Effective Date: 1/1/2025
You (hereafter, “Client” or “Customer” interchangeably) have elected to do business with HELPDESK.TECH INCORPORATED (hereafter, “Contractor”) for management, service, and support of Client’s computers, computer networks, computer software, and other technology components (hereafter “Technology Network”), demonstrated by signed Proposal(s) or Quote(s) and signed MSA (Master Service Agreement, hereafter “The Agreement”) at the time and place on record, and referencing these Terms therein.
Client is hereby bound by these Terms throughout the duration of The Agreement.
These Terms may be updated from time to time, with or without written notice, as appropriate.
Remote Help Desk and any Support of Client’s Technology Network will be provided to the Client by Contractor through remote (controlled virtual access) means between the hours of 8:00 am – 5:00 pm Monday through Friday in Client’s choice of Pacific, Central or Eastern Time Zone, excluding public and other company holidays. Network Monitoring Services will be provided 24/7/365 and all remediation shall be done during business hours. All services qualifying under these conditions, shall be defined here.
After-Hours and Emergency Onsite Support
Onsite Services and Physical Interventions
Unsupported Hardware and Software
Deep-Dive Forensic and Incident Analysis
Advanced Disaster Recovery and Data Forensics
Customized Project Management and IT Consulting Beyond Agreed Projects
Third-Party and Vendor Issues Requiring Onsite Intervention
Onsite Training and In-Person User Support
Home Office or Remote Employee Equipment
Physical Security and Facilities Management
Unauthorized Data Transfers or Non-Contractual Data Management
Telephony and VoIP Hardware Adjustments
Procurement and Supply of Hardware/Equipment
Custom Integration and Development Work
In-depth Network Infrastructure Redesign
Compliance Audits and Regulatory Reporting
Physical Data Center and Server Room Management
Managed Print Services Beyond Remote Assistance
Custom Security Solutions and Onsite Installations
Services Not Explicitly Defined in the Contract
This “Out of Scope” list is intended to safeguard our service boundaries, ensure clarity in service expectations, and protect our remote-only IT services model. Should any needs arise beyond these boundaries, they will require a separate agreement or engagement to address those specialized requirements.
The following schedule shows targeted times (in business hours) for response and resolution, and this SLA shall only apply to Clients who subscribe to the SLA and pay a separate fee for a Priority SLA on their Invoice. These are target times only, and all efforts toward resolution are “best effort” according to the need at the time the problem is presented. | ||||
Description of Trouble Situation: | Priority Status | Response Time | Resolution Time | Escalation Threshold |
PRIORITY = CRITICAL | 1 – Highest | 1 hour | Unknown | 1 hour |
PRIORITY = HIGH | 2 – Priority | 2 hours | Same Day | 2 hours |
PRIORITY = MEDIUM Limited degradation of service | 3 – Concerning | 4 hours | Next Day | 4 hours |
PRIORITY = STANDARD Small service degradation | 4 – Daily | 12 hours | 24 hours | 16 hours |
The following schedule details and outlines the Support Tiers which serve The Agreement | |
TIER LEVEL | Description of Action within Tier Level |
Tier 1 Support | All support incidents begin in Tier 1, where the initial trouble ticket is created; the issue is identified and clearly documented, and basic hardware/software troubleshooting is initiated. |
Tier 2 Support | All support incidents that cannot be resolved with Tier 1 Support are escalated to Tier 2, where more complex support on hardware/software issues can be provided by more experienced Engineers. |
Tier 3 Support | Support Incidents that cannot be resolved by Tier 2 Support are escalated to Tier 3, where support is provided by the most qualified and experienced Support Engineers who have the ability to collaborate with 3rd Party (Vendor) Support Engineers to resolve the most complex issues. |
Hourly Rate Card for all advisory and technical services as of 1/1/2025
DAY OF WEEK | TIME | SERVICE LEVEL | RATE | MINIMUM |
M, T, W, Th, F | 8:00am to 4:59pm | Tier 1 | $175.00 per resource | $43.75 every 15 min |
M, T, W, Th, F | 8:00am to 4:59pm | Tier 2 | $300.00 per resource | $75.00 every 15 min |
M, T, W, Th, F | 8:00am to 4:59pm | Tier 3 | $450.00 per resource | $112.50 every 15 min |
M, T, W, Th, F | 5:00pm to 11:59pm | Tier 1 | $300.00 per resource | $75.00 every 15 min |
M, T, W, Th, F | 5:00pm to 11:59pm | Tier 2 | $500.00 per resource | $125.00 every 15 min |
M, T, W, Th, F | 5:00pm to 11:59pm | Tier 3 | $900.00 per resource | $225.00 every 15 min |
M, T, W, Th, F | 12:00mid to 7:59am | Tier 1 | $450.00 per resource | $112.50 every 15 min |
M, T, W, Th, F | 12:00mid to 7:59am | Tier 2 | $750.00 per resource | $187.50 every 15 min |
M, T, W, Th, F | 12:00mid to 7:59am | Tier 3 | $1350.00 per resource | $337.50 every 15 min |
Sat, Sun | Any | Tier 1 | $450.00 per resource | $112.50 every 15 min |
Sat, Sun | Any | Tier 2 | $750.00 per resource | $187.50 every 15 min |
Sat, Sun | Any | Tier 3 | $1350.00 per resource | $337.50 every 15 min |
These services may or may not be included in your Proposal, The Agreement, these Terms of Service, or your monthly invoice. They are provided for guidance and clarification only, and should not be assumed to be covered or offered in The Agreement unless specified as covered or offered.
HELP DESK SUPPORT
COMMON PILLAR I BENEFITS
User Account and Access Management
Hardware Support
Software Support
Networking
Security and Compliance
Collaboration Tools
General IT Support
NETWORK AND DEVICE MANAGEMENT
COMMON PILLAR II BENEFITS
Network Monitoring and Performance
Hardware Management and Configuration
Troubleshooting and Support
Network Infrastructure Management
Change Management and Documentation
NETWORK SECURITY MANAGEMENT
Identity and Access Management
Endpoint and Network Security
Security Awareness and Incident Response
Data Protection and Compliance
Cloud and Application Security
General Security Administration
COMMON PILLAR IV BENEFITS
Backup Management
Disaster Recovery Planning
Data Restoration and Recovery
Compliance and Security
Continuous Improvement and Reporting
These terms may or may not be included in your Proposal, The Agreement, these Terms of Service, or your monthly invoice. They are provided for guidance and clarification only, and should not be assumed to be covered or offered in The Agreement unless specified as covered or offered.
Active Directory Authentication Services and LDAP | Through Active Directory, we provide our clients central authentication and authorization services for Windows-based computers. Active Directory also allows our engineers and tools to assign policies, deploy software, and apply critical updates to an entire organization. Active Directory stores information and settings relating to our client’s organization in a central, organized, accessible database. | |
Antivirus Management | Proper configuration and installation of supported antivirus applications on both servers and workstations. Includes ongoing maintenance, such as updates to the application, the virus definitions, and any necessary changes to the configuration. We also monitor your anti-virus software vendor’s website and public sites for information on new viruses and destructive programs. | |
Application Support, Workstation | Commonly used workstation software packages are fully supported by our staff. Proprietary line-of-business applications are supported after a 90-day ramp up period. | |
Authentication Services | A number of systems rely heavily on security to ensure appropriate use and access. Central servers are available to ensure that all clients attempting to log in to one of these systems are authenticated first. | |
Availability / Connectivity Monitoring, Firewalls | Continuous monitoring of the availability and connectivity of the client’s firewall to ensure the device is up and running. | |
Desktop Antivirus Management | Every workstation or desktop connected to the client network is required to run antivirus software. This forms the second line of defense against viruses – ensuring that if infected files are opened on client computers, the virus is identified and file access stopped, preventing further infection. | |
Desktop Configuration Services and Enforcement | The standard user desktop design and configuration enables efficiency in the services provided by our technicians and tools, and reduces costs significantly through standardization of the computing environment. It also assists in quicker problem-solving when issues occur, and it enables the use of hot-swap computers in the event of a hardware failure. Standard installations are maintained for Windows and Macintosh operating systems. They include the operating system (O/S), standard application packages, drivers for supported hardware and antivirus software. | |
Desktop Maintenance (hardware and O/S) | We conduct scheduled maintenance of desktops and laptops ensures reliability and stability for users. Optimizing hard drive performance, clearing logs & temp files, O/S patch updates, physical inspections, and other check listed maintenance items. | |
Desktop Performance Monitoring (Hardware and Applications) | Monitoring of the ongoing health, performance and errors in the operating system software (such as Windows) as well as device hardware components of desktops and laptops. In addition, other applications can be monitored for specific conditions through log file analysis and monitoring of associated processes. | |
Digital Rights Management (DRM) and Access Control | Protects information from the threats of unauthorized disclosure, modification, or destruction by limiting access to only authorized users. | |
Email Content and Attachment Filtering | Allows an organization to create and enforce email usage policies for inbound and/or outbound email messages using flexible content filters based on sender and recipient addresses, key words, and attachments. Enables companies to block or re-route inbound email messages containing unwanted email attachments. Allows administrators to use productivity filters to create inbound email policies based on attachment type, such as music, sound and movie files. Allows designated senders, such as the Client’s designated partners, clients, and associates, to bypass specified email policies through an optional “approved sender list” feature. | |
Email SPAM filtering | Filter the client’s email prior to arriving at the mail server, removing unwanted spam items and quarantining them. | |
Encryption Services | Additional protection of client information through the use of technologies such as server-to-server level encryption, public key infrastructure (PKI), password-protected files, encrypting routers and key management servers. | |
Firewall Management | We maintain the system version software and operating system of the client’s firewall, continually manage policy and configuration changes, and coordinate necessary service outages with the client to minimize access and security interruptions. | |
Group Policy Management | We set up and manage the infrastructure used to deliver and apply one or more desired configurations or policy settings to a set of client’s targeted users and computers within a client’s Active Directory environment. | |
Handheld Computer Support | Support is available for the installation of handheld devices such as smart phones and tablets. Advice is available from assistance with purchases, through to resolution of problems using these devices. | |
Helpdesk Services | Helpdesk – Provides front-line support services to end-users. It is accessible by phone or email. The Helpdesk provides a responsive service for logging, tracking and resolution of issues encountered by our clients’ users. The IT Helpdesk is the central communications hub for all IT issues, and ensures clients are well informed of the progress of their problems. It also ensures the timely resolution of issues through a well-defined escalation process. | |
HTTP Content Management & Proxy Services | Greatly increase network security by monitoring and policing all traffic outbound and/or inbound to the network, while decreasing the bandwidth usages due to proxy services. | |
Incident Management | Incident Management is a set of processes whose aim is to ensure any interruptions to normal service for our clients are kept to a minimum, and the client is returned to normal operations as soon as possible. In the event of delays, the Incident Management processes ensure appropriate escalation of incidents to expert staff for timely resolution. | |
Incident Resolution | The IT Helpdesk is the first point of contact for all IT support enquiries. It is accessible by phone, email, the intranet. Helpdesk staff ensure all incidents are logged accurately and wherever possible resolve issues at the first point of contact. If required, incidents are escalated to expert staff. In those cases the Helpdesk staff ensure timely resolution and maintain communications with the client. | |
Intrusion Detection Services and/or Intrusion Prevention Services (IDS and/or IPS) | We implement and manage a system that collects and analyzes information from a variety of system and client network resources, looking for signs of internal misuse or intrusion. IDS alert generally requires human evaluation of the threat and manual intervention to stop an attack. On the other hand, the more subtle and complex rules that an IDS uses to analyze system activity allow it to detect vulnerabilities and intrusions that a firewall may miss. | |
IT Hardware On-Site Technical Support (via field engineers) | The field engineering team visits client sites when necessary for both responsive support issues as well as preventative maintenance to networking devices. | |
IT Hardware Remote Technical Support | The support desk or NOC resolves issues with networking devices remotely when possible, as well as delivering preventative maintenance when necessary. | |
LAN support | We provide support services for the ongoing operation and configuration of the client’s local area network. | |
Microsoft Windows O/S Patching | Patches automatically updated on a regular basis to the client’s servers and desktops. MS Baseline Analyzer and MS WSUS Server used On-Site, Desktop & Laptop Support. When required, our technicians will travel on-site to perform hardware maintenance, proactive problem diagnosis and repairs. Priority can be placed on severe issues according to our client Service Level Agreement. | |
Network Security Audits & Analysis | Using a combination of specialized tools and expertise, our security specialists discover and document the current security state of a client network, taking into account current hardware, operating systems, applications, policies and configuration. We identify vulnerabilities and potential weaknesses that a client may be exposed to, and offer a solution to remedy them. | |
On-Site, Deskside User Support | This hands-on support enables our clients to get the best out of their computing resources and includes assistance with support, maintenance, planning and minor training issues. | |
Problem Management | Our Problem Management services include the analysis of data recorded by our support staff to determine common causes of outages or incidents affecting large numbers of users, and then managing the process of identification of the root cause of the problem and elimination of the error from the infrastructure. Thus it has an important role in the continual improvement of our client IT Services. | |
Router and Switch Availability Monitoring | Monitoring the ongoing availability and connectivity of networking hardware. | |
Router and Switch Performance Monitoring | Monitoring of the ongoing health, performance bandwidth, traffic and errors of networking hardware. | |
Security Performance Monitoring, Antivirus | Continuous monitoring of the client’s antivirus software, including information such as viruses detected/quarantined, virus definition updates, and whether the application is running properly on each device. | |
Security Performance Monitoring, Firewalls | Continuous monitoring of the health and operation of the client’s firewall, including security incidents reported, network traffic, and device availability. | |
Virus Outbreak Management | In the unlikely event of a major outbreak, it is important that the response is targeted and coordinated properly. An emergency response plan has been created for just that purpose and communications between this team and clients are maintained throughout the outbreak and recovery period. | |
VPN support | We provide support services for the ongoing operation and configuration of the client’s virtual private network. | |
WAN support | We provide support services for the ongoing operation and configuration of the client’s wide area network | |
Windows Domain Services | We provide setup, configuration and management of the systems that respond to security authentication requests (logging in, checking permissions, etc.) within the client’s Windows Server domain. |
© Copyright 2025 HelpDesk.tech Incorporated. All rights reserved. All use of trademarks, service marks, logos, and content must be licensed with permission and remains the property of HelpDesk.tech Incorporated.
We make IT easy and affordable.
7815 North Palm Avenue, Suite 200
Fresno, California 93711