ABOUT THIS DOCUMENT
- This document is referred to as the Managed IT + Services Service Terms, + Services Service Terms or Plus Services Terms
- This document outlines the Managed IT + Services service that the Service Provider provides to its clients.
- Completion by both the Client and the Service Provider of an Order Form for this service, constitutes acceptance of these Terms.
- The Service Provider advises its clients that its terms are published at https://ccp.com.au/terms
- For definitions and our Master Terms of Service, read our Master Terms of Service available at https://ccp.com.au/terms/terms-of-service
GLOSSARY OF TERMS
See the Legal Glossary for the full glossary. It is shared across all four plan product descriptions and is referenced here rather than inlined.
UNIT OF MEASURE
- We measure the service quantity as a number of “seats”.
- Seats means a combined total of “users” and “servers” where;
- A user for the definition of counting seats is a distinct individual (employee, contractor, offshore worker, third-party user, etc.) who uses or has access to any Service Component under these Terms (for example: Helpdesk support, Microsoft 365, Cybersecurity Training, Cloud Phone, etc.), irrespective of how they connect or whether their device is actively monitored.
- A server for the definition of counting seats is any operating system dedicated to providing shared, business-critical services to two or more users, and;
- Hosts one or more server roles (for example: domain controller, file server, application server, database/mail/web/print/backup server, virtual desktop host, or similar).
- Excludes any endpoint primarily used by a single person for their own work (laptops, desktops, workstations, tablets, phones, even if monitoring or security agents are installed).
- This service has a minimum quantity of 10 seats.
- All User and Server Seats must be included - no exclusions for unmanaged email (e.g. Gmail), unmonitored endpoints, offshore devices, offshore staff, subcontracted staff, etc, unless they are;
- Managed, supported, and monitored by a third party to a similar level of security as what is included in this service or to a level we agree to in writing and,
- at no point request any of the products, services, or components in this service.
- The components of this service may have different units of measure and/or the individual features of components in this service may have different units of measure as defined in their quantity ratio definition.
ABOUT COMPONENTS
- This service consists of multiple components.
- Each component has its own description, client obligations, limitations, and optionally a quantity ratio.
- The description of a component describes how the service operates, is delivered, and what inclusions if any.
- The client obligations list your obligations that we require to deliver the services as outlined in this document.
- The limitations describe examples where we may not be able to supply the services or where the description may be limited by additional factors.
- the quantity ratio defines the maximum quantity of assets, devices, domains, or other unit of measure covered by the component, represented as a ratio against the total number of seats. For example, 1 domain per 5 users. Where a ratio is defined, the ratio is rounded down to the nearest whole number. Exceeding the quantity ratio for a component will require you to either reduce your usage, increase your seats, or pay a fee for exceeding the quantity included in the component.
Client Security Baseline Obligation
Commitment Overview
To maintain a secure and resilient IT environment, all clients are required to meet a defined set of baseline security requirements. These standards are essential for protecting both the client’s and the Service Provider’s systems, data, and operations from cyber threats.
We acknowledge that implementation may take time. However, to the extent permitted by law, the Service Provider is not liable for any security incident, breach, data loss, or related service issue that could reasonably have been prevented by timely implementation or ongoing maintenance of the security controls outlined in this document. Until the security baseline is fully met, any related remediation work will fall outside the scope of our standard service coverage.
Baseline Security Requirements
These baseline requirements apply where the relevant security control is included in your selected services or, if not included, are expected to be implemented via an equivalent solution internally or from a third-party provider unless otherwise agreed to by us in writing:
- Regular Operational Reviews:
Engage in any regular meeting we schedule to;- Review reports and address any security concerns with the service provider.
- Reconcile the list of staff and devices, identifying any discrepancies in reports.
- Address any excessive use of our services as defined in our Master Terms of Service.
- Multifactor Authentication (MFA):
- Implement phish-resistant multifactor authentication or similar controls to secure access to all critical systems.
- Application Control:
- Implement our Application Control product or a similar product from another provider to manage and monitor application usage and prevent unauthorized applications from running.
- Vulnerability Management:
- Implement enhanced vulnerability management or an equivalent service offered by another provider to attempt to remediate known vulnerabilities within a 30 day period or better.
- Cybersecurity Awareness Training:
- Participate in Cybersecurity Awareness Training through our service or an equivalent program offered by another provider to educate employees about cybersecurity best practices and threat recognition.
- Password Management:
- Implement a password manager with Single Sign-On capabilities through our service or a similar product from another provider to enhance password security and simplify user authentication.
- HR Collaboration:
- Include the service provider in new hire onboarding and employee termination processes to ensure proper account management and access control.
- Regular Staff and Device Audits:
- Conduct regular reviews with the service provider to reconcile the list of staff and devices, identifying any discrepancies in reports.
- Incident Response Planning:
- Develop and maintain an incident response plan that specifically addresses how to manage and mitigate cyber incidents.
- Data Backup: * Ensure all critical business data is backed up through our services or a similar backup solution provided by another vendor.
- Collaboration with Software Providers: * Work with all software providers to implement and enforce multifactor authentication or similar controls.
Liability, Coverage Exclusion, and Remedy
-
Until the security baseline is fully implemented:
- To the extent permitted by law, we are not liable for any incident that could reasonably have been prevented by adherence to the requirements set out above.
- Work related to such incidents is not covered by our standard service entitlements and may incur additional charges.
-
If we detect you have not implemented (or have removed) a mandatory baseline security control,
- we will notify you in writing, specifying the non-compliance and outlining the steps required. We will offer reasonable assistance to help you comply (where the relevant control is included in your Service plan);
- You will have 30 days (“Remedy Period”) from notice to address the non-compliance or agree on a remediation plan with us. If, after this period, you remain non-compliant:
- We may suspend or restrict only the affected service(s) (e.g. Cyber Security), where technically possible, and you acknowledge that we have no liability for any incidents or losses arising from such service(s) during the period of non-compliance.
- If ongoing non-compliance creates a material risk to our systems or other clients, or if partial suspension is not technically or commercially feasible, we may terminate your agreement with a further 30 days’ written notice.
- We may extend the remedy period if you are actively working with us in good faith to resolve the issue.
-
You acknowledge that until all baseline security requirements are met, the effectiveness of our services may be reduced, and we are not responsible for loss or damage that could have been prevented by your compliance.
-
By engaging our services, you acknowledge and agree to these baseline security requirements, recognising your role in upholding the security and integrity of the shared IT environment.
Included Components
Managed Helpdesk Component
Description
Our Managed Helpdesk component is designed to provide comprehensive support for your business needs. The component includes:
- Remote Support. We include unlimited remote support, by way of phone calls, emails and remote control software, subject to the acceptable use policy as per the Master Terms of Service.
- Onsite Support. We include unlimited onsite support, within our service area, subject to the acceptable use policy as per the Master Terms of Service.
- Out of Scope Support Rates. Out of scope work is charged at a reduced rate of $190/hour, charged in increments of 15 minutes. Out of scope work performed onsite has a minimum charge of 1 hour.
- Dedicated Support Team. You will have a team of skilled IT technicians, led by at least one senior technician, assigned to your account for consistent and personalized service. At any time, you may request a different team in writing and if it is within reason, we will do our best to fulfil that request.
- Direct Contact Number. You will receive a dedicated phone line for direct access to your support team to bypass any receptionist, dispatcher, or other administrative staff.
- Enhanced Service Level Agreements (SLAs):
- Priority 1 (Critical): Response within 1 business hour.
- Priority 2 (High): Response within 4 business hours.
- Priority 3 (Medium): Response within 1 business day.
- Priority 4 (Low): Response within 2 business days.
- Priority 5 (Very Low): Best effort response.
The priority level is determined based on the urgency and impact of the issue, at our discretion, acting in good faith.
You may opt to escalate the priority level of any request, as per our Master Terms of Service.
Client Obligations
For the Managed Helpdesk component, clients and their staff are required to:
- Provide timely and accurate information necessary for us to perform our services.
- Attend scheduled appointments for the time they are scheduled.
- Perform identity verification for privileged requests to ensure security compliance.
- Use the designated communication channels (our ticketing system, email, or the direct contact number) to log issues for SLA tracking.
Service Limitations
The Managed Helpdesk component has the following limits:
- Response and Resolution Times: These are dependent on the timeliness of the information provided by the customer. SLA times are paused when waiting for third-party vendor responses, identity verification or additional information from the customer. SLA response times are only recorded when requests are logged through to our official support email address, our ticketing platform or over the phone.
- Out of Scope Work:
- Any work performed to support a 3rd party’s product where we can provide a comparable service or product is considered out of scope as per our master terms of service.
- On-site work provided outside our service area is considered out of scope.
- Out of scope work is exempt from our SLAs (Service Level Agreements) and is performed at a “Best Effort” response time.
- Project Work: Project work is considered out of scope.
- Project Work typically involves tasks requiring planning, scheduling, stakeholder coordination, or anticipated effort exceeding 3 business days. If in doubt, we will advise you in writing before classifying a request as project work.
- Examples of project work are, but not limited to;
- Office relocations
- New office fit outs
- New system integrations
- Cloud platform migrations
- SharePoint intranet development
- New server deployments
- New network infrastructure deployments
- Custom software development
Managed Cyber Security Component
Description
Our Managed Cyber Security component is designed to provide a layered cybersecurity approach to protect your organisation from cyber threats. This component includes:
- Managed Antivirus. We manage your systems built-in antivirus, or the antivirus provided through other inclusive licensing like Microsoft Defender for Endpoint when you subscribe to a plan that provides this antivirus. In the absence of a suitable antivirus, we will supply an antivirus product.
- Endpoint Detection and Response. We will provide Endpoint Detection and Response capabilities, backed by a 24x7 security operations centre. The Endpoint Detection and Response service will employ techniques such as ransomware canaries, open port detection, malicious process behaviour detection, and persistent foothold detection. Refer to the “Security Operations Centre Response” for how incidents are responded to.
- Identity Threat Detection and Response. We will provide Identity Threat Detection and Response capabilities, backed by a 24x7 security operations centre. The Identity Threat Detection and Response service will employ techniques such as session hijacking protection, credential theft protection, location and VPN anomaly detection, rogue application detection, and other signal monitoring methods. Refer to the “Security Operations Centre Response” for how incidents are responded to.
- Security Operations Centre Response. The security operations centre will respond to threats and alerts in a timely manner.
- Where the security operations centre can confirm a compromise with confidence the security operations team will remotely isolate the impacted device or user account.
- Where the security operations centre cannot confirm a compromise with confidence;
- an incident report will be supplied to our frontline helpdesk who will perform additional investigation, contact the impacted user or assigned user of the impacted device, and
- if we are unable to contact the user, out of an abundance of caution, isolate the impacted device or user account.
- when isolating a device or user account;
- isolating a device means to restrict its ability to communicate with any network, and
- isolating a user means to restrict its ability to log in and revoke any existing sessions.
- DNS Security Filtering. We will provide at the device or network level, Domain Name Service (DNS) security and category filtering. We will use DNS Security filtering to block threats through blocking known malicious domain names, risky Top Level Domain (TLD) extensions, domains that do not satisfy minimum age requirements, and similar. You may optionally use the DNS filtering service to block categories of domains such as gambling, artificial intelligence, recruitment, social media, and similar.
- Domain Registration and DNS Management. We will register your gTLD and auTLD domains (.com, .net, .org, .com.au, .net.au, .org.au) domains as part of the service. We will keep the domain registered, protect it from unauthorized transfers and modification, manage its DNS records, and provide valid SPF, DKIM, and DMARC configuration for your domains to prevent impersonation and spoofing attacks.
- Backups for Servers. We will provide a backup service for your servers and retain those backups with an agreed upon retention period. We will provide 1 Terabyte of backup storage per server (pooled) held offsite from your organisations environment. If your backup requirements exceed the allocated storage, we will notify you and either lower your retention period to reduce your storage requirements or charge you for the additional storage. Backups will be taken once per day, or at an agreed upon cadence.
- Backups for Microsoft 365. Where we are providing your Microsoft 365 licensing, we will include backups as a service, retain information for up to 7 years or until you cancel your service with us, performing a backup at least once per day. It will include features such as point in time restore, eDiscovery search, with unlimited storage. We will back up the following workloads inside of Microsoft 365;
- Exchange Online
- Outlook Mail
- Folders
- Contacts
- Calendars
- Tasks
- Attachments
- In-place Archives
- Public Folders and Subfolders
- Shared Mailboxes
- SharePoint
- Sites
- Sub-Sites
- Documents
- Folders
- Lists
- Site Assets
- Site Pages
- Style Library
- Permissions
- OneDrive
- Drives
- Folders
- Permissions
- Groups & Teams
- Channels (Private & Public)
- Conversations
- Permissions
- Tasks
- Mailbox
- Drives
- Sites
- Calendar
- Files
- Notebooks
- Planner
- Private Chats
- Exchange Online
- Regular Backup Testing. We will validate and test the backups we take on an automated basis once every business day. We will perform disaster recovery testing of the backups we take, once per year.
Client Obligations
For the Managed Cyber Security component, clients and their staff are required to:
- Attend any cyber security incident response sessions we hold.
- Participate any cyber security audits we may perform when requested.
- Implement changes in your businesses processes that we recommend, where the recommendations would increase your cyber security. This may include changes such as regularly reviewing access to systems, implementing approval workflows, modifying your employment and termination procedures to correctly add and remove users from IT systems.
- Notify us in a timely manner of all employee hires and terminations.
- Notify us of any expected travel before the travel date.
- Notify us of any suspected cyber security incident, such as accidentally clicking on a phishing link, running a file that had unexpected behaviour, or unusual behaviour within your systems.
- Assign as us your Partner of Record in Microsoft 365, and grant what permissions and access that we ask for.
- Provide us with access to your systems when required to install, reinstall, configure, repair, or diagnose issues with our software and services.
- Purchase and maintain suitable onsite storage that meets our requirements as requested by us, to facilitate server backups.
Service Limitations
The Workstation Monitoring component has the following limits:
- DNS Security Filtering Limitations: The categorization systems for domains may from time to time, incorrectly categorize a domain, allowing it through the filter, or blocking it as a false positive. If any domain is miscategorized, you may notify us, and we will submit it for reclassification.
- Backup Licensing Limitations:
- Deactivated Mailboxes: We grant up to 20% (rounded down) free deactivated backups. For the avoidance of doubt, this means that if we are providing the service for ten users, we will keep up to two mailboxes under a ‘Deactivated’ status. This will retain the existing backup data but will not receive new backup information.
- Shared Mailboxes: We grant up to 50% (rounded down) free shared mailbox backups. For the avoidance of doubt, this means that if we are providing the service for ten users, we will include the backups for up to five shared mailboxes as part of the service.
- License Overages: All mailboxes must be backed up; we do not exclude any mailboxes from our backup service. If your backup requirements exceed our backup allowances, we will contact you and either remove mailboxes from your Microsoft 365 service or charge you for the overages at our current backup service rates.
- Supported Operating Systems for EDR: The Endpoint Detection and Response service can only run on supported operating systems. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- macOS
- Supported Operating Systems for Managed Antivirus: The Antivirus Management features are only available on supported operating systems. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- Supported Operating Systems for DNS Security Filtering: The DNS Security Filtering features are only available on supported operating systems. If your device is not supported, we will deploy network level filtering or DNS forwarding as an alternative. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Android and iOS
- Chromebook (through chrome extensions)
- macOS
- Supported Operating Systems for Backups: We can only back up supported operating systems, that have not reached end-of-life support from their manufacturer. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- Linux
- macOS
- Recovery Time Objectives: The time to recover from backups are subject to the amount of data stored and available bandwidth. Recovery is performed as fast as the technology allows. Once we complete our first annual disaster recovery test, we will report on the time it takes to restore from backups.
Quantity Ratios
- Domain Registration and DNS Management: 1 Domain per 5 seats.
- Managed Antivirus: 1.35 devices per seat.
- Endpoint Detection and Response: 1.35 devices per seat.
Monitoring and Patching Component
Description
Our Monitoring and Patching component is designed to provide remote access for our IT support staff, asset tracking, software cataloguing, fault detection, patching, and remediation on an automated basis. This component includes:
- Asset Inventory: We collect information on devices we monitor, such as serial numbers, operating systems, software installed, resource utilization history, patch status, health status, and more.
- Monitoring and Alerting: We build and define monitoring and alerting policies to detect potential failures, incidents, and tasks requiring remediation.
- Automated Patching: Automated patching of Windows, MacOS, and Linux Operating systems and automatic updating of over 200 3rd party applications.
- Secure Remote Access: Audited, recorded, and secure remote access for our IT support staff to support their Remote Support work.
- Automated Remediation: We build and deploy automated remediations for common Windows desktop and server issues.
- Warranty Tracking: We record serial numbers of assets and where possible, retrieve warranty information.
Client Obligations
To ensure effective delivery of our Monitoring and Patching component, clients and their staff are required to:
- Provide access to physical devices for us to install our monitoring agent on devices or install the monitoring agent following our instructions when requested.
- Ensure devices are powered on at least once every 30 days to receive patches and updates.
- Restart devices when prompted by us or our monitoring agent to facilitate patching and updates.
Service Limitations
The following limitations apply to our Workstation Monitoring component:
- Patching Limitations: Patching through our monitoring agent is only possible when no other patching solution is in place. In some configurations, we may opt to use alternate services like Microsoft Intune to manage patches of the operating system if we determine it would provide a better patching and updating experience.
- Auditing Limitations: We retain audit logs for a minimum of 90 days. Though we may be able to retrieve audit logging beyond the initial 90 days, it is not guaranteed. Remote support session recordings are stored for 30 days on a best effort basis. Availability of remote support session recordings are not guaranteed.
- Warranty Tracking: Warranty information is dependant upon the information obtainable through the APIs of the manufacturer of the device. If warranty information is inaccurate or unavailable from the manufacturer through their APIs or their API is unavailable, warranty information will not be recorded.
- Supported Operating Systems for Monitoring and Patching: Our monitoring and patching services are available only for supported operating systems, that have not reached end-of-life support from their manufacturer. The supported versions will change as new operating systems are released, and older operating systems reach end of life. You may request the list of currently supported operating system versions from us. The supported operating system types are as follows;
- Microsoft Windows Editions
- Microsoft Windows Server Editions
- macOS
- Linux
Security & Tech Review Component
Description
Our Security & Tech Review component is designed to solve the administrative requirements of IT. It is designed to be a regular set of meetings to review your IT security controls and incidents, review the performance of our Managed Helpdesk service, and review your license and service consumption to ensure compliance and combat overspending. The component includes:
- Regular Meetings:
- The team lead of your dedicated Helpdesk team will meet with you no less than once per year and no more frequently than once per quarter.
- The frequency of these meetings is at our sole discretion.
- You may opt for a meeting cadence other than what we have determined, for an additional fee.
- The meeting will be performed online over Microsoft Teams, unless we agree to meet in person.
- We will only agree to meet in person if the meeting location is within our service area.
- Security Review:
- We will report on any security incidents logged, prevented, or remediated since the most recent review.
- If you are using Microsoft 365 Business or Enterprise licenses, we will review your Microsoft 365 Secure Score and provide a roadmap of recommendations to improve your score.
- License and Service Review:
- We will report on your license consumption of any licenses we provide, and upon request report which users in your organisation are using these licenses.
- We will report on your service consumption for services we are providing, or would be capable of providing, with an aim to optimise your costs, reduce administration overhead, and unlock additional revenue.
- Managed Helpdesk Review:
- We will report on and discuss any service incidents, service requests, and change requests that have been flagged by you or our support team for discussion during the next Security & Tech Review.
- We will discuss ticket logging rates, ticket category metrics, user metrics, and other metrics to give you insight into how your staff are utilizing our Helpdesk.
- We will discuss any service incidents, service requests, and change requests that have stalled or were abandoned (we stopped receiving a response from you) to determine if it still needs to be addressed, and re-open and progress these tickets where needed.
- Asset Reporting:
- We will report on your Asset Lifecycle and recommend replacements where we determine it would increase productivity, mitigate risk, or lower costs.
Client Obligations
For the Security & Tech Review component, clients and their staff are required to:
- Respond in a timely manner to scheduling requests and/or schedule with us a regular meeting schedule such as “the First Monday of Every Quarter at 10am”.
- Set aside no less than 90 minutes per meeting and dedicate that time to the meeting.
- Join or Attend meetings at the time they are scheduled.
- Provide no less than 1 full business days’ notice for rescheduling a meeting or as soon as reasonable able where rescheduling is due to an illness or personal emergency.
- Reschedule a meeting for no later than 30 days after it was originally scheduled.
- Consider and where reasonable, implement our recommendations given during the Security & Tech Review meetings.
Service Limitations
The Workstation Monitoring component has the following limits:
- Scheduling Limitations: Your dedicated Managed Helpdesk team has only one team lead. Where the team lead may be unavailable due to;
- planned annual leave, we will notify you at least 1 business day in advance, or
- illness, personal emergency, or an incident requires their attention that is logged as Priority 1 critical, we will notify you as soon as we are reasonable able, and
- we may opt to assign another team lead or senior manager to attend the meeting in their stead. You may choose to accept the new assignment or opt to reschedule.
- Reporting Limitations: Reports are gathered from a variety of first party and third-party sources. Where these sources are not accessible, reporting may be unavailable or delayed.
Microsoft 365 Component
Description
Our Microsoft 365 component is designed to manage your Microsoft 365 environment, increase adoption of the Microsoft 365 range of features, and secure your Microsoft 365 environment. This component includes:
- Microsoft 365 Environment Management. We will manage your Microsoft 365 Environment including;
- License Management
- Configuration and Management of Security Policies
- Configuration and Enablement of the features included in your Microsoft 365 licenses
- Microsoft 365 Intune Management. We will configure and manage Microsoft 365 Intune with an aim to provide a consistent and secure experience among your owned devices, deploy applications, patches, policies, and controls.
- Microsoft 365 Secure Score Monitoring. We will monitor, manage, and implement Microsoft 365 Secure Score recommendations to improve your security posture.
- Microsoft 365 Best Practices. We will configure and manage the implementation of our Microsoft 365 best practices, with an aim to reduce complexity, increase security, and standardise your environment with our recommendations.
Client Obligations
For the Microsoft 365 component, clients and their staff are expected to:
- Adhere to Microsoft 365’s licensing terms and other terms of service.
- Participate in discovery and onboarding sessions we may run from time to time, to configure the Microsoft 365 environment to be suitable for your organisation.
- Implement policies and processes to support our security recommendations.
- Use company owned, or devices enrolled in Microsoft 365 Intune, for work purposes only and not for personal use.
- Use personal devices for personal use only, not for work purposes.
- Obtain Microsoft 365 Business Premium licenses for each user, or a set of licenses that provides a similar feature set with our approval.
Service Limitations
The Microsoft 365 component service has the following limits:
- Service Enablement Cadence: You may request at any time, that we assist with any new feature implementation or improvement to an existing feature within your Microsoft 365 platform. The order, rate, and cadence with which we provide assistance, configuration, and improvements to Microsoft 365 features is at our discretion, acting in good faith.
- License Requirements: Certain features of Microsoft 365 require specific licenses to utilize these features. If you do not have a license that includes a feature inside of the Microsoft 365 environment for a user, we will not be able to enable that feature, for that user which will reduce your cybersecurity effectiveness.
Email Signature Management Component
Description
Our Email Signature Management component is designed to provide centralised management of email signatures for the Microsoft 365 platform to deliver email signatures with templates, consistent branding, and seasonal promotional information. This component includes:
- Email Signature Management. We will configure and manage your Microsoft 365 email signatures for automatic deployment.
- Custom Templates. We will design your email signatures to be consistent with your branding.
- Dynamic Content. We will create and schedule dynamic content such as promotional messages, legal disclaimers, booking links, and other content.
Client Obligations
For the Email Signature Management component, clients and their staff are expected to:
- Provide existing signatures or branding guides.
- Provide a complete list of staff, including all required contact information to be included in their signatures such as email address, phone number, mobile number, office location, etc.
Service Limitations
The Email Signature Management component service has the following limits:
- Signature Formatting: Email signatures must be interpreted by multiple email clients, devices, languages, screen sizes, and printable formats. Therefore, some design styles may not be possible such as gradients, rounded corners, rounded images, and image overlaps.
- Attachment and Embedding Size Limits: To allow reliable delivery of your emails;
- images embedded are limited to 150kb,
- custom font files limited to 1MB,
- a maximum of 250 elements in a single signature,
- at most 50 images in a signature, and
- at most 20 child elements in a container (such as a table or a table cell).
- Externally Hosted Signature Images: Images hosted externally instead of being embedded in the template will not display on most email clients, due to privacy controls.
Cloud Printer Management Component
Description
Our Cloud Printer Management component is designed to provide automatic deployment, universal configurations, and real-time control for your printers. This component includes:
- Central Printer Management. We will configure and manage your printers through our cloud printer management platform.
- Automated Printer Deployment. We will configure your systems for automated printer deployment and configuration to maintain a consistent experience among your devices.
- Cloud Printing. We will deploy our print agent that will allow you to print from supported Windows, MacOS, iOS, Chromebook, and Android devices.
- Usage Tracking and Auditing. We will provide upon request, usage reports and print activity.
Client Obligations
For the Cloud Printer Management component, clients and their staff are expected to:
- Provide at least one computer that is powered on and connected to the internet for each location or network where you have printer.
- Provide timely access to printers and devices when required by our staff to support the service.
Service Limitations
The Cloud Printer Management component service has the following limits:
- Supported Printers: We support printers from Brother, Canon, Epson, Fujifilm, HP, Konica Minolta, Kyocera, Lexmark, Ricoh, and Xerox. Some models may not support all features.
- Internet Connectivity: Cloud printing is delivered over the internet and requires a reliable internet connection to operate.
Cloud Phone System Component
Description
Our Cloud Phone System component delivers a modern digital voice communication system over the internet, providing advanced call features and flexible management. The service includes;
- Included Calls. Unlimited calls to Local, Mobile and National Numbers Included.
- White-Glove Setup. We will configure and design your phone system, call routing, users, and groups for you.
- Configuration Changes. We include all system configuration changes.
- Lines Included. We include one channel per user.
- Call Features. We will support the following phone system features;
- IVR Menus
- Ring Groups
- Call Transfer
- Fax to Email
- Email to Fax
- Conferencing
- Group Pickup
- Distinctive Ring
- Blacklist
- Time of Day Routing
- Operator Toggled Routing
- Busy Lamp Field
- Call Forwarding
- Hot Desking
- Call Recording
Client Obligations
For the Cloud Phone System component, clients and their staff are expected to;
- Provide and maintain either;
- an approved supported handset device (available for lease or purchase) as required,
- an approved supported headset device (for use with our desktop application) as required or,
- an approved supported mobile device (for use with our mobile application) as required
- Ensure a reliable broadband internet connection at each location utilizing the service.
- Supply accurate contact details, account information, and necessary details for number porting and service setup.
- Cooperate with service provider staff during setup, management, and troubleshooting activities.
- Provide accurate location information where the system is being used so that we can maintain correct information in the IPND (Integrated Public Number Database) database.
- Comply with Australian Privacy Laws, the Spam Act, and Telecommunications Act.
Service Limitations
The Cloud Phone System component has the following limitations;
- Emergency Calls: This service may not support emergency calls (e.g., Triple Zero, ‘000’). Clients should have alternative means such as a landline or mobile for emergencies.
- Location Data: The accuracy of location information relies on the address registered with the IPND (Integrated Public Number Database). Updates should be provided to ensure correct emergency data.
- International Calls: International calling is disabled by default but may be enabled on an account or country basis upon request.
- Marketing Call Centres: Our service is not suited to outbound marketing firms or call centres. Call inclusions are subject to acceptable use policies.
- Calls to Premium Numbers: Calls to premium and toll numbers are prohibited.
- 13/1300/1800 Hosted Numbers: If you host a 13, 1300, or 1800 number with us, inbound calls are charged at their own rates.
- Call Limits: Outgoing call charges are subject to limits to prevent toll fraud. If we detect an abnormally high number of calls originating from your account, we may restrict outbound calls. Notifications are sent as thresholds are approached, and limits can be increased upon request.
- Transfer of Ownership: Only the account holder may pay for the service. If the account holder is a business entity and is sold, any agreement regarding the service automatically transfers to the new owners. If the service needs to be transferred to a new entity, you must request a change of lessee.
- Number Porting Fees: Porting may incur fees depending on the complexity:
- Cat A (simple): $30
- Cat C (complex): Up to $330 Port rejection or reversal may incur additional charges if incorrect details are provided or porting fails.
Quantity Ratios
- In Dial Numbers: 1 standard AU national in dial number per 5 seats, rounded up. Excludes any 1300, 13, or 1800 number
- Extensions: 1 per user
- Channels: 1 per user
Internet Services Component
Description
Our Internet Services component is designed to provide reliable connectivity through NBN (National Broadband Network). Our services include;
- Installation and Configuration. We will provision, install, and configure a suitable NBN or eNBN service to each of your business locations.
- Management and Support. We will monitor, maintain, and support the NBN or eNBN service remotely and onsite.
- Managed Router. We will provide as an included leased asset, a suitable firewall or router device for the internet service we install and configure it for performance and security.
- Unlimited Bandwidth. We will allocate unlimited upload and download bandwidth for the internet services we supply.
- Service Level Agreements. We will supply service SLAs based on your network requirements and the quantity ratios defined in this component. Failure to achieve Uptime Guarantees result in a rebate back on your monthly service. The uptime guarantees and SLAs provided are one of the following;
- Basic SLA
- Best Effort Uptime Guarantee.
- Standard 8am to 5pm Business Support Availability.
- All nbn® faults on your account will be actioned as soon as possible.
- Bronze SLA
- Best Effort Uptime Guarantee.
- 24/7 Support Availability.
- 12hr eSLA: Guarantees that all nbn faults on your account will be actioned within 12 hours, 24/7.
- Silver SLA
- 99% Uptime Guarantee.
- 24/7 Support Availability.
- 8hr eSLA: Guarantees that all nbn faults on your account will be actioned within 8 hours, 24/7.
- Gold SLA
- 99.95% Uptime Guarantee.
- 24/7 Support Availability.
- 4hr eSLA: Guarantees that all nbn faults on your account will be actioned within 4 hours, 24/7.
- Basic SLA
Client Obligations
Clients and their staff are expected to:
- Provide clear access to the premises for onsite installations and support activities.
- Ensure their network equipment remains compatible and connected according to our configuration requirements.
- Communicate any network or equipment issues promptly to facilitate timely resolution.
- Provide accurate details for service setup and any required updates to suit any specific configuration needs.
Service Limitations
- Onsite Support Availability: The availability of onsite support and configuration depends on your location being within our service area.
- Speed & Traffic: During peak times, shared network infrastructure may result in lower speeds than advertised, or may otherwise be limited by the technology available in your area, or the quality of the physical infrastructure in your area.
- Delivery Timelines: eNBN fibre installation can take a significant amount of time from when you place your order and depend on network rollout timings.
- Technology Availability: We can only supply services available through the NBNCo network, therefore, if NBN services are unavailable at your location, we may be unable to provide an internet service to that location.
- SLAs: Base plans offer “Best Effort” service, with optional upgraded SLAs available for higher uptime guarantees and support responsiveness.
- Setup Fees: Setup fees will apply for any new standard NBN internet connection less than 12 months, and for any new enterprise NBN internet Connection less than 36 months.
Quantity Ratios
- Any combination of the following standard NBN internet connections where the total seat ratio does not exceed the number of seats;
- Per 10 seats
- 100Mbps download
- 40Mbps upload
- Basic SLA
- Per 15 seats
- 250Mbps download
- 100Mbps upload
- Gold SLA
- Per 20 seats
- 1000Mbps download
- 400Mbps upload
- Gold SLA
- Per 10 seats
- Instead of/in addition to, and in combination to the standard NBN internet connection ratios above, any combination of the following enterprise NBN internet connections where the total seat ratio does not exceed the number of seats;
- Per 35 seats
- 250Mbps download
- 250Mbps upload
- Bronze SLA or
- Silver SLA for 40 seats
- Gold SLA for 45 seats
- Per 45 seats
- 500Mbps download
- 500Mbps upload
- Bronze SLA or
- Silver SLA for 50 seats
- Gold SLA for 55 seats
- Per 65 seats
- 1000Mbps download
- 1000Mbps upload
- Bronze SLA or
- Silver SLA for 70 seats
- Gold SLA for 75 seats
- Per 35 seats
Web Hosting Component
Description
Our Web Hosting and Management component is designed to provide reliable and secure web hosting for your website. This component includes;
- Web Hosting Platform. We will migrate supported websites and host them on our web hosting platform designed around performance and security. You will be provided upon request, access to our web hosting management platform so that you or a third party may manage your website.
- Web Hosting Security. We will provide and enable by default, our web hosting fortification system, which prevents unauthorised modifications to your website through common exploits and vulnerabilities.
- Web Hosting Backups. We will provide a snapshot service which you may optionally enable to take regular snapshots of your website either on demand, or automatically prior to any automated updates (if they are triggered by our platform). In addition, we will perform regular backups of your website to a physically separate location no less than once every two days.
- Website Application Updates. We will automatically update any supported website content management system where possible, attempted at least once per week.
Client Obligations
Clients and their staff are expected to:
- Provide a complete copy of your existing website and its database to us or provide access to your existing website files and its database to facilitate the migration of your website to our service.
- Ensure you maintain correct and valid licensing for any plugins or themes that your website requires.
- Keep your website code up to date to support the current version of the Content Management System it is operating on.
- Fix errors on the website that prevent it from being updated.
- Protect contact forms, and sign-up forms to prevent abuse by using a CAPTCHA service or similar.
Service Limitations
- Supported Websites: We can only host websites that run on technologies that our web servers support. Due to the large variety of programming languages, database engines, and other web hosting platforms, you must contact us to verify compatibility.
- Shared Hosting: The hosting servers are shared with our other customers, so while you are allocated a set amount of resources, there may be times at peak usage where your resources are congested. We monitor resource usage and allocate additional resources should our servers ever get close to capacity.
- Automatic Updates: Automatic updates are dependant upon you running a supported CMS system. We currently support automatic updates for WordPress, Nextcloud, Laravel, Joomla!, Drupal, Ghost and Discourse. It also requires that any plugins and themes your website uses are licensed and in good standing. Invalid licensing for plugins and themes will prevent the website from updating.
- Support We Provide: While support for the web hosting platform, backups, updates, and similar functionality is included, support for the code your website runs, the design of your website, and management of the content on your website is not included and is considered outside of scope.
- Brute Force and Abuse Protection: Our fortification system bans abusive visitors that are detected by our systems to be attempting brute force attacks or requesting content at a rate that exceeds our safety standards. When this is detected, our web hosting platform may temporarily restrict the source IP from visiting any website we host for up to 24 hours, based on the severity. At your request, we can alter the rate limits from our standards, but the limits we impose are at our sole discretion.
Quantity Ratios
- You may host any number of websites on your plan, provided it fits within the resource limits we assign to you. These limits are;
- 1GB of storage per 2 seats
- 1GB of ram per 5 seats (minimum of 3GB)
- 120GB of bandwidth per 10 seats
For the current binding version of this document, or any question in plain English, contact hello@ccp.com.au or call (08) 9467 2269. Governed by the laws in force in Western Australia. The Australian Consumer Law applies to the extent mandatory.