This Hardware as a Service Lease Agreement ("Haas") is a contractual agreement between iDatam LTD and the Client for the Lease or Lease to own specific computer hardware equipment. The equipment is exclusively located, managed, and supported within an iDatam LTD facility.
The duration of the Haas agreement is determined upon the execution of a valid Service Order Form ("SOF") and extends for 12, 24, or 36 months, respectively. Upon the expiration of the initial Term, the agreement undergoes automatic renewal for an additional Term. The Client has the option to take full possession of the hardware or to continue its use monthly with no Buyout provision.
Upon execution of the Service Order Form, the Client has the option to purchase the hardware at the end of the Term if the Lease to Own option is specified on the Service Order Form. The Client must elect on the relevant Service Order Form to either buy the specified hardware at the agreed-upon Term's conclusion or continue usage every month. The Buyout price is one dollar ($1.00) for each specified piece of hardware. Each SOF involving leased Hardware constitutes a separate lease-to-own agreement, binding upon execution by the Parties, their successors, legal representatives, and permitted assigns. The terms herein and in such SOF or Order Forms govern the lease to purchase and use the Hardware.
The Client is responsible for paying the specified monthly fee as outlined in the Service Order. A Setup fee, equivalent to one monthly payment of the Hardware as a Service Agreement, may be incurred. Interest on past-due balances will be 10% per month.
If the Client opts for a Lease to Own arrangement, no prepayment penalty is applicable. Lessee may purchase the relevant Hardware before the HOF's expiration by paying all monthly rental amounts in advance. Upon receipt of all owed funds, Lessor will transfer all rights, title, and interest in the applicable Hardware subject to sale.
As chosen by the Client, iDatam LTD will furnish suitable facilities and electricity in one of its managed facilities. The Client will retain possession of the equipment in a licensed space, removable from an iDatam LTD facility only upon Buyout. iDatam LTD will handle all alterations, upgrades, and modifications to the Equipment.
The monthly service payment includes all costs for hardware, software, operating systems, and necessary labor to maintain the Equipment Schedule(s) listed in the Service Order Form. iDatam LTD will provide Best Effort Support, while the Client is responsible for:
The iDatam LTD Service Level Agreement ("SLA") governs the use of the iDatam Hardware as a Service (“HaaS”) under the Master Service Agreement (the "MSA") between iDatam and its Clients. We reserve the right to amend this SLA in line with the MSA.
In case of hardware operational issues, the Client shall open a support ticket with iDatam LTD Support at support@datam.com iDatam LTD will respond to service requests within four hours and repair or replace the faulty hardware as needed. Any repairs due to misuse or third-party intervention will be at the Client's expense. iDatam LTD retains discretion in determining necessary hardware upgrades and any subsequent increase in the Client's monthly fees.
The Client is accountable for conducting routine backups of their content to a remote location. iDatam LTD bears no responsibility and waives liability for data loss due to system or hardware failure.
iDatam LTD guarantees acknowledgment of any service request within four hours.
The computer hardware remains in the Client's possession at all times, subject to Buyout. It is understood that the Equipment is separately identifiable personal property.
iDatam LTD holds a security interest in computer hardware. In case of Client default, iDatam LTD reserves the right to repossess all provided computer equipment, regardless of Order or Service Order(s).
The Client defaults if:
In case of default, the Consultant may take various actions, including but not limited to terminating the agreement and reclaiming the equipment.
Upon Lease termination, Lessee must return the Hardware to Lessor at Lessee's expense. The Hardware should be in the same operating order, repair, condition, and appearance as during the Installation Date, excluding reasonable wear and tear. Lessee shall arrange and pay for any necessary repairs for the manufacturer to accept the Hardware under contract maintenance.
At Lease to Own termination, Lessee shall purchase all applicable equipment detailed in the relevant HOF. Upon Buyout, the Lessee shall own the purchased hardware. Lessor will promptly provide all documentation for hardware conveyance and deliver it to Lessee as designated by Lessor.
Lessee must comply with all governmental laws, regulations, and insurance requirements concerning the Hardware's use, maintenance, and operation.
Lessor is responsible for all costs and expenses related to this Agreement or the Hardware, except as specified otherwise herein.
The iDatam Service Level Agreement ("SLA") governs iDatam Colocation's use as per the Master Service Agreement (MSA) between iDatam, LLC., and its Clients. This SLA abides by the MSA terms, with changes subject to MSA.
00:00:01 – 00:10:00 | 1% | 25% | |
00:10:01 – 01:30:00 | 5% | 35% | |
01:30:01– 08:00:00 | 10% | 50% | |
08:00:01 – 16:00:00 | 20% | 75% | |
16:00:01 – 24:00:00 | 30% | 100% | |
24:00:01 – 32:00:00 | 40% | 100% | |
32:00:01 – 48:00:00 | 50% | 100% | |
48:00:01 or greater | 100% | 100% |
Feature | Feature | Feature |
---|---|---|
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Temperature | Occurs when the ambient air temperature falls outside the defined range for four (4) consecutive hours after the initial temperature reading outside that range. | 5% of the total monthly recurring charges for datacenter colocation services of the Client area for each six (6) hour period during humidity failure. 10% of the total monthly recurring charges for datacenter colocation services of the Client area for each consecutive six (6) hour period during critical humidity failure. |
Temperature: Critical Failure | Occurs when the ambient air temperature average at the nearest supply grill is eighty-seven degrees Fahrenheit (87°F) or higher. | 10% of the total monthly recurring charges for datacenter colocation services of the affected Client area for each consecutive four (4) hour period during critical temperature failure. |
Humidity | Occurs when the ambient air relative humidity average is outside the range of forty-five percent (45%), plus or minus fifteen percent (15%) six (6) hours after the primary humidity reading fell outside that range. | 5% of the total monthly recurring charges for datacenter colocation services of the Client area for each six (6) hour period during humidity failure. |
Humidity: Critical Failure | Occurs when the ambient air relative humidity average is over sixty-one percent (61%) six (6) hours after primary humidity reading was over sixty-one percent (61%), causing condensation in the Client area. | 10% of the total monthly recurring charges for datacenter colocation services of the Client area for each consecutive six (6) hour period during critical humidity failure. |
This Network SLA applies solely to clients utilizing iDatam network services. If the Client uses a third-party carrier, iDatam's Network SLA does not apply, and the Client relies solely on that carrier's SLA.
If outlined in the Client SOF, the Client may undertake work in the Client Area or designate someone to perform such work. The following provisions govern this work:
Data | Purpose |
---|---|
Feature | Feature |
Feature | Feature |
Feature | Feature |
Feature | Feature |
Feature | Feature |
Feature | Feature |
Feature | Feature |
Threat Management Platform | Utilizes security event logs from various sources, correlating logs with threat signatures to detect potential threats. |
Patch Management | Automated scanning for system patches, hotfixes, and updates on supported operating systems. |
Critical Environment | Leverages disaster recovery services for client servers, as defined in the agreed Statement of Work (SOW). |
Firewall Switch | Manages firewalls and switches, ensuring compliance with industry best practices and proper documentation. |
Vulnerability Assessment | Scans approved networks for vulnerabilities using automated tools or Certified Scanning Vendor services. |
Performance Monitoring | Reports on performance trends, proactive monitoring, and analysis of performance metrics. |
End Point Security | Manages security for server and end-user devices through anti- malware software. |
1. Priority (Critical) | 20 Minutes | 2 Hours | A genuine issue has emerged that seem significantly influence the commerce or client information. This issue is noteworthy, causing a major affect that's highly discernible within the day-to-day operations of the commerce. Shockingly, there's right now no accessible workaround to address this issue. |
|
2. Priority (High) | 1 Hour | 4 Hours | A noteworthy chunk of the company's operations are being disrupted. It is evident that the issue contains a enormous affect on the client and their ordinary trade operations.Thankfully, there's a tried-and-true workaround accessible. |
|
3. Priority (Medium) | 4 Hour | 8 Hours | There is little visibility into the problem, and only a small percentage of the client's business is affected. The system might still be in service, but it might be operating at a lower capacity. As an alternative, a dependable and tested workaround for the problem is in place. | Evidence of malware activity has been linked to reputable harmful sources like Coreboot and Zeus. The exposure to this activity is constrained, though. |
4. Priority (Low) | 1 Business Day | 1 Day | Customers only need to adhere to the offered workaround in order to preserve full functionality and experience regular performance. | There are signs demonstrating that harbour checks or other surveillance exercises have been identified. |
Under normal circumstances, iDatam endeavors to deploy a client's new server within 4 hours, provided the order doesn't entail special instructions, necessitate MSSQL installation, or require an on-board RAID configuration. Regardless of configuration, all orders are guaranteed deployment within 24 hours of payment verification.
Should iDatam fail to meet this commitment, a 10% credit of the service cost towards the client’s first month's hosting fees will be issued upon client notification within 7 days of the missed deployment.
Network Downtime encompasses situations where a client's server is unable to transmit or receive data to/from the Internet due to a failure in network equipment managed and owned by iDatam.
iDatam's Network comprises its infrastructure hardware, including routers, switches, and cabling, excluding services or software running on the server or its hardware.
In the event of downtime, iDatam will credit the client’s account with 5% for each 30-minute segment of downtime, up to the total monthly cost.
Clients are ineligible for credit if downtime is caused by:
Clients are required to report downtime incidents via email to support@idatam.com or through iDatam’s portal at https://billing.iDatam.com within 3 days of the event's onset. Each report should cover a single event and include service type, IP Address, a comprehensive description of the service interruption, and relevant logs (if applicable). Downtime is officially recognized from the time iDatam receives the email "ticket" until iDatam, at its sole discretion, resolves the issue.
If a client is currently in arrears with payments on their accounts or has fallen behind three or more times within the preceding 12 months, they are ineligible for an SLA credit for Downtime. Valid SLA claims cannot be credited if the client has outstanding abuse issues. However, once these issues are resolved, iDatam will duly credit all valid claims. Making false or repetitive claims will incur a $50 charge per incident and may result in the violation of the account Acceptable Use Policy and Terms and Conditions. Engaging in malicious or aggressive Internet activities, such as attacks or counter-attacks, constitutes a violation of the Acceptable Use Policy and Terms and Conditions.
iDatam ensures that one of its skilled professionals will respond to client support tickets or inquiries within 20 minutes of submission. This guarantee extends to support tickets sent via email to support@idatam.comor submitted through the portal at https://billing.iDatam.com
4 Hour Hardware Replacement Guarantee:
In the event of hardware failure located within iDatam’s data center, iDatam commits to replacing it within 4 hours of failure notification. To report a failure, clients should email support@idatam.com or submit a ticket through the portal at https://billing.iDatam.com
Failure to replace the hardware within 4 hours will result in iDatam crediting the client for one day of their monthly recurring hosting charges. Subsequent credits of one day each will be issued for every four-hour block beyond the initial guarantee, up to a total of 100% of the client’s monthly recurring payment if necessary. Official credit requests must be sent within 7 days of the hardware replacement, via email to support@iDatam.com or by submitting a ticket through the portal at https://billing.iDatam.com
In the event of hardware failure located within iDatam’s data center, iDatam commits to replacing it within 4 hours of failure notification. To report a failure, clients should email support@idatam.com or submit a ticket through the portal at https://billing.iDatam.com
Bare Metal Cloud forms a part of iDatam’s Infrastructure-as-a-Service (IaaS) offering. Designed for modern IaaS business consumers relying on high automation levels and employing a DevOps approach to software development and IT operations, BMC complements existing bare metal services. BMC provides highly automated workloads through a modern API management platform, utilizing cutting-edge server technology and a high-capacity network for infrastructure deployment in a fully automated, pay-as-you-go model.
BMC Edge locations operate under best-effort service restrictions due to their nature and accessibility. BMC Edge Instance types are clearly marked with distinctive use of the letter "E" or "e" in the instance naming policy, visible in the BMC Portal and API documentation.
Bare Metal Cloud SLA's
Under most circumstances, iDatam strives to deploy the Client's new server instances within minutes. Regardless of configuration, iDatam assures a server deployment within 24 hours, commencing upon verification of the Client’s order and valid payment method. However, BMC Edge locations might have more restricted availability, leading to potential extended deployment times in uncommon cases.
Network Downtime refers to instances when a Client’s server cannot send or receive data to/from the Internet due to a failure in network equipment managed and owned by iDatam.
iDatam's Network encompasses all infrastructure hardware, such as routers, switches, and cabling. However, it excludes services or software operating on the server or its hardware.
iDatam offers compensation for network downtime events by crediting the Client’s account with 5% for every 30-minute segment of network downtime, up to the total monthly cost.
Clients are not eligible for credit if downtime results from:
Clients must report downtime incidents via email to support@idatam.com or through iDatam’s portal at https://billing.iDatam.com within 3 days of the event's start. Each report should cover a single event and include service type, IP Address, and a detailed description of the service interruption, along with logs if applicable. Downtime officially begins upon iDatam's receipt of the email "ticket" and ends when iDatam, at its discretion, resolves the issue.
Clients with outstanding payments or three or more instances of delayed payments within the preceding 12 months do not qualify for an SLA credit for Downtime. Valid claims cannot be credited while Clients have unresolved abuse issues. However, upon resolution, iDatam will credit all valid claims. Making false or repetitive claims will incur a $50 charge per incident and may result in violating the account's Acceptable Use Policy and Terms and Conditions. Engaging in malicious or aggressive Internet activities also violates the Acceptable Use Policy and Terms and Conditions.
iDatam ensures that its skilled professionals will respond to Client support tickets or inquiries within 20 minutes of submission. This guarantee applies to support tickets sent via email to support@idatam.com or submitted through the portal at https://billing.iDatam.com
Best Effort Hardware Replacement Guarantee:
If hardware owned by iDatam and located within its data center fails, iDatam will replace it as soon as possible. To report a failure, clients should email support@idatam.com or submit a ticket through the portal at https://billing.iDatam.com Note that Edge locations might be subject to restrictions and additional time for replacement.
Relevant to services requiring a one-month minimum commitment
Feature | Feature | Feature |
---|---|---|
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
99.999%-99.99% | 26 seconds up to 4 minutes | 0% |
99.99%-99.9% | 4 minutes up to 44 minutes | 10% |
99.9%-99.8% | 44 minutes up to 97 minutes | 25% |
99.8% | Over 97 minutes | 50% |
Applicable to services that require an hourly rate
Feature | Feature | Feature |
---|---|---|
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
Feature | Feature | Feature |
99.999%-99.99% | 26 seconds up to 4 minutes | 0% |
99.99%-99.9% | 4 minutes up to 44 minutes | 10% |
99.9%-99.8% | 44 minutes up to 97 minutes | 25% |
99.8% | Over 97 minutes | 50% |
BMC Instances (servers) are invoiced monthly in a post-use model.
The Megaport Cloud Router (MCR) is a managed third-party virtual routing service designed for deploying Layer 3 private connectivity between diverse networks and service providers. It facilitates connecting two or more independent Virtual Cross Connect (VXC) services within a single routing domain, thereby establishing Internet Protocol (IP) connectivity among all VXCs linked to that MCR.
The MCR service aims for a service availability target of 100%.
It is calculated per Charging Period as Uptime divided by (the number of minutes in the Charging Period minus Excused Downtime), expressed as a percentage.
This refers to the applicable charging period specified on the Service Order. If not specified, a monthly Charging Period applies.
The duration during the Charging Period when the MCR functions, effectively routing packets between connected VXCs.
It encompasses the minutes in the Charging Period, rounded to the nearest minute, when the link state of the Client's MCR is unavailable due to various factors specified, including actions of the Client or authorized users, third-party network faults, maintenance activities, and more.
Where:
Clients should report downtime incidents via email to support support@idatam.com or submission through iDatam’s portal at https://billing.iDatam.com within three (3) days of the event's commencement, covering one event per report. Details should include service type, IP Address, a comprehensive description of the service interruption, and logs if applicable. Downtime officially starts upon iDatam's receipt of the email "ticket" verifying an outage and ends at iDatam's discretion upon issue resolution.
Clients with overdue payments or multiple delayed payments within the previous 12 months are ineligible for an SLA credit for Downtime. Valid SLA claims cannot be credited if Clients have unresolved abuse issues. However, upon resolving these issues, iDatam will credit all valid claims. Making false or repetitive claims incurs a $50 charge per incident and may lead to violating the account’s Acceptable Use Policy and Terms and Conditions. Engaging in malicious or aggressive Internet activities also disqualifies Clients from SLA credits.
20-Minute Support Response Guarantee: iDatam assures that its proficient professionals will respond to the Client’s support tickets or inquiries within 20 minutes of submission. This guarantee applies to support tickets emailed to support@idatam.com
Contingent upon iDatam DC’s acceptance of an Order and subject to the terms of the MSA, iDatam agrees to provide the Services with reasonable commercial efforts. iDatam reserves the right to reject Service requests in its sole discretion. Clients agree to pay all charges in advance, including monthly fees, additional product charges, and optional charges incurred. Payment methods include check, PayPal, Wire, or credit card. Client's authorization permits iDatam to automatically charge amounts owed each month. Third Party Services are provided by relevant Third Parties, and iDatam is not accountable for their provision.
Clients must be at least 18 years old or possess the legal capacity to order Services. If ordering Services on behalf of an employer or legal entity, the Client represents having the legal right and authority to order Services and be bound to this MSA.
Ordering and Modification of Services
Clients may order Services and upgrades through the Client Portal or as designated by iDatam DC may accept Orders at its discretion and notify Clients of acceptance through the Client Portal. For downgrades or cancellations, written notices are required through support@idatam.com and the Client Portal, 24 hours before 00:00:01 CST (GMT-7) on the Anniversary Billing Date. Failure to provide notice leads to charges for the Services during the Renewal Term. Canceled Services before the 24 hours remain accessible until the automated process reclaims the server on the Anniversary Billing Date.
Subject to this MSA, iDatam grants Clients a non-exclusive, non-transferable, revocable right in the Services for internal purposes, to use and access the Services, and create and offer Client Offerings.
Clients agree to comply with laws, pay fees on time, maintain security, cooperate with iDatam’s investigations, adhere to license terms, provide accurate Account Information, be responsible for Service usage, comply with TPS Agreements, prevent unauthorized access, and include relevant terms of this Agreement in Client End User agreements. Clients must not use the Services where failure could result in death, injury, or physical/environmental damage. Reselling Services to Third Parties requires a reseller agreement with iDatam.
For Third Party Services ordered under TPS Agreements, iDatam is not liable; the Third Party provider is solely responsible.
All users of iDatam DC (iDatam) services are expected to comply with the following acceptable use policies. iDatam reserves the right to modify these policies at any time, and updates will be published in here.Users are responsible for regularly reviewing the AUP to ensure adherence to the most recent version. Continued use of the services following changes constitutes acceptance of the updated modifications. Any complaints regarding violations of these AUPs should be directed to support@idatam.com
The following Acceptable Use Policies outline acceptable conduct when using iDatam's services and the actions iDatam may take in response to any misuse of the services, with or without prior notice. These policies are derived from applicable laws and generally accepted Internet conduct standards, aiming to safeguard iDatam's technical resources, maintain the provision of high-quality services, and uphold its reputation. Users are expected to abide by the following AUPs:
Exporting encryption software outside the U.S. via the Internet or any other means is prohibited.
Accessing other networks connected to iDatam’s services must comply with the rules of those networks and iDatam's policies.
iDatam reserves the right to monitor all communications through its facilities for compliance with this AUP and iDatam’s Terms and Conditions. No expectation of privacy is granted.
iDatam cooperates with law enforcement to investigate illegal activities, including illegal material transfer, threats, or other unlawful activities.
iDatam will not release user or client Personally Identifiable Information (PII) except upon presentation of a valid court order or legal requirement. Users agree to iDatam’s judgment regarding the validity of such requests.
How to Report Copyright Violation Complaint
As an Internet Service Provider (ISP), iDatam adheres to the guidelines set forth by the Digital Millennium Copyright Act (DMCA) concerning notifications, content removal, and counter-notifications. If you suspect that one of iDatam's customers has violated your copyrights, the Digital Millennium Copyright Act (17 U.S.C. § 512) provides clear instructions on how to notify the party responsible for the infringement.
Following the guidelines of the Digital Millennium Copyright Act, it is essential to furnish iDatam with the complete set of the following information:
Kindly use the provided Copyright Infringement Notification form (accessible through the link below) to submit all the necessary information. This method allows for electronic completion and signing of the document, and you can also attach any supporting documentation directly to the form.
Having received this information, iDatam can promptly and earnestly address any network user potentially violating copyright law. However, it is important to note that we are not legally in a position to take any action until you have fully complied, and we are officially notified of the infringement.
If you have inquiries about our policies or procedures, feel free to reach out to the designated DMCA Agent for the respective service. You can contact them using the provided information.
You are allowed to use the Copyright Infringement Notification Form solely for reporting copyright violations in line with the DMCA. This form should not be used to notify iDatam about any other type of infringement. In cases outside the scope of copyright issues, the complainant is responsible for pursuing appropriate legal remedies.
© iDatam LTD