B.O.S.S. Program
Addendum

This is an Addendum, Bottleneck Online Security System Program, (“BOSS”), to the Memorandum of Understanding (“MOU”/”Agreement”) including a separate subscription between Bottleneck Distant Assistants (“Service Provider”), located at 2348 E. Seminole St., Springfield, MO 65804 and, Client (“Subscriber”).

 

1.DESCRIPTION OF SERVICE

As part of the Setup Fee, the Distant Assistant ("DA") shall be provided with a computer system that meets the following specifications before their start date:

 

PARTS QTY Specs
Monitor 1 22’ — Philips/HP (depending on availability)
Keyboard 1 A4 Tech
Mouse 1 A4 Tech
Webcam 1 GSOUT T16s
RAM (CPU Internal Part) 2 8GB DDR4 (16GB Total)
Processor  (CPU Internal Part) 1 Intel Core i5 or Ryzen 5 (depending on availability)
Disk Drives  (CPU Internal Part) 2 128GB SSD, 500GB HDD
Cords 3 2 Power Cables, 1 VGA Cable
WIFI Dongle 1 TPLink

 

The Systems and Security Administrator shall provide assistance to the Distant Assistant for any requested additional peripherals, upgrades, or application subscriptions. The Subscriber shall bear the cost of any additional parts or services requested. If the Distant Assistant chooses to add or use other peripherals, the expenses shall be borne by the Distant Assistant, subject to approval, checking, and testing by the Systems and Security Administrator prior to implementation.

Upon the start date of Distant Assistant work Service Provider will provide the following security services (collectively, the “Security Services”) which is included in the monthly BOSS subscription:

  • Assigning a Systems and Security Administrator to assist with technology or security-related issues;
  • Providing real-time protection to prevent threats and malware on the computer, online or offline;
  • Conducting weekly and monthly full computer scans;
  • Ensuring protection of the Subscriber's servers and computer from unauthorized access via the DA's network connection;
  • Monitoring the DA's computer daily to prevent potential threats;
  • Automatic updates and scans without user intervention
  • IP Address and Malware Protection
  • Providing multiple levels of assistance, from automated threat response to Level 2 and 3 support from the Systems and Security Administrator and Provider;
  • Sending monthly password change and computer threat sweep reminders;
  • Notifying the DA of the latest security updates and threat prevention techniques through the Provider's Systems and Security Administrator;
  • Providing monthly security reports to the Subscriber;
  • Providing quarterly software updates for the security program; and
  • Offering online security training and certifications for the DAs.
  • OPTIONAL ADD-ON (no additional charge):
    • Productivity Tracker
    • Computer Screenshots (minute-intervals of your choice)
      • Included in the Monthly Reports
    • Timelapse Videos of Work Progress
    • 1-Year Data Retention (Screenshots and Videos)
      • Compilation of images/videos are by request
    • Time Tracker

 

2.SERVICE LOCATION/TRACKING

The Security Services, as described in this Agreement, shall be conducted at the DA's place of business, including but not limited to the DA's home office. The Service Provider will be responsible for monitoring all security tracking.

To facilitate the provision of Security Services, the DA will be provided with a Windows OS desktop computer system and monitored by the BNDA. The computer system will be exclusively used for the DA's Subscriber work projects. The Service Provider will install all required security software and other necessary software and applications on the DA's computer system.

 

3. PAYMENT FOR SERVICES

The Subscriber shall compensate the Service Provider for the provision of Security Services as follows:

  • A non-refundable Setup Fee of $1,200.00; and
  • A Monthly Security Fee of $300.00.

The Monthly Security Fee will be automatically deducted from the Subscriber's payment source on the same day as the subscription was started, with the exception of days falling on or after the 29th of each month, which will be processed on the last day of the month. The Subscriber will be charged two separate amounts, one for their monthly subscription service as agreed to in the MOU, and the other for the monthly Security Services. Payment must be received by the Service Provider before 3 pm CT, one business day prior to the start date.

To create a secure subscription, the Subscriber shall visit sportal.bottleneck.online. The Subscriber may manage and update their account and payment preferences on the same website. If payment is declined or unpaid, the Service Provider will cease work until the subscription and any/all late fees are paid. If the Security Service is interrupted, the Subscriber will be responsible for a $250 reactivation fee.

.

4. COMPUTER DAMAGES

4.1 Transportation

Prior to shipment, the Systems and Security Administrator and Human Resources Manager shall test and check all equipment, peripherals, applications, and operations to ensure that they are functioning properly.

Upon receipt of the computer, the Distant Assistant shall inspect all parts while the delivery personnel is present to ensure that any damages that occurred during transportation are reported to the shipping company and that they are held liable for such damage.

4.2. Assembly Damage

In the event that any damage occurs during the assembly of the computer, the Distant Assistant shall immediately report such damage to the Systems and Security Administrator. Any necessary replacements or repairs shall not be borne by the Subscriber. The Assembly Guideline shall be included in the computer documentation to prevent any damage during the assembly process.

4.3. Damages Occur During Work

The Distant Assistant shall report any incidents, issues, or damages experienced with the computer to the Systems and Security Administrator for assessment and resolution. An Incident Report shall be submitted to the Systems and Security Administrator to detail the incident and its cause. The management shall decide how the expenses for the repair or troubleshooting of the incident shall be shouldered.

4.4. Replacement and Repairs

DAs are prohibited from requesting or seeking services from external sources without prior approval from Service Provider’s Systems and Security Administrator and management. Any replacement of computer parts should be approved by the Systems and Security Administrator and the management. In cases where repairs are necessary, DAs must seek approval from the Systems and Security Administrator before any repairs are conducted.

 

5. TERM/TERMINATION

The Security Service provided shall have a duration of one month and may be terminated at any time with a written notice of two weeks to be sent to [email protected].

If any part of the Security Service is unused, a transaction fee of 2.9% plus .30 of the balance will be deducted from transaction fees. These fees are set by third-party vendors.

Upon termination, the Security Service will be discontinued, and the computer will be remotely wiped clean. A recorded video of the process will be provided to the Subscriber as proof of the procedure. As a courtesy to both parties, Service Provider requires a minimum of two weeks' notice from the Subscriber in case of termination or resignation.

All applications, files, documents, and company-related information on the computer will be wiped out by the Systems and Security Administrator to ensure that no Subscriber information remains. To maintain confidentiality, the wiping-out process will be recorded and given to the Subscriber as proof that no data was saved on the computer provided by Bottleneck.

The Human Resources Manager and Systems and Security Administrator will oversee the return of the equipment to storage. Any billing issues or liabilities, such as balances, salary deductions, or damage liabilities, will be handled by the billing department following the termination of the Service.

 

6. INFORMATION SHARING AND PRIVACY

Policies for Information Sharing and Privacy:

  • Protection of Subscriber data: Service Provider will never store, access, or transmit any Protected Data from Subscribers.
  • Subscriber policies and procedures: Service Provider will adhere to the Information Sharing and Privacy Policies and Procedures of each individual Subscriber.
  • Access to DA computer: Only the DA and authorized personnel will have access to the DA's computer.
  • Confidentiality: All information must be treated as confidential and shared only on a need-to-know basis. The unauthorized sharing of information is strictly prohibited.
  • Data classification: Information should be classified based on its level of sensitivity, and access to each classification level should be restricted to those with a need to know.
  • Data handling: All information must be handled with care and according to established procedures. Any breaches, loss, or theft of information must be reported immediately.
  • Privacy: Privacy must be respected and maintained for all individuals whose information is collected, processed, or stored. Service Provider and Subscribers must comply with applicable privacy laws and regulations.
  • Consent: Explicit consent must be obtained from individuals before collecting, processing, or sharing their personal information.
  • Third-party sharing: Third-party sharing of information must be done only with authorized parties who have signed appropriate confidentiality agreements and have been vetted for security and privacy compliance.
  • Information retention: Information should be retained only as long as necessary for the purpose for which it was collected, and then securely disposed of in accordance with established procedures.

 

7. LIABILITY

Although the security software installed on the DA's computer can protect it from potential intrusion, it is important to note that it may not prevent intrusion through other endpoints, such as other computers or servers. Therefore, the Service Provider will not be held liable for any intrusion or resulting loss of data or financial damages that may occur through other endpoints. Please be aware that our security program is solely designed to monitor, clean, restore, and prevent threats on the DA's computer. In the event of a security breach, the Service Provider will do its best to restore as much data as possible within the limitations of the security program.

 

8. MISCOMPLIANCE WITH RESPONSIBILITIES

Failure to comply or any violation of these policies and procedures by DA, Service Provider, Subscribers, partners, or others may lead to the termination of their relationship and associated privileges. Non-compliance may also result in civil and criminal penalties as determined by the laws and regulations applicable.

 

9. LEGAL ACTIONS

In the event that a DA breaches company policy or the terms of the agreement pertaining to the use of provided computers, the Service Provider reserves the right to pursue legal action to recover any damages or losses resulting from the breach.

In the event of theft, the Service Provider reserves the right to pursue legal action and file a criminal case in accordance with Article 308 of the Revised Penal Code (RPC) of the Philippines. The Service Provider will cooperate with law enforcement agencies to investigate and prosecute the theft and will seek to recover any damages or losses incurred as a result of the theft. The Service Provider will also take appropriate measures to prevent future thefts and ensure the security of its property.