Annual Maintenance Contract

1) Type of AMC Services – List

a. Preventive Maintenance (PM)

  • Scheduled health checks (monthly/quarterly)
  • Cleaning, firmware/driver updates, patching
  • Performance optimization and capacity review
  • Backup verification and DR runbook validation

b. Corrective Maintenance (Break-Fix)

  • Diagnosis and resolution of hardware/software failures
  • Replacement of faulty parts (as per contract—OEM/third-party)
  • Escalation to OEM vendors for in-warranty items

c. Remote Support

  • Helpdesk L1/L2 via phone, email, portal
  • Secure remote assistance (with user approval)
  • Incident triage and resolution tracking

d. Onsite Support

  • Engineer visits for complex faults, deployments, or rollouts
  • Scheduled onsite days (as per SLA)

e. Software & Systems Maintenance

  • OS patching, antivirus/EDR management, DLP policy updates
  • Application updates (agreed scope), license compliance checks
  • Monitoring setup and alert tuning (SIEM/NMS, if applicable)

f. Network & Security Maintenance

  • Switch/router/firewall configuration backups
  • Firewall rule reviews; VPN posture checks
  • Wi-Fi health audits; NAC policy validation

g. Asset & Documentation Management

  • Inventory updates (hardware/software)
  • Configuration baseline and change logs
  • Warranty/AMC dashboard and reports

h. Optional Add-ons (if contracted)

  • Cloud support (M365, Azure, AWS)
  • Backup/DR drills and failover testing
  • Endpoint hardening and CIS benchmark alignment
  • Security awareness training

2) Agreements & Limitations (Before Offering Service to Customer)

Scope Confirmation

  • Detailed asset list with make/model/serial numbers
  • Locations covered, business hours, and access protocols
  • Supported software versions and configurations

Prerequisites

  • Stable power, cooling, and physical access provided by customer
  • Valid licenses/subscriptions for all supported software
  • Network connectivity for remote support tools (where applicable)

Exclusions / Limitations

  • Data recovery beyond standard backup restore (unless included)
  • Physical damage, accidents, misuse, liquids, fire, or acts of God
  • Unsupported/End-of-Life hardware/software not covered by OEM
  • Third‑party costs (OEM parts, shipping) unless explicitly included
  • Custom development, new deployments, and major upgrades (unless scoped)

Customer Responsibilities

  • Provide timely access and approvals
  • Maintain backups and share restore procedures
  • Inform us of any changes or third‑party activities that affect scope
  • Ensure compliance with safety/security policies for onsite work

Vendor Responsibilities

  • Deliver services per SLA; maintain documentation and logs
  • Assign qualified engineers; ensure confidentiality and compliance
  • Communicate risks, delays, and dependencies proactively

3) Terms and Conditions

Contract Term & Renewal

  • AMC term: 12 months (start/end dates defined in Order Form)
  • Renewal: 30 days prior to expiry, subject to revised commercials

Service Level Agreements (SLA)

  • Response:
    • Critical (P1): 1–2 hours
    • High (P2): 4 hours
    • Medium (P3): 8 business hours
    • Low (P4): Next business day
  • Resolution: Best‑effort based on complexity, vendor/OEM support, and parts availability
  • Onsite Dispatch: Within 24–48 business hours (as per plan)

Working Hours

  • Standard: 9:00–18:00, Monday–Friday (excluding public holidays)
  • After‑hours/weekend support available if contracted

Commercials & Payment

  • Payment milestones: 50% advance, 50% within 30 days of start; or as agreed
  • Taxes extra as applicable; pricing may adjust for market volatility (e.g., RAM costs) with written notice

Change Management

  • Changes to scope via approved Change Requests (CR) with impact on time/cost

Confidentiality & Compliance

  • Mutual NDA applies; adherence to applicable data protection laws
  • No sharing of credentials; access via approved methods only

Termination

  • Either party may terminate for breach with 30 days’ notice
  • Pro‑rata refunds/charges based on services delivered (as agreed)

4) Do’s

  • Do follow documented SOPs, change control, and approval workflows
  • Do take configuration backups before changes and verify after
  • Do apply security patches and updates per maintenance windows
  • Do log all incidents, actions, and resolutions in the ticketing system
  • Do use strong authentication (MFA) and least‑privilege accounts
  • Do encrypt data at rest and in transit where applicable
  • Do validate backups and conduct periodic restore tests
  • Do notify stakeholders before/after maintenance with clear impact notes
  • Do label and update asset inventory after any change
  • Do escalate vendor/OEM cases promptly and track to closure

5) Do Not’s

  • Do not perform changes without approvals or outside maintenance windows
  • Do not bypass security controls (firewalls, EDR, DLP, NAC)
  • Do not use shared or personal accounts for administrative tasks
  • Do not store customer data locally or on unauthorized devices
  • Do not disclose credentials or sensitive configurations via email/chat
  • Do not leave systems unpatched beyond agreed grace periods
  • Do not connect unknown USB devices or install unvetted software
  • Do not remove or relocate equipment without asset and cable mapping updates
  • Do not retain logs, data, or configs post‑contract beyond agreed archival policy

6) Security Points (Mandatory)

Access & Identity

  • Enforce MFA for admin and remote access; rotate credentials regularly
  • Implement least‑privilege and role‑based access control (RBAC)
  • Maintain Privileged Access Management (PAM) for break‑glass accounts

Endpoint & Network Security

  • EDR/AV with real‑time protection and weekly signature updates
  • Firewall rules reviewed quarterly; change requests documented
  • Network segmentation for critical systems; NAC for device compliance
  • Secure remote tools (TLS), session recording where required, time‑bound access

Data Protection

  • Backups: 3‑2‑1 strategy (3 copies, 2 media, 1 offsite/immutable)
  • Encryption (AES‑256 at rest; TLS 1.2+ in transit); key management policy
  • DLP policies for email, endpoints, and cloud storage

Monitoring & Incident Response

  • Centralized logging (SIEM/NMS); alert thresholds tuned
  • Defined IR playbooks: detection → containment → eradication → recovery → post‑mortem
  • 24/7 alerting optional; escalation matrix with contacts and SLAs

Compliance & Audits

  • Periodic security audits (quarterly/annual) and remediation tracking
  • Patch compliance reports and vulnerability scan summaries
  • Adherence to customer policies and applicable regulations

Physical Security

  • Controlled access to server/network rooms; visitor logs maintained
  • Secure cable management, UPS/power conditioning, and environmental monitoring
  • Asset tagging and tamper seals where required

7) Service Deliverables & Reporting

  • PM checklist reports (monthly/quarterly)
  • Incident & resolution summaries (weekly/monthly)
  • Asset inventory and warranty status updates (quarterly)
  • Security posture report (patch/vuln/backup status)
  • Annual review with recommendations and roadmap

8) Acceptance & Contact

  • The customer acknowledges the scope, SLAs, and limitations stated herein.
  • For escalations: Prashanth R, Email: admin@primesea.in, Ph: 9160884086
  • For scheduling: Kranthi R, Email: info@primesea.in, Ph: 9160884086