Create a bespoke document in minutes, or upload and review your own.
Get your first 2 documents free
Your data doesn't train Genie's AI
You keep IP ownership of your information
IT Managed Services Agreement
"I need an IT Managed Services Agreement for my Singapore-based fintech startup that's outsourcing all IT operations to a third-party provider, with particular emphasis on data security and regulatory compliance for financial services, starting from March 2025."
1. Parties: Identification and details of the service provider and client
2. Background: Context of the agreement and brief description of services
3. Definitions: Key terms used throughout the agreement
4. Services: Detailed description of IT services to be provided
5. Service Levels: Performance metrics and service level requirements
6. Charges and Payment: Pricing, payment terms, and invoicing procedures
7. Data Protection and Security: Obligations regarding data handling and security measures
8. Term and Termination: Duration of agreement and termination provisions
9. Confidentiality: Protection of confidential information
10. Liability and Indemnification: Allocation of risks and responsibilities between parties
11. Intellectual Property Rights: Ownership and licensing of IP related to the services
12. Force Majeure: Provisions for unforeseeable circumstances preventing performance
13. Governing Law and Jurisdiction: Specification of Singapore law and jurisdiction
1. Staff Transfer: Terms for transfer of employees when the agreement involves movement of staff from client to provider
2. Change Control: Process for managing changes to services, typically included for complex service arrangements
3. Business Continuity: Disaster recovery and business continuity provisions for critical services
4. Compliance with Specific Regulations: Additional regulatory compliance requirements for specific sectors (e.g., financial services, healthcare)
5. Third-Party Contracts: Management of subcontractors and third-party service providers
1. Schedule 1 - Service Description: Detailed technical specifications of services to be provided
2. Schedule 2 - Service Level Agreement: Detailed performance metrics, measurement methods, and penalties
3. Schedule 3 - Pricing Schedule: Detailed pricing structure, payment terms, and rate cards
4. Schedule 4 - Data Processing Agreement: Detailed data protection obligations and procedures under PDPA
5. Schedule 5 - Exit Plan: Procedures for service transition upon termination
6. Schedule 6 - Business Continuity Plan: Detailed disaster recovery and business continuity procedures
7. Schedule 7 - Security Requirements: Detailed security protocols, standards, and compliance requirements
8. Schedule 8 - Key Personnel: Details of key staff members and their roles in service delivery
Authors
Acceptance Criteria
Applicable Law
Authorized Users
Business Day
Business Hours
Change Control Procedure
Charges
Client Data
Client Systems
Commencement Date
Confidential Information
Data Protection Laws
Deliverables
Disaster Recovery Plan
Documentation
Emergency Maintenance
Force Majeure Event
Good Industry Practice
Help Desk
Incident
Initial Term
Intellectual Property Rights
IT Environment
Key Personnel
Maintenance Window
Managed Services
Personal Data
Priority Levels
Response Time
Resolution Time
Service Credits
Service Level Agreement (SLA)
Service Level Failures
Service Provider Systems
Services
Software
Subcontractor
Support Services
System Availability
Term
Third Party Software
Transition Period
Transition Plan
Virus
Working Hours
Service Provision
Service Levels
Charges and Payment
Client Obligations
Service Provider Obligations
Change Control
Data Protection
Confidentiality
Intellectual Property Rights
Security Requirements
Audit Rights
Warranties
Liability and Indemnification
Insurance
Force Majeure
Term and Termination
Exit Management
Business Continuity
Disaster Recovery
Personnel and Key Personnel
Subcontracting
Assignment and Novation
Dispute Resolution
Anti-Bribery and Corruption
Compliance with Laws
Notices
Third Party Rights
Entire Agreement
Variation
Severability
Waiver
Governing Law and Jurisdiction
Counterparts
Find the exact document you need
Download our whitepaper on the future of AI in Legal
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
Our bank-grade security infrastructure undergoes regular external audits
We are ISO27001 certified, so your data is secure
Organizational security
You retain IP ownership of your documents
You have full control over your data and who gets to see it
Innovation in privacy:
Genie partnered with the Computational Privacy Department at Imperial College London
Together, we ran a £1 million research project on privacy and anonymity in legal contracts
Want to know more?
Visit our Trust Centre for more details and real-time security updates.
Read our Privacy Policy.