SLA considerations

CCTV Handbook 2016 Surveillance, News & Events, Integrated Solutions, Security Services & Risk Management, Editor's Choice

Francois Malan, MD of Camsecure has many years’ experience in installing and maintaining surveillance solutions in South Africa, Africa and the Middle East. He joined iLegal 2016 to deliver a presentation focused specifically on what a maintenance programme consists of and what companies should ensure they include in their SLA (service-level agreement) with their service provider.

Francois Malan, MD of Camsecure.
Francois Malan, MD of Camsecure.

One of the important points Malan made throughout the presentation was the need for a defined maintenance programme, not simply relying on a service provider on a call-out basis. Not only will this help to ensure your system performs optimally at all times, but it will be less costly than making a call every time something goes wrong – or simply ignoring problems until they are large enough and there are sufficient to warrant a call out fee.

He also advised companies to look beyond the legalese that make up most of these contracts, and often result in nobody within the client’s company or the service provider knowing what they are supposed to do. Make sure your operational requirements are clearly stated in the SLA; waffle will result in poor service and endless misunderstandings.

To do this, he suggests first defining the service you require. Do you need someone to clean the cameras once per month? What about checking the cameras’ firmware for updates? What about ensuring the cameras are pointing exactly where they are supposed to point? What about the servers and computers in the control room – who maintains and updates them? These and a host of other issues must be clearly set out in the SLA.

The facilities or security manager (or whoever is responsible) must also ensure that standards of service and the performance of equipment are set and documented in the contract. The company should also set benchmarks relating to performance and maintenance, and measure these year on year. This will ensure that everybody understands the minimum required, and gives the service provider a base to work from. It will also provide the client with a base on which to measure the performance of the service provider, avoiding any misunderstandings or finger pointing when one person expects one thing and gets another.

Along with this, the client must also have the ability to monitor their system to ensure the standards are maintained. This does not have to consist of expensive technical equipment, but, for example, can be something as simple as a benchmark document containing a snapshot of each camera’s correct view. The provider will be tasked with ensuring the camera is not moved or loses its focus at set intervals. Simple spreadsheets and checklists will also make the process easier for all. A set standard for product and repairs must be defined to ensure the correct products are always used and repairs handled in accordance with these standards.

The SLA must also contain procedures for call outs and reporting. Things to include here are response times, how many call outs per month will be required, out of call-out rates, spares that should be held on site or with the service provider, and the process around job cards and logs. And this leads to the question of reporting.

All too often, reports on maintenance and SLAs are done via word of mouth when the service provider meets the relevant manager. The SLA must make allowances for formal reporting processes, weekly or monthly as required, along with documentation regarding every system installed, all work done and changes made.

Malan stressed that the most important facet of your maintenance and service provider relationship is communications. Everyone concerned needs to know who to contact in various situations, what correspondence is required (such as purchase orders, invoices, reports etc.) and the timeframes of appropriate responses.

An SLA consists of much more than the few items listed above, as Malan explained in his presentation, but it’s a job worth doing well. At the end of the day, it doesn’t matter how much you spend on a security or surveillance project if you can’t keep the systems running at an acceptable level, and at a predetermined, acceptable cost.

For more information contact Camsecure, +27 (0)11 781 1341, [email protected], www.camsecure.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.