FNAL OLA Template
FNAL OLA Template
FNAL OLA Template
Between:
Computing Division:
<Service Owner>:
<Service Consumer>:
1 SIGNATURES OF APPROVAL 2
2 TABLE OF CONTENTS 4
3 EXECUTIVE SUMMARY 6
4 SERVICE OVERVIEW 6
5 RESPONSIBILITIES 10
4 Service Overview
The following are the service owners and primary stakeholders associated with this OLA.
This service is available for users /equipment which meet the following criteria:
Criterion 1
Criterion 2
Criterion 3
Criterion 4
Sample:
CSI Service Managers along with DSE Liaisons plan and purchase the computers that
will be supported under Standard Desktop Support. Planning proceeds in coordination
with published hardware and software standards.
To assist with planning, CSI provides an annual inventory report to the DSE Liaisons
which lists all currently installed Core and Add-on software. This inventory only includes
computers on which CSI has installed inventory-tracking software. Beyond providing this
inventory, CSI cannot further assist in tracking software license purchases. That service
is provided by the owners of the software.
Purchase
Enter details of planning for the purchase of hardware of software which will impact the
delivery of this service.
Sample:
All computer hardware and software is purchased by the Divisions/Sections and
Experiments, including cables, peripherals, and lock-down devices.
CSI maintains desktop hardware and software standards and updates them quarterly.
The standards are updated in a process which includes input from stakeholders and
approval by the DSE Liaisons.
To assist in the efficient purchase of standard equipment, CSI will publish and maintain
purchasing aids such as part number and vendor information in the service catalog.
Since CSI will coordinate warranty repairs, the purchase of extended warranties for
standard equipment is highly recommended and is included in the recommended
computer purchase standards.
Deploy
Under the Standard Desktop Service, desktops and laptops are installed and configured
with an approved operating system, core software applications, anti-virus, anti-spyware,
and remote administration tools.
Core software is listed at http://computing.fnal.gov/Getting_Services/software , and is
designed to be as inclusive of common lab software applications as possible. The
computers are configured in compliance with security baselines, and other
configurations which may be specific to each division/section/experiment. Access to
specific resources such as file servers is configured. Computers are configured to
connect to wired and wireless networks. Network jack activation is a separate service,
requiring a separate request, but the service includes assisting clients with the jack
activation request process.
CSI recommends that physical security devices, such as laptop cable locks, be
purchased so that they can be installed for small form factor desktops and laptops in
high-risk environments at the time of deployment.
During deployment, standard add-on software packages are installed when requested by
clients or identified in the interview process. Proof of licensing is required for new
computer deployments. CSI assumes licensing is current and valid when upgrading
existing computers.
When computers are upgraded or replaced, the work will be completed in the client
location in response to their request.
Physical re-location of computers during office moves and other facilities work is
supported on a case-by-case basis as determined by CSI.
A computer deployed under Standard Desktop Support includes:
Migration of client documents and preferences
Configuration of standard networked printers
Retention of client data for a minimum of two weeks to ensure complete data transfer
Keeping cables and cords organized and tidy
Manage
Enter details of any specifics regarding the management of this service which deviate
from details provided in the standard service description.
Sample:
Sample:
CSI coordinates desktop and laptop disposal with PREP . We ensure
destruction of data on storage devices prior to disposal in accordance with lab security
policies.
5 Responsibilities
5.1 Service Consumer & User Responsibilities
5.1.1 Service Consumer Responsibilities
Examples:
General responsibilities:
Create and add appropriate documentation to the Networked Knowledgebase
database to address Customer issues.
Meet response times associated with the priority assigned to Customer issues.
Maintain appropriately trained staff.
Security Considerations
Use this section of the document to clearly delineate the security responsibilities of the
service provider and the service consumer. Where both parties to the agreement are
from within the Computing Division, this section will prevent any situations where each
party assumes that the other is managing a specific aspect of security.
Phone <999-9999>
<Pertinent information by which users can request support via the telephone>
Email (XXXXX@XXXX.XXX)
<Pertinent information by which users can request support via the telephone>
Walk-in
<Pertinent information by which users can request support in person>
Example:
User consults departmental expert user, departmental user administrator, departmental
technical support or the Networked Knowledgebase database online at
http://url.FNAL.gov.
If none of the above parties can resolve the issue via Networked Knowledge database,
the departmental expert user, user administrator or technical support staff determines
whether issue is technical or functional.
Support Details
<Enter Standard On-hours Service Support Details.>
Support Details
<Enter Standard Off-hours Service Support Details.>
Hours
<Enter Special Service Support Hours.>
Support Details
<Enter Special Service Support Details.>
Phone numbers and what information will be required when support is called.
Note: This could be simply an general statement, with a Reference to the Escalation
Appendix (Appendix O).
The Computing Division will respond to requests for service received with appropriate
advance notice within <x> hours/days.
<Service Consumers who are included in this OLA, and list them if appropriate>
Sample:
Supported hardware
The following hardware is supported:
Physical devices used for computing, such as desktop computers, portable
computers and Personal Digital Assistants (PDAs).
Physical devices used as peripherals to computing devices, including but not limited
to printers, scanners, and PDA cradles.
Network equipment and wiring that is provided by or through Service Provider, such
as network cables and temporary hubs/switches.
Tape Backup Units
Servers (list, if any). For example:
Server X (OS only)
Server Y
Server Z (enterprise apps only)
Administrative Novell file and print server (Vraibleu)
Hardware services
The following hardware services are provided:
Recommendations. Service Provider is responsible for specifying and recommending
for purchase or lease hardware meeting customers' needs.
Installation. Service Provider will install, configure and customize desktop system
hardware and operating systems.
Upgrades. Service Provider can typically upgrade memory RAM and disk drives and
install peripheral cards. Our priority is to respond first to all issues that affect our
customers' ability to perform their jobs. Therefore, our ability to perform upgrades is
dependent on our workload and the criticality of the need.
Moves. Service Provider will move customers' hardware as requested. However, when
large moves are to occur and are assisted by a commercial mover, the customer unit will
arrange for the commercial mover to move the hardware from location to location.
Service Provider will assist in such cases by de-installing, packing as necessary and
reinstalling Customer hardware.
Diagnosis. Service Provider will diagnose problems with Customer hardware.
Repair. Service Provider analysts are not hardware technicians and receive no training
in hardware maintenance, nor do we have the test equipment and tools necessary to do
such work.
Performing repairs under warranty: Any work to be performed under warranty may be
referred to the warranty service provider at the discretion of the Service Provider
analyst(s). Service Provider analysts will not undertake work that will void warranties on
customer hardware unless specifically requested and authorized by customer's
management in writing.
Obtaining repair services: The Service Provider analyst will recommend a service
vendor whenever he/she feels the repair work requires specialized skills or tools. Service
Provider will assist the customer in packaging the hardware for shipping, if necessary,
for repair.
Computer Repair will pick up and deliver customer hardware to be repaired by Computer
Repair. At its discretion, and as time permits, Service Provider will assist the customer
by delivering and picking up customer hardware being repaired off-site by Computer
Repair.
Loaner equipment: Service Provider will provide the customer with loaner equipment at
no cost when such designated equipment is available.
Backup. Service Provider agrees to fully back up all of Customer’s Service Provider-
supported NetWare and Windows NT/2000 servers nightly every business day, as well
as on a weekly and monthly basis. Nightly backups are retained for one week; weekly
backups are retained for one month; monthly backups are retained for six months.
Additional point-in-time backups are available upon request and retained as specified.
Customer is responsible for the cost of all backup media. Customer’s staff may request
data from a backup at any time by calling the Help Desk at (925) 684-2200. Service
Provider strongly recommends that Customer save all work-related files (no programs or
games) on the S: or U: drives (shared and user drives) and Lotus Notes™ archive files
on the Q: drive to aid in disaster recovery. Service Provider-managed central servers are
backed up for “disaster recovery backup” purposes every night and week.
Hardware costs
After prior approval, the Customer bears all costs for new and replacement hardware,
parts and materials. After prior approval, the Customer bears all costs for labor other
than Service Provider staff.
Unsupported hardware
The following are representative, but not comprehensive, examples of hardware that is
not supported:
Copiers*
Facsimile devices*
Telephony equipment, except that directly connected to Service Provider-supported
computing devices and part of a sponsored VOIP project
Network equipment and wiring that is supported by other units
Such devices may be supported to the extent that they have network connectivity.
Service Provider does not support all such above hardware in a customer unit. The
Service Level Agreement between Service Provider and a customer unit defines
specifically the hardware and software that is supported.
Supported software
The following software is supported:
Central systems such as Networked Knowledge database
Personal computer software (list)
Central services, such as e-mail, calendar, web server (name specific services)
Mainframe
Business software systems (for example, PeopleSoft, SAP, Oracle)
Other supported administrative applications (give examples)
Network connectivity (for example, for Hyperion Pillar, Lotus Notes, or general
maintenance)
Software services
Service Provider agrees to cover software support services, including software
installations and upgrades.
Software costs
Customer bears all costs for new and replacement software.
Unsupported software
The Computing Division does not support enterprise application SAP R/3 Materials
Management (MM) module issues. A Procurement Services SAP R/3 SLA with ICS,
whose procedures take precedence over those described in this Agreement, covers
these issues.
Appendix C - OLA Review Procedure
<the process for reviewing the OLA, including involved roles.>
Avoid using people’s names and use role descriptions to avoid dating the document.
This is an appropriate place to identify any service dependencies which exist, whether or
not there is a current OLA in place.
Appendix O – Escalation Path
This section outlines the Escalation Path to be followed when there is an SLA Breach,
an OLA Breach, or a reported Service Incident, and agreement cannot be reached as to
the root cause or resolution. It is a combination of functional and hierarchical escalation,
and its purposes are to ensure the restoration of service in a timely manner and to allow
for the triggering of the CSIP process to prevent further recurrences of the incident or
problem.
1.
SLA Breach Problem Management
OLA Breach (Analyze Problem,
Service Incident Report to Infrastructure
Lead)
2.
Agreement?
No
Yes
4.
Escalate to Service Owner
5.
Resolution? Yes
No
6.
Escalate to Service Level
Manager
3.
7.
Yes Continual Service
Resolution?
Improvement Process
No
Division Head
8.
Escalate to Service Manager
9. Yes
Resolution?
No
10.
CIO
SLA/OLA Escalation List
Service Provider: