Proactive Maintenance Clause Samples
Proactive Maintenance. For customers with a Kyos Assist or Kyos Serenity contract, in the event of an alert or identification of a Critical Incident, Kyos is authorized to take the necessary steps to restore the service to users by taking actions it deems appropriate, such as changing the configuration or installing an update on the Components included in the contract without waiting for the customer's agreement, particularly with respect to security incidents.
Proactive Maintenance. If included, all services described within this section will be provided by Concentric for the specified fee regardless of actual hours of work performed. Proactive Maintenance is provided for hardware that appears in the Hardware List included in this Agreement. If included, Concentric will monitor certain aspects of the IT infrastructure, as well as perform periodic routine scheduled maintenance (detailed in the following table) in order to minimize unexpected system shutdowns by resolving issues before they reach a critical nature. Upon completion of the scheduled service, Concentric will provide written confirmation the service was completed. Scheduled services will be provided during Standard Hours if service does not significantly impact network performance. Scheduled services that may significantly impact network performance, and are not urgently needed to maintain network security, will be scheduled during other hours as agreed upon by Concentric and the Customer. Standard Hours are considered Monday – Friday 7:30 am to 5:00 pm, excluding major holidays. The following table details the Proactive services included under this Support Agreement, and at what frequency: Proactive Maintenance N/A Twice Monthly Monthly Quarterly Twice Annually Annually Firewall Maintenance: Upgrade Firmware Review Security Logs & Backup Configuration ☒ ☐ ☐ ☐ ☐ ☐ Backup Review: Upgrade Firmware & Check Free Space Check and Back Up Configuration ☒ ☐ ☐ ☐ ☐ ☐ Server Maintenance: Review Windows System Logs Review Windows Services Apply Windows Updates Check Drive Free Space Verify & Update Anti-Virus Software Verify Backups Functioning Properly Back Up SCADA Applications, if Applicable Check UPS Operation (remotely, if possible) ☐ ☐ ☒ ☐ ☐ ☐ Server Infrastructure: Perform Updates for BIOS, Drivers, Firmware, etc. Review Server Hardware Operation ☒ ☐ ☐ ☐ ☐ ☐
Proactive Maintenance. Proactive maintenance (well check) can be included for up to five years. Please refer to “Acceptance of Proposal” section for detailed pricing schedule. A discount is applied for 3, 4 and 5-year agreements. The savings shown in the “Acceptance of Proposal” section reflects savings when purchasing 3, 4 and 5 years up front, as compared to renewing each year.
Proactive Maintenance. If included, all services described within this section will be provided by Concentric for the specified fee regardless of actual hours of work performed. Proactive Maintenance is provided for hardware that appears in the Hardware List included in this Agreement. If included, Concentric will monitor certain aspects of the IT infrastructure, as well as perform periodic routine scheduled maintenance (detailed in the following table) in order to minimize unexpected system shutdowns by resolving issues before they reach a critical nature. Upon completion of the scheduled service, Concentric will provide written confirmation the service was completed. Scheduled services will be provided during Standard Hours if service does not significantly impact network performance. Scheduled services that may significantly impact network performance, and are not urgently needed to maintain network security, will be scheduled during other hours as agreed upon by Concentric and the Customer. Standard Hours are considered Monday – Friday 7:30 am to 5:00 pm, excluding major holidays. The following table details the Proactive services included under this Support Agreement, and at what frequency: Proactive Maintenance Twice Monthly Twice Annually Annually N/A Monthly Quarterly Firewall Maintenance: • Upgrade Firmware • Review Security Logs & Backup Configuration ☐ ☐ ☐ ☒ ☐ ☐
