firewall
configuration migrations. In some cases, the migration of certain configuration elements may not be
supported. For all configuration elements supported, the below limitations apply:
- ACLs and firewall policies. In cases where manual modifications are needed, Provider’s engineers will manually modify no more than twenty-five (25) rules per firewall;
- Network Objects. In cases where manual modifications are needed, Provider’s engineers will manually modify no more than twenty-five (25) objects per firewall;
- Network Address Translations. In cases where manual modifications are needed, Provider’s engineers will manually modify no more than twenty-five (25) NATs per firewall;
- Site-to-Site VPNs.
- In cases where manual modifications are needed, Provider’s engineers will manually modify no more than 5 VPNs per firewall, and
- In cases where VPN parameters do not migrate identically one-for-one, Provider’s engineers will use the vendor's default parameter set, unless otherwise requested by the customer;
- Remote Access VPNs.
- In cases where manual modifications are needed, Provider’s engineers will manually modify no more than 5 VPNs per firewall, and
- The customer will be responsible for all end-user related communications, processes, and technical requirements related to migration of remote-access VPNs;
- Authentication mechanisms. None;
- Centralized management platform/system. Provider does not support the migration of centralized management platforms (e.g. Palo Alto Panorama, or similar);
- SD-WAN. None;
- Routing protocols. None;
- Static routes. In cases where manual modifications are needed, Provider’s engineers will manually modify no more than twenty-five (25) static routes per firewall;
- High Availability (HA). None;
- Software version update. Provider’s engineers will update the new/replacement firewall(s) to the latest vendor-recommended software version prior to migration, but not afterward;
- NGFW security profiles. In cases where NGFW security profiles do not migrate identically one-for-one, Provider’s engineers will implement the default security profile for each specific NGFW feature; and
- Logging. None.
- Resources.
- Backup Policies. The policies that define the Cohesity Protection Policy that includes the Archive Schedule used for Cyber Vault for Cohesity. The policies define that a full archive is created with incremental updates thereafter to an external S3 target;
- Backup Groups. Backup Groups are a defined group of Virtual Machines and backup agents that are backed up according to a defined Backup Policy;
- Licensing. All required licensing from Cohesity (Cloud Archive licensing) is included in the service; and
- Business Models. Storage is available in a Reserved plus Burst model.
- Provider's Obligations. The Provider is responsible for the following in accordance with
industry best practices:
- Configuring the external S3 target as specified by the Order;
- Providing ongoing support and education about the Service at the Customer's request;
- Maintaining the underlying cloud infrastructure components such as compute, memory, storage, and networking by following Provider's guidelines for managing these environments;
- Monitoring of archive job performance, SLAs, Backup Policies, and Backup Groups;
- Assisting the Customer with initiating the restore from the archive data upon request; and
- Creating and Maintaining the Archive Policy settings of a Backup Policy upon request.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices:
- Providing all information reasonably required and requested by Provider to fulfill its obligations including without limitation archive requirement details;
- Restoring archive. Provider will provide reasonable support with archive restoration upon request by Customer;
- Not exceeding the reasonable data egress standard defined above and/or paying for data egress charges where the data egress standard is exceeded;
- Promptly notifying the Provider if the Cloud Resources are hacked, accessed by an unauthorized third party, or infected with a virus, worm or similar code;
- If the Customer provisions Reserved Resources in excess of the specifications set out on the Order, the Customer hereby acknowledges that the Provider is not responsible for any performance degradation, loss of archive data, or errors caused by over allocation, this includes the storage necessary for processing the archives, which could result in archive storage Burst charges; and
- For the Customer to restore archived Virtual Machine data, the Customer must have sufficient storage available. If the Customer does not have sufficient storage available, the Customer may have to purchase more storage to make the restoration possible;
- Data Egress.
- Data egress, from an acceptable use policy perspective, is comprised of two components: Data Retrieval API calls and Data Transfer out to the Internet;
- This service uses Amazon S3 Standard Infrequent Access class, data egress charges are included if usage patterns are deemed reasonable for the service offering. Reasonable data egress shall mean allowed egress of up to 50% of the highest of contracted or total stored data, measured in GB per month per region, within the Customer account; and
- The Provider reserves the right to charge for any data egress exceeding the reasonable data egress standard above.
- Serverless Compute Services.
- This service uses Amazon Lambda serverless compute service. Request and duration charges are included if usage patterns are deemed reasonable for the service offering. Reasonable usage is limited to only include compute service usage required for archive processes within the Customer account; and
- If the Provider determines (in its sole discretion) that the Customer has exceeded the reasonable usage of Amazon Lambda services, the Provider will (1) notify the Customer of such usage, (2) advise the Customer to upgrade its Order in order to reflect the additional usage, and (3) invoice the Customer for the costs associated with the additional license usage during the corresponding period. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to unilaterally increase the number of resources on the Customer Order in order to true it up. The Customer agrees to pay any invoices or charges for any additional Amazon Lambda services or back charges allowed under this Section.
- Risks.
- There may be times where the Provider’s service is unable to perform archives. Reasons for archive job failures include, but are not limited to, situations where a job is unable to start during retry windows, services are temporarily unavailable, and conflicts occur between resources. Where such failure occurs, the Provider will use reasonable efforts to attempt to remedy any potential archive job failures, and Customer shall hold Provider harmless in the event that an archive job did not occur successfully.
- Provider’s Obligations. The Provider is responsible
for the following in accordance with industry best practices:
- Providing the services as outlined in the applicable Basic and Advanced Managed Appliance Section 3.25;
- Maintaining monitoring, support, and management activities consistent with the selected service level, excluding responsibilities explicitly assumed by the Customer through administrative access;
- Provider reserves the right to audit configuration logs and system activity for the purposes of incident investigation and change attribution;
- Provider shall not be held liable for any data loss, corruption or cyber incidents resulting from Customer-made changes, including, but not limited to, deletion of firewall rules, logs, objects, or configurations;
- Provider reserves the right to revoke the Customer’s administrative access in the event of a security incident, repeated misconfigurations, unauthorized access, or violations of this agreement. Administrative access may also be suspended during critical troubleshooting or remediation efforts;
- Provider shall not be held liable for any Service Level Agreement (SLA) or Service Level Objective (SLO) violations resulting from Customer-made changes;
- Provider reserves the right to enhance the co-managed service by adding change management capabilities into its customer portal or console platform in the future. As part of this enhancement, Provider may transition administrative access to a permission-based interface and disable direct administrative rights to the firewall device(s). Customer will be notified in advance of such changes; and
- Provider reserves the right to charge the Customer on a time and materials basis for extended or repeated outages, service degradation or false alerts caused by Customer-initiated changes that result in excessive troubleshooting or remediation efforts by the Provider. The Customer will be notified in writing in advance of such charges.
- Customer's Obligations. The Customer is responsible for the following in accordance with
industry best practices (as applicable):
- Making configuration changes in accordance with its internal change management policies and firewall(s) access rights;
- Assuming full responsibility for any changes made to the firewall device(s), including, but not limited to, any outages, performance degradation, misconfigurations, or security breaches resulting from those changes;
- Managing all user accounts and access permissions associated with the firewall(s), including, but not limited to, VPN, provisioning, deprovisioning, and auditing access on an ongoing basis;
- Providing, managing, and auditing its firewall configuration to ensure they align with the organization’s security, compliance, and operational requirements;
- If the firewall device becomes unreachable or unrecoverable, and there is no corresponding support ticket confirming the change was made by the Provider, the Customer will be deemed solely responsible for the resulting incident;
- Customer is fully responsible for any firewall configuration changes not associated with an open or documented Provider's support ticket;
- Customer must notify the Provider of any changes made to the firewall(s) by opening a support ticket with the Provider immediately following the change. This notification must include a brief description of the change and the time it was implemented;
- Performing a full backup of the firewall configuration immediately before and after each change. Provider is not responsible for restoring or recovering configurations unless the backup was performed prior to the change;
- Securely storing any pre-shared keys (PSKs), credentials, or other sensitive security parameters generated or modified by the Customer. Provider does not retain or manage customer-generated PSKs;
- Customer is fully responsible for any changes, configurations, or access granted to third parties, including consultants, contractors, or other service providers; and
- Maintaining an accurate and up-to-date change log that documents all configuration changes made to the firewall(s), including the date, time, nature of the change, and the user who performed it. This log must be maintained outside of the firewalls and made available to the Provider upon request for troubleshooting, audit, or incident investigation purposes.
- Resources.
- Licensing. Microsoft licensing as described in the Order; and
- Business Models. Licensing is available in a reserved only model.
- Provider's Obligations. The Provider is responsible for the following in accordance with industry best practices:
- Maintaining an active and valid SPLA agreement with Microsoft to ensure uninterrupted access to Licensed Software, for the duration of the Customer’s subscription term;
- Submitting accurate monthly License Usage Reports (LURs) to Microsoft on behalf of the Customer, based on usage data provided by the Customer or collected through Provider’s metering systems;
- Implementing reasonable measures to ensure Customer compliance with Microsoft’s SPLA Terms and Conditions, Product Terms, and Online Services Terms, including notifying Customers of any identified non-compliance and assisting with remediation;
- In the event of a Microsoft audit, the Provider shall cooperate with Microsoft or its designated auditing firm, providing necessary usage data and documentation while coordinating with the Customer to address audit requirements; and
- Provider shall promptly notify the Customer of any discrepancies in reported usage and work with the Customer to resolve inaccuracies.
- Customer's Obligations. The Customer is responsible for the following in accordance with industry best practices:
- Complying with the Microsoft SPLA Terms and Conditions, Product Terms, and Online Services Terms, as applicable, governing the use of Licensed Software;
- Providing accurate user, device, or resource count data to the Provider for inclusion in monthly License Usage Reports, as required by Microsoft. Provider reserves the right to audit Customer’s usage of Licensed Software for compliance with Microsoft’s SPLA terms, in coordination with Microsoft or its designated auditing firm;
- Notifying the Provider of any changes in usage, such as additional users, devices, or cores, within five (5) business days to ensure accurate reporting;
- Licenses provided under this Section are subscription-based, non-perpetual, and limited to use within Provider’s hosted services or Customer’s environments explicitly authorized in the Order;
- Certain Licensed Software, such as Windows Server, may require SALs for each user or device accessing the software, regardless of whether the software is actively used; and
- If the Provider determines (in its sole discretion) that the Customer has exceeded the reserved license count, the Provider will (1) notify the Customer of such usage and (2) advise the Customer to upgrade its Order to reflect the additional usage. If the Provider advises the Customer to upgrade its Order in the preceding sentence and the Customer does not upgrade its Order within 30 days after receiving that notice, the Provider reserves the right to charge for any additional licenses. The Customer agrees to pay any invoices or charges for any additional licenses under this Section.
- Resources.
- Licensing. Broadcom VMware Cloud Foundation core licenses with a minimum of 16 cores per physical CPU socket as mandated by Broadcom, and add-on licensing as described in the Order;
- Business Models. Licensing is available in a reserved plus burst business model for VMware Cloud Foundation cores and a reserved only model for add-ons; and
- Software Downloads. Software downloads required for licenses on the Order are made available to Customer by the Provider.
- Provider's Obligations. The Provider is responsible for the following in accordance with industry best practices:
- Licensing Support. Providing support for VMware licensing issues, with escalation to Broadcom’s Global Support Services (GSS) as necessary. Support includes guidance on license activation, usage metering, and compliance;
- VMware Support. Providing support for VMware operational issues for licensed products on the Order, with escalation to Broadcom’s Global Support Services (GSS) as necessary. Support includes guidance on installation issues, VMware management, updates and patching;
- Usage Meter Configuration. Usage monitoring and reporting through the Broadcom VMware Usage Meter owned and operated by the Provider, ensuring accurate tracking and reporting of license consumption for billing and compliance;
- License Key Creation. Providing Customer specific license key files for each version of VMware vSphere and add-ons to be licensed using an SLO of 5 days following order completion;
- Core Burst Billing. Provider shall bill Customer for burst VMware Cloud Foundation core license usage at contracted rates up to a 20% overage and Month-to-Month pricing for any overages beyond 20% contract overage; and
- For Flexible Cloud Environment.
- Should an Order contain VMware licensing, the Provider shall provide support exclusively for VMware licensing issues, with escalation to Broadcom’s Global Support Services (GSS) as necessary. Support includes guidance on license activation, usage metering, compliance, guidance on installation issues and VMware management, and
- Should an Order contain VMWaaS, the Provider shall also provide support for VMware operational issues for licensed products on the Order, with escalation to Broadcom’s Global Support Services (GSS) as necessary. Support includes guidance on installation issues, VMware management, updates and patching.
- Customer's Obligations. The Customer is responsible for the following in accordance with industry best practices:
- Licensing Licensing all Broadcom VMware software in use and to work with the Provider to confirm accurate licensing requirements;
- License Compliance. Complying with Broadcom’s General Terms, Software Exhibits, and Product Guide, as applicable, governing the use of VMware Cloud Foundation and related add-ons;
- License Minimums. Ensuring a minimum of 16 VMware Cloud Foundation cores are licensed per physical server CPU socket; and
- License Renewals. Ensuring timely payment of subscription fees, including any surcharges for late renewals as specified by Broadcom (e.g., a 20% surcharge on first-year subscription renewal fees for missed renewal deadlines).
- Licensing Restrictions. The following restrictions apply when licensing VMware Cloud Foundation and add-ons:
- Licenses provided under this Section are subscription-based and do not confer perpetual rights. Customer may not renew support for existing perpetual VMware licenses through the Provider unless explicitly permitted by Broadcom;
- VMware Cloud Foundation core licenses include 1 TiB of vSAN entitlement per core, which may be aggregated across VMware Cloud Foundation core licenses only. Additional vSAN capacity may be purchased as needed;
- Customers are prohibited from applying maintenance releases, updates, patches, or enhancements to VMware software post-subscription expiration, except for critical zero-day security patches, as stipulated by Broadcom; and
- Provider reserves the right to audit Customer’s VMware deployment for compliance with license terms, in coordination with Broadcom or its designated auditing firm.
- Fees and Billing. The following apply when licensing VMware Cloud Foundation and add-ons:
- Subscription fees for VMware licenses are calculated based on the number of cores licensed, subject to Broadcom’s minimum core requirements and pricing structure; and
- Provider shall be the configured Broadcom partner when Usage Meter reports usage data to Broadcom, and Customers agree to cooperate with usage verification processes.