FAQ

Do you perform support on an as needed basis?

Studies show that proactive maintenance improves equipment longevity, uptime and efficiency, and provides cost savings over time. Since all of our Flat Fee service plans are based on this premise, we do not offer reactive services.

What does your Flat Fee service Include?

Proactive maintenance and monitoring for all covered equipment, operating systems and applications:

  • Patch Management and Service Pack updates
  • Anti-Virus and Anti-Spam management, updates and remediation
  • Manage backups and restores
  • Disk and memory optimization
  • Manage user accounts
  • Manage network and internet connectivity
  • Manage Firewalls, Routers and Switches

Remote Help Desk, Lab/Bench Service and Onsite Service for all covered equipment, operating systems and applications:

  • Servers, PC’s, Laptops, Firewalls, Routers and Switches
  • Microsoft Windows XP Pro Desktop Operating Systems
  • Microsoft Office 2000, 2003 and 2007
  • Microsoft Windows Server 2003 and Small Business Server 2003
  • Microsoft Exchange Server 2003 and 2007
  • Microsoft SQL Server 2000 and 2005
  • And more

Vendor Management Services. We will manage all of your infrastructure vendors, allowing you and your staff to run your business, not your vendors. Anytime there is a problem with a device or line of business application serviced by a vendor we manage for you, it’s one call to us, and we take it from there, and work the problem to resolution with the vendor. We will even schedule any onsite visits required by the vendor, and oversee the successful remediation of the issue at hand.

  • Broadband Vendors
  • Phone Service Vendors
  • Phone Equipment Vendors
  • Copier/Fax/Scanner/Document Imaging Vendors
  • Line of Business Application Vendors
  • Hosted Website/Domain Registration Vendors

So no matter what happens in my environment, I’ll never pay more than one Flat Fee per month?

Examples of items that are not covered under our Flat Fee service plans include the cost of replacement or new hardware, or shipping costs, the cost of software licensing or renewal or upgrade fees, and the cost of any third party vendor or manufacturer support or incident fees. Whenever the potential arises for additional fees outside of our Flat Fee, you will always be notified in advance for approval.

What other services and solutions do you provide?

We can take care of all of your business needs, using technology solutions to reduce your costs, increase your revenues and mitigate your business risks. Some examples of these solutions are:

  • Cost-saving Voice and Data T1 and Integrated T1 Solutions
  • Productivity-enhancing Voice Over IP services and solutions
  • Revenue-generating Web Development solutions that drive clients to your Website
  • Disaster Recovery and Business Continuity Planning to mitigate your risks in the event of Disaster
  • Efficiency-boosting mobility solutions to keep your mobile workforce connected no matter where they are
  • High availability solutions such as co-location Services for your critical systems

How can I get more information and get started with your Services?

Just give us a call at (702) 943-0111 and we’ll be happy to schedule an appointment with you to discuss your particular business needs. In order to make certain that we can help your business, our process begins with a Technology Assessment that includes a Needs Analysis and a Cost Savings Analysis. We will examine the results of the assessment and make recommendations to meet your current and future business needs.

What is Itech Las Vegas Acceptable Use Policy?

This Acceptable Use Policy (“AUP”) is part of your Master Services Agreement with iTech Las Vegas (“Provider”). All capitalized terms in this AUP have the meanings identified in the MSA and Service Attachment, unless they are otherwise defined below.

PROVIDER MAY SUSPEND OR TERMINATE THE SERVICES IN ACCORDANCE WITH THE MSA AND SERVICE ATTACHMENT IF YOU OR ANYONE IN YOUR ORGANIZATION VIOLATES THIS AUP. PROVIDER MAY REVISE THIS AUP AT ANY TIME AND FOR ANY REASON IN ITS SOLE AND UNFETTERED DISCRETION. IN THE EVENT OF ANY SUCH REVISION, PROVIDER MAY, BUT IS NOT REQUIRED TO, PROVIDE YOU NOTICE OF THE CHANGE. YOU ARE SOLELY RESPONSIBLE FOR REMAINING AWARE OF ANY SUCH CHANGES DURING THE TERM OF THE MSA AND SERVICE ATTACHMENT.

1. You shall not use the Services to engage in or promote illegal or abusive behavior, including:

  • a. Accessing, using or monitoring any data, system, network or Internet-accessible account that does not belong to you, either in any way that breaches security or authentication measures or otherwise without express authorization from the owner of that data, system, network or account;
  • b. Interfering with the ability of any other customer of Provider to use or access the Services;
  • c. Using any means, covert or overt, direct or indirect, to collect, transmit or facilitate the collection or transmission of e-mail addresses, screen names, personal identifiers or any other personal information without the consent of the person to whom that information pertains;
  • d. Using any false or misleading metadata or personal identifiers in any electronic message transmitted using the Services;
  • e. Distributing any software without confirming that the user affirmatively consents to its download and installation; or
  • f. Coordinating or participating in any activities that are reasonably likely to result in retaliation against the Services or against Provider, its officers, employees or agents.

2. You shall not, directly or indirectly, publish, transmit or store on any system or network owned or operated by Provider any content – or any links to any content hosted elsewhere – that, in Provider’s sole and unfettered discretion:

  • a. Relates in any manner to child pornography, bestiality, or non-consensual sex acts;
  • b. Incites or threatens violence or contains harassing content or hate speech;
  • c. Is unfair or deceptive under the consumer protection laws of any jurisdiction;
  • d. Is defamatory or violates any person’s privacy;
  • e. Creates a risk to any person’s safety or health or interferes with an investigation by law enforcement;
  • f. Exposes trade secrets or other confidential information of another person or entity;
  • g. Is intended to assist others in defeating copyright protections;
  • h. Infringes another’s copyright, trademark, patent, or other property right;
  • i. Promotes any unlawful activity or is otherwise illegal or solicits conduct that is illegal under any applicable laws; or
  • j. Is otherwise malicious, fraudulent, likely or calculated to result in retaliation against Provider, or intended to harass or threaten any person or entity.

3. You shall not use any hosted Exchange or other messaging services delivered by Provider to send bulk mail.

4. You shall comply with all laws and regulations applicable to bulk or commercial e-mail. Provider may – but is not required to – monitor your compliance with those laws and regulations, and Provider may block the transmission of e-mail that violates those laws and regulations. In addition, you shall not use the Services to transmit or to facilitate the transmission of any communication to any person who has indicated that he or she does not wish to receive that communication.

5. You shall not attempt to test the vulnerability of any system or network owned or operated by Provider. You further shall not attempt to breach any security or authentication measures maintained by Provider on any of its systems or networks.

6. You shall comply with the rules of any other network you access using the Services.

7. Provider may prohibit you from streaming any live events where, in Provider’s sole and unfettered discretion, there is a risk that the event may violate any part of this AUP.

8. You shall not use any shared system provided by Provider in any way that, in Provider’s sole and unfettered discretion, unreasonably interferes with the normal operation of that system, or that consumes a greater than expected share of the resources of that system. Provider may quarantine or delete any data stored on any shared system if that data is infected corrupted and has potential to infect or corrupt any part of the shared system or any other data stored on that system.

9. You must have valid and current information on file with your domain name registrar for any domain hosted on the Provider network.

10. If you register a DNS record or zone on any systems owned or operated by Provider for a domain of which you are not the registrant or administrative contact according to WHOIS records, then upon request from that registrant or administrative contact, Provider may modify, transfer, or delete that record or zone.