This agreement incorporates the following agreements, contracts, or policies as part of this agreement.
The Master Services Agreement contains all the legal terms and conditions, financial policies, and general terms that govern all services delivered by Summit technology.
The Microsoft Cloud Agreement contains the terms, conditions, and use rights of the Microsoft 365 platform and becomes effective on the date that we first provision any Microsoft licenses or services to your tenant.
For the purposes of this agreement “Base License“ refers to the Microsoft 365 E5 license.
For the purposes of this agreement “Frontline License“ refers to the Microsoft 365 F3 license.
For the purposes of this agreement “Onboarding Period“ refers to the first 90 days after an Agility 365 proposal has been signed by Client.
For the purposes of this agreement “Tenant“ refers to the entire Microsoft 365 environment of the Client. The tenant contains all the Microsoft licenses, applications, data, email, and other related metadata and information.
The term of this agreement shall be for one year from the date of the most recent Agility 365 proposal signed by Client. This agreement shall automatically renew each year unless Client provides written notice at least 30 days prior to the renewal date.
If Client elects to terminate this agreement early, an early termination fee equal to 20% of the remaining agreement amount shall be paid by Client.
This agreement allows for flexibility in the number of users on a monthly basis. If at any time over the course of this agreement the Client’s total number of users drops below 20% of the number of users at the onset of the agreement, Summit Technology may, at our discretion, increase the monthly per user fee to cover the additional overhead and maintenance costs.
Many IT service providers structure their operations around Service Level Agreements (SLA). These documents are generally cumbersome, lengthy, and contain a myriad of metrics in various matrices that the customer is supposed to navigate in order to hold the service provider accountable. We do not operate our business based on complicated and often meaningless SLAs.
Our Service Commitment is based solely on complete customer satisfaction. At our core, we are a customer service company that utilizes technology to enable our customers to achieve more.
Six core service commitments form the foundation of our philosophy of Great Service.
We strive to provide our clients and partners with as much access as they need to our people, resources, and expertise. This includes our senior leadership team. We will take the time to understand your unique needs and provide guidance on your use of technology to achieve your business goals. We ensure that we will be there to support you whenever you need us; 24 hours a day, 365 days a year.
We pride ourselves on responding to requests in an efficient, timely manner. We are continually looking for ways to improve our service offering and enhance our culture of Great Service. We greatly value your feedback, both positive AND negative.
We take extraordinary precautions to protect the information you give us. We will not disclose or sell your information to anyone unless requested by you or in instances where we are required by law. We ensure our service providers adhere to these same standards.
We believe that candid, transparent communication is a core requirement for any successful business relationship. We are committed to clearly explaining our products, how they can be used to enable your business goals, and create the desired outcomes. We are continuously innovating ways to create the best customer experience, but when we don’t, we will candidly and transparently commit all of our resources to resolving the problem and implement new practices to prevent the same occurrence in the future.
We will keep you up to date through the proper level of communication, custom tailored to your business, with regular proactive conversations, reporting on IT infrastructure, access to all technical documentation, processes, and procedures. Wherever possible, we aim to use simple language that is easy to understand.
We center every product and service we deliver on creating the best customer experience. We understand that we will continue to earn your business or lose your business based on the experience we create for you.
Your Microsoft 365 tenant, along with all the data, information, and communications stored there, belongs exclusively to you. We serve as caretakers and curators of your technology systems.
All of your data, files, intellectual property, and communications are exclusively yours and will always remain inside your Microsoft 365 tenant. Summit Technology does not store any of your company data.
All internet domain names, whether procured by you or procured by us, will always remain your exclusive property, and we will transfer them to any registrar you designate upon the termination of this agreement.
We collect and store the following data about your organization and technology.
We collect, store, and maintain contact information for each member of your organization and any subcontractor to your organization with login credentials to your Microsoft 365/Azure AD environment. We use this data to provide technical support and verify identities of all persons requesting support.
We create, store, and maintain technical documentation about your information technology environment for the purposes of providing technical support, enabling your team, and meeting regulatory compliance requirements. After the onboarding period is complete, you may request this documentation at any time.
As part of maintaining this documentation and an active agent, we may install an agent on each desktop, laptop, and server in your environment.
We may collect and store security and event logs from your environment for the purposes of providing technical support, troubleshooting, identifying trends, and reporting certain statistics to you.
We may track and store information on your particular computer hardware and software inventory for the purposes of providing efficient support, creating a better customer experience, and advising you on cost optimization opportunities.
Outside of your specific Microsoft 365 tenant, we also utilize the following systems to deliver and enhance the Agility 365 service to you. Contact, technical, and financial information related to billing and payments may be stored in these platforms.
Cloud Radial is the platform that we utilize to provide a customer portal for our Agility 365 clients. This portal will allow you to access certain things such as documentation specific to your organization, customize forms where you can make requests, and other reporting services.
The Cloud Radial security policy can be found here: Cloud Radial Security Policy
HubSpot is a widely used Customer Relationship Management (CRM) system. We use HubSpot to track all opportunities and proposals to our clients. The official HubSpot security policy can be found here: HubSpot Security Policy
ITGlue is an industry standard technical documentation system. We utilize this system to store and maintain all of the technical documentation for your information technology environment. The official security policy for ITGlue can be found here: ITGlue Security Policy
Quickbooks Online is an industry standard accounting system. All of our financial information for all of our clients flows back to Quickbooks Online. Their official security policy can be found here:
Quickbooks Online Security Policy
Stripe is our official payment processor for the Agility 365 service. If you elect to pay your monthly invoice online your financial information may be saved and recorded by Stripe. The link to their official security policy can be found here: Stripe Security Policy
Syncro is a professional services automation platform that we utilize to track service requests and enforce adherence to specific client processes. It integrates directly with ITGlue and Cloud Radial. The link to their official security policy can be found here: Syncro Security Policy
The Agility 365 suite is billed on a per user per month basis with the following terms.
The Agility 365 suite is designed to scale up or down on a monthly basis. Users can be added or removed at will throughout the life of the agreement.
On or about the first of each month you will be billed at the rate identified in the signed Agility 365 Proposal for the total active Base and Frontline licensed users that are active on the first day of the month.
When a new user is added to the Agility 365 suite, you will be invoiced for the cost of one month of service on the date they are added.
The Agility 365 suite monthly per user price is discounted based on the total number of Agility 365 users per the following schedule.
The following software licenses are specifically included for each respective class of user in your environment.
Any additional subscription-based licenses you purchase from us will be billed as a separate line item on your monthly invoice. These can include but are not limited to:
There are dozens of services included in the Agility 365 suite including but not limited to the following services.
Upon the initiation of this agreement, we will provide a dedicated telephone support number, a dedicated email address for support, as well as an online portal to initiate support requests. Remote technical support is available 24 hours a day, 365 days a year.
We will provide all regular maintenance, administration, monitoring, requested changes, and all other operational tasks related to your Microsoft 365 and Azure Active Directory environment.
Throughout the onboarding period we will create precise technical, architectural, and procedural documentation of your entire IT environment. Ongoing operational changes will be added to this documentation as they occur.
We will track all your desktops, laptops, and other devices such as printers. We will provide a report on these assets upon request which will include technical specs, age, and warranty status.
We may perform an attack simulation, up to four times per year, to determine how each of your team members will respond to a custom–tailored phishing attack. The results of these simulations will be provided to your designated IT contact. Each user who was compromised in the simulated attack will be contacted and referred to the cybersecurity training module inside of QuickHelp.
Using a variety of services and techniques, we will constantly scan the dark web for compromised credentials of each of your team members. If any compromise is detected, we will contact the employee directly and remediate the threat.
We will create an eDiscovery upon the written request from the designated IT contact and make those results available to the designated IT contact as well as any other team member or outside counsel requested by the designated IT contact.
We will provide an online portal that is customized to your organization’s specific needs. Your team can submit and track service desk tickets, access custom reporting dashboards, and more.
We will create a custom training and enablement portal for your team utilizing the QuickHelp platform from BrainStorm. The QuickHelp platform has an on-demand library of searchable, sharable videos focused on specific applications, as well as soft skills like organization and productivity to help your team get the most out of your technology.
There are more than 120 security, operational, compliance, and productivity features in the Microsoft 365 and Azure Active Directory platform. During the onboarding phase we will work directly with your team to identify the proper security, operational, compliance, or productivity features that will be utilized to enable and secure your business.
Once implemented, the technical, architectural, and procedural documentation for each component will be created and made available for your review on demand.
As part of the onboarding process we will work directly with your team to identify the technology metrics and related business intelligence that will be beneficial, insightful, or required for business planning. Based on your specific requirements these reports will be delivered monthly, quarterly, or on demand through real time dashboards.
The following services may be required to meet your specific business needs. Additional fees will apply based on usage, as indicated in the examples below.
To further enhance the security and productivity of your Microsoft 365 and Azure Active Directory environment, some additional Azure services may be required based on your specific business needs. The following components are the most commonly utilized across our customer base.
Azure Active Directory Domain Services (AADDS) – Is a service that runs in Azure and facilitates things such as adding physical or virtual servers to an Azure Active Directory domain, adding local or hosted applications that need to authenticate users via Active Directory and dozens of other services. This component is billed based on usage. The average price of this service for our small business customers is $150/month.
Network Policy Server (NPS) – Is a secure Windows server, running in Microsoft Azure, and joined to your Azure Active Directory domain that provides RADIUS authentication to various platforms that require it. This is most commonly used to allow Microsoft 365 / Azure Active Directory authentication to on premises systems such as corporate Wi-Fi networks to enhance security and meet regulatory compliance requirements. This component is billed based on usage. The average price of this service for our small business customers is $125/month.
Additional virtual servers, applications, or services hosted in Azure can be added to this agreement based on your organization‘s needs. Azure services are billed based on consumption or usage basis. Any Azure services added to this agreement will be quoted with estimated cost in a proposal and require the signature of an authorized signer from your organization prior to implementation.
The following minimum system requirements must be met for our team to be able to support your devices.
Technical support will be provided for all products delivered under this agreement, any commonly used software such as, Adobe Acrobat Reader, Google Chrome, etc., and meets the following operating system standards:
If support is requested on specialized software, we will support it as long as you have a support agreement with the software vendor that we are authorized to utilize on your behalf. If you do not have a support agreement on the specialized software, support will be limited to best effort only.
Support for desktop, laptop, tablet, and mobile devices will be provided with the following conditions:
The hardware must have a current manufacturer’s warranty in effect and Summit Technology must be authorized with the manufacturer to obtain support on your behalf.
Technical support is limited to operating systems and common software such as internet browsers and office productivity software. Support for specialized or custom developed software is limited to best effort only.
The following information, access, permissions, or restrictions are required for our team to support your organization efficiently and securely.
You will need to provide us with one or more individuals to serve as Authorized IT contacts. These people will be authorized to request changes to your environment, add or remove users from your environment, be notified of any security incidents or anomalies, and authorized to request other sensitive services such as email audits and legal eDiscovery requests.
If these contacts change, you must notify us as soon as possible.
To maintain the high levels of security, throughout the life of this agreement, no other companies, contractors, or consultants can be assigned Global Administrator privileges or assigned Delegated Administrator rights to your Microsoft 365 and Azure Active Directory tenants.
For your Microsoft 365 and Azure Active Directory environment to work correctly and efficiently we need to arrange your user accounts in the same structure as your organization chart. You will need to provide us a current organization chart to structure the accounts correctly during onboarding. Anytime the organization chart changes you must notify us so that we can make the appropriate changes to structure, permissions, and group membership.
From time to time it may be necessary for you to provide us specific letters of authorization (LOA). Scenarios where an LOA may be required include, but are not limited to, contacting your internet carrier to initiate support on your behalf, contacting a software vendor to obtain support on your behalf, or contacting a hardware manufacturer to obtain support on your behalf.
Throughout the life of this agreement, you agree to provide us with administrative rights over your Internet domain names. We utilize this access to:
We may request your organization‘s logos, graphics, and branding guides. These materials will only be used to:
If you ever ask us to make a configuration change, system modification, or take other action with any component of your technology environment that is contrary to industry standards, our best judgment, or in conflict with the manufacturer’s best recommendations, we may, at our discretion, require your designated IT contact to sign an electronic document acknowledging the request. These documents will be attached to your official documentation and available to you at any time.
Upon termination of this agreement, Summit Technology will perform the following actions.