The exclusions and guidelines outlined in this document are based on over 40 years of combined real-world experience supporting business technology environments. Each item reflects a scenario that was not previously defined or widely anticipated at the time it first occurred, rather than the result of a dispute or disagreement.
Much like building codes evolve over time as new materials, techniques, and risks become better understood, these guidelines exist to bring clarity to situations that only become visible through real-world operation. Defining expectations once those scenarios are understood helps reduce risk, prevent confusion, and ensure consistent outcomes for all parties.
As technology, threats, and business requirements evolve, Constant C Technology Group may update this document from time to time to reflect newly identified scenarios or emerging risks. Any updates are intended to improve clarity and transparency and will not retroactively change agreed services.
Any troubleshooting, remediation, stabilization, rollback, or performance-related work required in these situations is not included in managed services and will be billed separately.
In simple terms: if software or operating systems are used outside of what the manufacturer supports, fixing related issues is billable.
Recommendations to upgrade, downgrade, or replace software or operating systems do not obligate Constant C Technology Group to provide continued support until compatibility is confirmed or remediation is completed.
Active Directory (AD)
A Microsoft directory service used to manage users, devices, permissions, and security policies within an organization.
Administrator Rights (Local Administrator)
Permissions that allow a user to install software, modify system settings, or bypass security controls on a device.
Approval
Authorization provided by the Client to proceed with quoted work. Approval may be provided verbally or in writing, including email or ticket confirmation.
Best-Effort Support
Support provided without guaranteed resolution, typically for third-party or non-managed software where Constant C Technology Group does not control the vendor, source code, or update cycle.
Billable Services
Work not included in the managed services agreement and charged separately at applicable hourly or project rates.
Business Hours
8:00 a.m. to 5:00 p.m. Central Standard Time (CST), Monday through Friday, excluding statutory holidays, unless otherwise agreed in writing.
Client
The organization receiving services from Constant C Technology Group under an executed agreement.
Critical Failure
An unexpected failure of hardware, software, or infrastructure that poses an immediate risk of data loss, extended downtime, security exposure, or material business interruption if not addressed promptly.
Device / Supported Device
Any workstation, server, network appliance, or mobile device approved, documented, and actively managed by Constant C Technology Group.
DNS Protection Software
Security software or services that monitor, filter, or block malicious or unauthorized internet traffic by analyzing Domain Name System (DNS) requests.
End of Life (EoL)
A product that is no longer sold, supported, or maintained by the manufacturer, including the absence of security updates or technical support.
End of Support (EoS)
A product that may still function but is no longer receiving manufacturer support, patches, or security updates.
Enhanced Endpoint Protection Software
Security software installed on devices to prevent, detect, and respond to threats such as malware, ransomware, and unauthorized access.
Incident Response
Actions taken to investigate, contain, remediate, and recover from a cybersecurity incident.
Letter of Agency (LoA)
Written authorization permitting Constant C Technology Group to communicate with and act on behalf of the Client when working with third-party vendors.
Managed Detection and Response (MDR)
A cybersecurity service providing continuous monitoring, threat detection, investigation, and response activities.
Managed Environment
Systems, networks, and devices under active management, monitoring, and security oversight by Constant C Technology Group.
Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA)
A security control requiring users to verify their identity using two or more authentication factors.
Project
Any task exceeding routine support, including deployments, migrations, upgrades, or significant configuration changes.
Third-Party Software or Vendor
Any application, service, or provider not owned or directly controlled by Constant C Technology Group.