Service Terms and Definitions
Tailwind IT Services is committed to maintaining a high standard of professionalism and integrity, and these terms and definitions are designed to facilitate a positive and mutually beneficial working relationship with our clients.
These service terms and definitions are governed under the Master Service Agreement (the “Agreement”) between Tailwind IT and an active client "The Client".
Overview
Tailwind IT provides a range of services and solutions with defined terms and definitions to ensure clarity and transparency for our clients.
General Terms
Mater Service Agreement (MSA): The formal contract between Tailwind IT and the client. It is the comprehensive and overarching contract, that outlines the terms and conditions governing the overall business relationship. Instead of detailing the specifics of individual projects (SOW) or transactions, the MSA sets the framework for future agreements and engagements.
Scope of Work (SOW): A detailed document specifying the tasks, deliverables, and milestones of a particular project, solution, or managed service engagement.
Service Level Agreement (SLA): Defines the measurable aspects of service delivery, such as response times, uptime guarantees, and performance benchmarks.
Billing and Payment Terms: Clearly outlines the pricing structure, payment schedule, and any additional charges associated with the services.
Intellectual Property (IP) Rights: Describes the ownership and usage rights of any intellectual property created or utilized during the course of the services.
Confidentiality Agreement: Governs the handling of confidential information shared between Tailwind IT Services and the client to protect sensitive data.
Termination Clause: Specifies the conditions under which either party can terminate the services, including notice periods and any associated fees.
Force Majeure: Addresses unforeseen circumstances or events beyond the control of either party that may impact the ability to fulfill the service obligations.
Dispute Resolution: Outlines the process for resolving any disputes that may arise during the course of the engagement.
Client Responsibilities: Clearly defines the client's obligations and responsibilities to ensure a collaborative and successful partnership.
Data Protection and Privacy: Describes how client data is handled, stored, and protected in compliance with relevant data protection laws and regulations.
Change Management: Establishes procedures for handling changes to the original scope of work, including approval processes and any impact on timelines and costs.
Billable Rates: Hourly billable rates are $250.00 per hour, unless otherwise noted on SOW.
Shared Responsibility
Shared Responsibility in Projects, Services, and Security:
Shared responsibility in projects, services and security refers to the collaborative commitment between stakeholders, including both the client and Tailwind IT, to actively contribute to the overall success and security of a project. This shared accountability involves a collective effort to identify, address, and manage risks, as well as to ensure the effective implementation of security measures. Key aspects of shared responsibility include:
Risk Identification and Assessment:
Collaboratively identifying potential risks and assessing their impact on the project. Both the client and Tailwind IT actively participate in risk analysis to ensure a comprehensive understanding of potential threats to project success and security.
Security Policy Adherence:
Jointly adhering to established security policies and standards. Clients and Tailwind IT work together to align project activities with established security protocols, ensuring compliance with industry regulations and best practices.
Communication and Collaboration:
Establishing open channels of communication and fostering collaboration between the client and Tailwind IT. Effective communication ensures that security concerns are promptly addressed, and collaborative efforts lead to a shared understanding of security requirements.
Data Protection and Privacy:
Both parties share responsibility for the protection of sensitive data and maintaining privacy. This involves implementing measures to secure data during storage, transmission, and processing, and ensuring compliance with relevant data protection regulations.
Incident Response Planning:
Collaboratively developing and maintaining an incident response plan. Shared responsibility involves preparing for potential security incidents, outlining roles and responsibilities, and establishing procedures for timely and effective response to security events.
User Awareness and Training:
Jointly addressing the human factor in security by providing user awareness programs and training. Both clients and Tailwind IT contribute to educating users on security best practices, minimizing the risk of human-related security vulnerabilities.
Continuous Monitoring and Evaluation:
Collaboratively implementing continuous monitoring mechanisms to detect and respond to security threats. Regular evaluations of security measures ensure that they remain effective in the face of evolving cybersecurity challenges.
Change Management for Security Updates:
Shared responsibility in managing changes, updates, and patches to the IT infrastructure to address security vulnerabilities. Both parties contribute to a structured change management process that prioritizes security-related updates.
Audit and Compliance Verification:
Jointly participating in security audits and compliance assessments. Clients and Tailwind IT work together to verify adherence to security standards, regulatory requirements, and contractual obligations.
Clear Documentation and Reporting:
Collaboratively maintaining clear documentation of security measures and incidents. Shared responsibility includes providing transparent and comprehensive reports on security activities, ensuring accountability and facilitating ongoing improvement.
By embracing shared responsibility, both clients and Tailwind IT actively contribute to creating a secure and resilient project environment, fostering trust, and collectively addressing the challenges associated with project security.
InfoSec Controls (Included in CyberDefend Solution)
Each of these controls plays a crucial role in maintaining a robust and effective information security posture. Remember, the effectiveness of these controls depends on regular review and continuous improvement.
Security Policy: A document that outlines the organization’s approach to information security and the steps taken to ensure it.
Access Controls: Measures to prevent unauthorized access to systems, including password policies, multi-factor authentication, and role-based access controls.
Network Security: Protection of the network infrastructure through firewalls, intrusion detection systems, and secure network design.
Data Encryption: Encryption of sensitive data both at rest and in transit to protect it from unauthorized access.
Incident Response Plan: A plan detailing the steps to be taken in the event of a security incident to minimize damage and recover operations.
Regular Audits: Regular audits to ensure compliance with the security policy and to identify potential areas of improvement.
User Awareness Training: Regular training for employees to ensure they understand their role in maintaining security and are aware of potential threats.
Disaster Recovery Plan: A plan detailing the steps to be taken to recover operations in the event of a major incident or disaster.
Physical Security: Measures to protect physical access to systems, including secure facilities, access controls, and surveillance.
Vendor Management: Processes to ensure that vendors comply with the organization’s security requirements and standards.
Sender Policy Framework (SPF): An email authentication method designed to detect forging sender addresses during the delivery of the email.
DomainKeys Identified Mail (DKIM): An email authentication method designed to detect email spoofing. It allows the receiver to check that an email claimed to have come from a specific domain was indeed authorized by the owner of that domain.
Domain-based Message Authentication, Reporting & Conformance (DMARC): An email authentication protocol that is built on top of SPF and DKIM protocols. It allows the administrative owner of a domain to publish a policy on which mechanism (DKIM, SPF or both) is employed when sending email from that domain and how the receiver should deal with failures.
Procurement Policies for Wire Transfers Over $25,000: A policy that outlines the necessary steps and approvals required for wire transfers over $25,000. This could include multiple levels of approval, a review of the transaction by a separate department, and a requirement for the transaction to be conducted in person or via a secure, approved method.
Managed IT (Basis, Professional, and Enhanced) plans
Managed IT Plan Feature List:
Onboarding Assessment:
A thorough evaluation conducted during the onboarding process to assess the client's current IT infrastructure, identify requirements, and develop a tailored plan for seamless integration with Tailwind IT Managed IT Services.
24/7/365 US Support: (Basic Plan Only)
Continuous support provided around the clock, every day of the year, by a team on US Time Zones to address any IT-related issues or inquiries promptly.
24/7/365 Global Support: (Premium & Enhanced Plans Only)
Systematic tracking and management of IT assets and configurations to maintain an up-to-date inventory and ensure compliance with policies, supported by continuous global assistance. English is the standard language of support.
IT Playbook:
A comprehensive document outlining standardized procedures, best practices, and guidelines for managing and maintaining the client's IT environment, ensuring consistency and efficiency.
Quarterly Business Reviews:
Regular strategic meetings held every quarter to review the performance of IT services, discuss ongoing and upcoming projects, and align IT strategies with the client's business goals.
Third Party Escalation and Dispatch Support:
Tailwind IT will assist and submit ticket requests to Client third party vendors. Tailwind IT is not responsible for response times or quality of service of the Client's 3rd Party Vendors. These requests will also not be included in CSAT or response time reporting and SLA.
Data Backup and Restore:
Scheduled and secure backup of critical data to prevent data loss, coupled with efficient restoration processes to quickly recover data in the event of unexpected incidents.
On Prem & Cloud Monitoring:
Continuous monitoring of both on-premises and cloud-based IT infrastructure to proactively identify and address potential issues, ensuring optimal performance and reliability.
Asset & Configuration Management
The systematic approach and set of processes aimed at effectively tracking, organizing, and controlling a client's IT assets and configurations.
Virtual CIO (vCIO): (Professional and Enhanced Plans Only)
Strategic advisory services provided by a Virtual Chief Information Officer, offering insights, planning, and guidance on IT-related decisions aligned with business objectives.
Unlimited Emergency Response: (Professional and Enhanced Plans Only)
Immediate and unrestricted response to emergency IT situations to minimize downtime and mitigate potential risks to the client's operations.
Quarterly Security Assessments:(Professional and Enhanced Plans Only)
Periodic evaluations of the client's IT security infrastructure to identify vulnerabilities, assess risks, and implement necessary measures to enhance overall security posture.
IT Compliance Reporting: (Professional and Enhanced Plans Only)
Generation of regular reports outlining the client's adherence to IT compliance standards, ensuring alignment with relevant regulations and industry requirements.
Quarterly Well-Architected Reviews: (Professional and Enhanced Plans Only)
Regular assessments of the IT architecture to ensure it meets best practices and is well-optimized for performance, security, and cost-effectiveness.
Dedicated Client Engagement: (Professional and Enhanced Plans Only)
A designated professional responsible for managing and coordinating all aspects of the client's engagement with Tailwind IT Managed IT Services, serving as the primary point of contact.
Discounted Project Services: (Professional and Enhanced Plans Only)
Special pricing benefits for additional IT projects beyond the scope of regular services, providing cost advantages for the client.
Discounted CyberDefend Services: (Professional and Enhanced Plans Only)
Cost-effective access to specialized cybersecurity services, offering enhanced protection against evolving threats.
IT Compliance Management: (Enhanced Plans Only)
Ongoing support and maintenance for servers, coupled with management to ensure continuous compliance with IT regulations and standards.
Enhanced Data Retention: (Enhanced Plans Only)
Extended and optimized data retention policies to meet specific business requirements, ensuring secure and accessible data storage.
Dedicated vCIO: (Enhanced Plans Only)
Exclusive access to a dedicated Virtual Chief Information Officer for personalized strategic IT guidance and decision-making support.
Dedicated vCISO: (Enhanced Plans Only)
Exclusive access to a dedicated Virtual Chief Information Security Officer, providing specialized expertise and oversight for cybersecurity initiatives.
Dedicated Project Leader: (Enhanced Plans Only)
A designated leader responsible for managing and overseeing specific projects, ensuring successful execution and timely delivery.
Special Project Rates: (Enhanced Plans Only)
Preferential pricing structures for unique or specialized IT projects undertaken in collaboration with Tailwind IT Managed IT Services.
Cloud Billing Management: (Enhanced Plans Only)
Management and optimization of cloud service billing, ensuring cost-effectiveness and transparency in cloud-related expenditures.
Enhanced CyberDefend: (Enhanced Plans Only)
Advanced cybersecurity services offering heightened protection against sophisticated threats, tailored to the client's specific needs.
Cyber Threat & Remediation: (Enhanced Plans Only)
Swift identification and remediation of cybersecurity threats, preventing potential breaches and minimizing the impact on IT infrastructure.
Anti-Ransomware Protection: (Enhanced Plans Only)
Comprehensive measures and protocols to protect against ransomware attacks, safeguarding critical data and systems.
Discounted Salesforce Support: (Enhanced Plans Only)
Cost-effective support services tailored for Salesforce platforms, providing assistance and expertise at reduced rates.
Vendor Management
In order to provide its vendor management services to Client, Tailwind IT may require Client to execute a letter of authorization in which Client authorizes Tailwind IT to contact applicable vendors to request services from
such vendors or to make inquiries. Client’s failure to provide Tailwind IT with a letter of authorization in a timely manner may result in the delay of the provision of vendor management services hereunder.
In Scope Proactive Monitoring and Maintenance
Network-
- Monitor Network Availability, Fault, and Performance
- Interface uptime reporting
- Historical archiving to identify reoccurring
- Network Topology and Connection Overview
- Map style view of all sites on single management screen
- Immediate access to equipment and statistics from management portal
- Easily accessed from the Internet with secure login authentication
- Proactive Network Alerts
- Monitoring and real-time alerting when pre-set thresholds are met and approaching capacity
- Able to create tickets based on performance and error logging
- Monitor syslog data, events, alerts, SNMP trap, and other messages in a single web console
- Advanced information reporting monitors chassis fan and temperature of all network equipment
- Filters unnecessary alerts to only report emergencies
- Monitor and manage wireless networks and access points
- Real time statistics and availability reporting
- Centralized log reporting and alerting for wireless environments
- End user statistic reporting including wifi signal strength
- Network Performance Reporting
- Scheduled reports to analyze per site
- Customizable to provide necessary information for troubleshooting and capacity planning
- Network Bandwidth Analysis
- Internet and web based traffic monitoring and performance reporting
- Real time network equipment information
- Alerts are sent in real time for immediate action in the event of an emergency
- Centralized log reporting
- Single screen management with color coded error log reporting to prune informational reporting from emergency reporting
- Monitor Network Availability, Fault, and Performance
PC Workstation(s)
-
- Anti-Virus Software Management and Updating
- Proactive Monitoring and Removal of Virus, Spyware and Malware and System Cleaning
- Adobe Flash, Adobe Reader, and Java Updates
- Automated Hard Disk Scans
- Performance Monitoring Including
- Memory
- Hard Drive
- CPU
- Monitoring for Key Stopped or Failed Services
- Monitor for Blacklisted Software Installs
- Uptime Monitoring
- Event Log History
- Automated Maintenance Routines
- Temporary File and Cache Clean Up
- Automated Disk Defragmentation
- Windows Updating
- Monitor Failed Updates
- Server(s)
- Anti-Virus Software Management and Updating
- Proactive Monitoring and Removal of Virus, Spyware and Malware and System Cleaning
- Server Event Log Monitoring and Trending
- Monitoring for Stopped or Failed Services
- Automated Hard Disk Scans
- Performance Monitoring Including:
- Memory
- Hard Drive
- CPU
- Software Install and Uninstall Monitoring
- Monitor for Blacklisted Software Installs
- Uptime Monitoring
- 24/7 Internet Connection Monitoring
- Monitor for Drive and RAID Failures
- Automated Maintenance Routines
- Temporary File and Cache Clean Up
- Automated Disk Defragmentation
- Windows Updating
- Monitor Failed Updates
- VMWare Host Monitoring
- Data Backup and Disaster Recovery (if applicable) Health Checks
In Scope Help Desk:
- Unlimited Remote Support and Service:
- Server Support
- Router Support
- Switch Support
- Firewall Support
- Workstation and Laptop Support
- Virus and Malware Removal
- User Login/Authentication Support
- Active Directory Support
- Printer, Copier, Scanner, Fax Support
- Application Support
- Email System Support
- Anti-SPAM Systems
- Storage Device Support
- Wireless Network Support
- Cabling Issue Diagnosis and Support
- Virus, Spyware and Malware Removal
- Firmware Upgrades
- Network Device RMA management
- ISP and/or Voice Failover Testing
- Moves, Additions, and Changes that take under 4 hours to perform:
- Employee onboarding and off boarding
- Workstation/Laptop Upgrades
- Workstation/Laptop Application Installation
- Email changes related to mailboxes, distribution groups, public folders, access,
- Any other move, addition, or change that takes under 4 hours to
- Customer Service Portal with Ticketing Information and History
- Email, Portal, Desktop Agent, and Live Customer Service Hotline Ticket Submission
- Committed Response Time and Tracked SLA Performance
- Vendor Management
- Telephone Service Provider
- Internet Service Provider
- Third Party Copier/Scanner/Fax Peripheral Network Connection Management
- Application Vendors
- Software Assurance Management
- Hardware Vendors
- Warranty Management
- Cloud Vendors
- Monthly Help Desk Ticket Reporting
Tailwind CyberDefend Services
CyberDefend:
Tailwind IT CyberDefend is a comprehensive cybersecurity solution designed to safeguard organizations against a wide range of cyber threats. CyberDefend encompasses proactive measures, advanced technologies, and expert strategies to protect critical systems, data, and networks from unauthorized access, breaches, and malicious activities.
Managed Cybersecurity Solution:
Tailwind IT CyberDefend managed cybersecurity service offering, providing continuous monitoring, analysis, and response to security threats. This solution is a proactive and strategic approach to cybersecurity, involving the outsourcing of security responsibilities to Tailwind IT experts who actively manage and enhance the organization's security posture.
Threat Detection and Response:
A key component of Tailwind IT CyberDefend solution, involving real-time monitoring and analysis to detect and respond swiftly to potential security threats. This is a proactive approach aimed to identify and neutralize threats before they can cause harm.
Vulnerability Management:
The systematic identification, assessment, and mitigation of vulnerabilities in an organization's systems and applications. Tailwind IT CyberDefend includes ongoing vulnerability management to address potential weaknesses and enhance overall cybersecurity resilience.
Endpoint Protection:
Tailwind IT CyberDefend includes measures to secure endpoints such as computers, servers, and mobile devices. This involves deploying advanced endpoint protection solutions to prevent malware, ransomware, and other malicious activities.
Network Security:
Measures implemented to protect an organization's network infrastructure from unauthorized access, attacks, and data breaches. Tailwind IT CyberDefend solution includes robust network security measures to ensure the integrity and confidentiality of data in transit.
Incident Response Planning:
The development and implementation of a structured plan to address and mitigate cybersecurity incidents. Tailwind IT CyberDefend includes incident response planning to ensure a rapid and effective response to security events, minimizing potential impact.
Security Awareness Training Solutions:
Educational programs designed to enhance employees' understanding of cybersecurity best practices, potential threats, and their role in maintaining a secure work environment. Tailwind IT CyberDefend solution may include security awareness training to build a resilient human firewall. All training is purchased outside the CyberDefend Service.
Continuous Monitoring:
Ongoing surveillance and analysis of an organization's IT environment to identify and respond to security threats in real time. Tailwind IT's CyberDefend employs continuous monitoring to maintain a proactive stance against evolving cyber threats.
Compliance Management:
Ensuring that an organization's cybersecurity practices align with industry regulations and compliance standards. Tailwind IT's CyberDefend includes measures to help clients achieve and maintain compliance with relevant cybersecurity regulations.
Security Consulting Services:
Tailwind IT may provide expert advice and consulting services to guide organizations in developing and implementing effective cybersecurity strategies. This may include risk assessments, policy development, and tailored security recommendations.Managed Salesforce Services
Salesforce Administration:
Tailwind IT manages Salesforce administrative tasks, encompassing user setup, profile configuration, data management, and customization to ensure the efficient use of the Salesforce platform.
Customization and Development: (Plan Specific)
Tailwind IT tailors Salesforce to meet specific business needs, creating custom objects, fields, workflows, and applications. This includes expertise in customizing and developing solutions within the Salesforce environment.
Data Migration and Integration: (Plan Specific)
Tailwind IT facilitates seamless data transfer to Salesforce from existing systems, ensuring accuracy and consistency. Integration with other applications is managed to establish a unified data ecosystem.
User Training and Support: (Plan Specific)
Tailwind IT provides training sessions and ongoing support to Salesforce users, ensuring they have the knowledge and skills to maximize the benefits of the platform.
Reports and Dashboards: (Plan Specific)
Tailwind IT creates and customizes reports and dashboards within Salesforce to offer visual insights into business performance, trends, and key metrics, enabling informed decision-making.
Automation and Workflow Management: (Plan Specific)
Tailwind IT implements automation rules and workflows within Salesforce to streamline business processes and enhance operational efficiency, ensuring alignment with organizational objectives.
Security and Access Management:
Tailwind IT manages Salesforce security settings, including user access controls, permissions, and data security measures to maintain confidentiality and integrity.
Release Management and Upgrades:
Tailwind IT plans, coordinates, and executes Salesforce releases and upgrades, ensuring a smooth transition with minimal disruptions while incorporating new features.
AppExchange App Integration:
Tailwind IT integrates third-party applications from Salesforce's AppExchange marketplace into the Salesforce environment, seamlessly adding functionalities to meet specific business requirements.
Governance and Best Practices:
Tailwind IT establishes and enforces governance policies and best practices for Salesforce usage, maintaining a structured and optimized environment aligned with industry standards.
Scalability Planning:
Tailwind IT strategically plans for the scalability of Salesforce solutions, ensuring the platform can accommodate growth and evolving business needs over time.
Health Check and Optimization:
Tailwind IT conducts regular assessments of the Salesforce instance, identifying opportunities for optimization, performance improvement, and alignment with evolving business processes to maintain a robust environment.
Enhanced Services for CPQ, Tableau, MuleSoft: (Enhanced Service Only)
Tailwind IT extends its services to include enhanced capabilities for Salesforce CPQ (Configure, Price, Quote), Tableau integration for advanced analytics, and MuleSoft integration for seamless connectivity, providing a comprehensive solution tailored to specific business requirements.Time and Materials (T&M) Project Engagement
Time and Materials (T&M) Engagement:
A project work arrangement where Tailwind IT provides consulting services based on the actual time spent and materials used. This model allows for flexibility in project scope, accommodating changes and adjustments as needed during the course of the engagement.
Hourly Rate:
The agreed-upon cost for each hour of work performed by Tailwind IT consultants. The hourly rate is a component of the Time and Materials billing structure and is applied to the actual hours worked on the project.
Materials Cost:
The expenses associated with materials, resources, or tools utilized during the project. This includes software licenses, hardware components, and any other tangible items necessary for project completion.
Project Scope:
The definition and clarification of the specific goals, deliverables, tasks, and features that constitute a project. Project scope outlines the boundaries and parameters of the project, including what is included and what is excluded. It serves as a foundational document that guides project planning, execution, and evaluation, helping to ensure that the project stays on track and meets its objectives within the defined constraints. The project scope is documented in a statement of work (SOW), which is a key reference throughout the project lifecycle. Changes to the project scope can managed through the formal change control process to maintain project integrity.
Project Scope Flexibility:
The ability to adapt and modify the project scope based on evolving requirements or changes in project goals. Time and Materials engagements offer flexibility to adjust the scope as the project progresses.
Resource Allocation:
The strategic assignment and management of Tailwind IT consultants to the project based on their expertise and the project's specific needs. Resource allocation ensures optimal utilization of skills for efficient project delivery.
Project Transparency:
Full visibility into project activities, hours worked, and material costs. Tailwind IT provides transparent reporting to clients, allowing them to track project progress and associated costs in real-time.
Change Management:
The formal process for handling changes to the project scope, timeline, or budget. Tailwind IT employs change management procedures to assess and implement adjustments while maintaining project integrity.
Client Involvement:
Active participation and collaboration from the client throughout the project. Time and Materials engagements often involve ongoing communication and input from the client to ensure alignment with evolving business needs.
Billing Frequency:
The schedule on which Tailwind IT invoices the client for services rendered and materials used. Billing frequency is typically outlined in the project contract and may occur weekly, bi-weekly, or monthly.
Risk and Reward Sharing:
A collaborative approach where both Tailwind IT and the client share the risks and rewards associated with the project. This model encourages efficiency and accountability in project delivery.
Project Documentation:
Comprehensive documentation of project activities, including timesheets, materials receipts, and change requests. Tailwind IT maintains thorough records to support transparency and accountability.
Quality Assurance:
The ongoing evaluation and assurance of project deliverables to meet predefined quality standards. Tailwind IT ensures that the quality of work remains a priority throughout the Time and Materials engagement.Tailwind IT - 90 Day Guarantee
Guarantee Period:
The specified timeframe, lasting for 90 days from the initiation of the service contract, during which clients have the option to terminate the agreement without incurring additional costs or fees.
Contract Termination:
The act of ending the service contract within the 90-day guarantee period without incurring any penalties. This termination option is available to clients if they are dissatisfied with the services provided during the specified timeframe.
No Additional Costs or Fees:
Assurance that clients will not be subject to any extra charges or fees if they choose to terminate the service contract within the 90-day guarantee period. This ensures a risk-free option for clients during the initial phase of the service engagement.
Non-Refundable Payments and Deposits:
Specifies that payments and deposits made prior to the termination within the 90-day guarantee period are non-refundable. While the client can terminate the contract without additional cost, any previous payments or deposits will not be returned.
Client Dissatisfaction Clause:
A provision in the guarantee stating that termination within the 90-day period can be initiated by the client based on dissatisfaction with the delivered services, performance, or any other relevant criteria.
Written Notice Requirement:
The stipulation that clients must provide written notice of their intent to terminate the contract within the 90-day guarantee period. This notice requirement ensures clear communication between the parties involved.
Service Evaluation Period:
The 90-day duration during which clients have the opportunity to assess the quality, effectiveness, and suitability of the provided services. This evaluation period allows clients to make an informed decision about the continuation of the service contract.
Contractual Obligations Exemption:
Clarification that termination within the 90-day guarantee period exempts the client from any further contractual obligations, providing a clean break without entanglements.Effective Date:
The date from which the 90-day guarantee period begins, marking the initiation of the service contract. The effective date is crucial for determining the timeframe during which the client can exercise the termination option.
Exception Handling Clause:
A provision addressing any exceptional circumstances or conditions under which the 90-day guarantee may be extended or modified. This clause ensures flexibility in situations that may warrant special considerations.
The 90-day guarantee for services establishes a client-centric approach, offering flexibility and a risk-free evaluation period. Clients can exercise their right to terminate the contract within this timeframe without incurring additional costs, although previous payments and deposits are non-refundable.
Think an MSP can help?
We understand you have many options in the market to help support your organization. Tailwind IT apricates you are taking the time to learn more about us and our valued services. Our goal is for your organization to see the benefits of our unique solutions and we don't want your business to miss the opportunity to partner with Tailwind IT.
Ready to get started?
Book a meeting today to get started on your MSP partner journey. We will provide an MSP readiness assessment, to guide your organization through the process of selecting the right MSP to help your organization.