Your data doesn't train 蜜桃传媒's AI
You keep IP ownership聽of your docs
1. Parties: Identification of the service provider and recipient, including full legal names and registered addresses
2. Background: Context of the agreement, typically referencing the main transaction (e.g., merger, acquisition) necessitating the TSA
3. Definitions: Defined terms used throughout the agreement, including Service Periods, Service Levels, Transition Period, etc.
4. Services: Overview of services to be provided, referencing detailed service descriptions in schedules
5. Term and Termination: Duration of the agreement, extension options, and termination rights
6. Service Levels: Performance standards and quality requirements for the services
7. Fees and Payment: Pricing structure, payment terms, and invoicing procedures
8. Governance and Reporting: Management structure, periodic reviews, and reporting requirements
9. Obligations of the Parties: Key responsibilities and commitments of both service provider and recipient
10. Personnel: Requirements regarding staff providing services, including key personnel provisions
11. Intellectual Property: Ownership and usage rights of IP during and after the transition period
12. Confidentiality: Protection of confidential information exchanged during service provision
13. Data Protection: GDPR compliance and data handling requirements
14. Liability and Indemnification: Limitations of liability and indemnification obligations
15. Force Majeure: Provisions for handling events beyond parties' reasonable control
16. Exit Management: Procedures for service transition at agreement termination
17. Governing Law and Jurisdiction: Application of Dutch law and jurisdiction for dispute resolution
1. Migration Services: Include when specific data or system migration services are required
2. Third Party Contracts: Include when services involve management or assignment of third-party contracts
3. Business Continuity: Include for critical services requiring specific disaster recovery provisions
4. Regulatory Compliance: Include when services are subject to specific regulatory requirements
5. Security Requirements: Include when services involve access to sensitive systems or data
6. Asset Usage: Include when physical or IT assets are being shared during transition
7. Employee Matters: Include when staff transfers or secondments are part of the transition
8. Insurance: Include when specific insurance coverage is required for services
9. Step-In Rights: Include when service recipient needs rights to take over service provision in certain circumstances
1. Schedule 1 - Service Descriptions: Detailed descriptions of each service to be provided
2. Schedule 2 - Service Levels and KPIs: Specific performance metrics and measurement methods
3. Schedule 3 - Pricing and Charging Structure: Detailed fee calculations, rates, and charging mechanisms
4. Schedule 4 - Governance Procedures: Detailed procedures for service management and oversight
5. Schedule 5 - Contact Details and Escalation Procedures: Key personnel and communication protocols
6. Schedule 6 - Exit Plan: Detailed procedures for service handover or termination
7. Schedule 7 - Data Processing Agreement: GDPR-compliant data processing terms and procedures
8. Schedule 8 - Security Requirements: Detailed security protocols and requirements
9. Appendix A - Service Request Form: Template for requesting additional or modified services
10. Appendix B - Reports: Templates for required service reports and monitoring
11. Appendix C - Transition Plan: Detailed timeline and milestones for service transition
Find the document you need
骋别苍颈别鈥檚 Security Promise
蜜桃传媒 is the safest place to draft. Here鈥檚 how we prioritise your privacy and security.
Your data is private:
We do not train on your data; 骋别苍颈别鈥檚 AI improves independently
All data stored on 蜜桃传媒 is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
