Product Overview: RFMS Measure Mobile

Cyncly Agreement Document

 

1.   FUNCTIONAL OVERVIEW

1.1   The Product is a flooring estimation software that follows the workflow of the estimating process. The Product can be utilised for commercial projects, residential, multi-family or new home construction.

1.2   The Product can estimate carpet, tile, laminate and hardwood flooring for projects of all sizes.

1.3   The Product is available on IOS, Android and Windows.

2.   MARKET AND GEOGRAPHIC REGION

The Product is for the Flooring market and is sold in the USA, Canada, Australia and New Zealand.

3.   CONTRACT TYPE

Subscription.

4.   ACCESS RIGHTS

4.1   The Product is limited by reference to the following Access Rights (as set out in the Order):

4.1.1   The core features available are:

4.1.1.1   Draw rooms with keyboard or mouse or use predefined room shape

4.1.1.2   Create, print, and export estimates for all flooring materials

4.1.1.3   Save projects online to access them from other devices or workstations

4.1.1.4   Draw rooms of any shape, including holes, arcs, ellipses, s-curves

4.1.1.5   Access a shared product database

4.1.1.6   Import/Export from RFMS, subject to purchase of RFMS Online Services Setup

4.1.1.7   Show walls and clipart in 2D and 3D

4.1.1.8   Draw using Leica DISTO laser measure

4.1.1.9   Use and edit tile patterns

4.1.2   By Authorised User

4.1.2.1   Access rights are granted on a named-user basis.

4.1.2.2   All Authorised Users must be assigned an email address which will serve as their login. Each Authorised User must have a name, password, role, check-out duration, and edition assigned to them.

4.1.2.3   The Product can be accessed on an unlimited number of devices

4.2   Use of the Product is strictly limited to the legal entity which appears on the Order Form.

5.   ARCHITECTURE

The Product is a single-page web application implemented using the MVC design pattern and packaged as a mobile application using PhoneGap.

6.   THIRD-PARTY SOFTWARE

The Supplier uses third-party software in the development and operation of the Product. The specific third-party software use will depend on the Customer’s individual needs and setup requirements. Use of this software is governed by the applicable agreements with each particular provider.

7.   SECURITY MANAGEMENT PLAN PREREQUISITES (FOR USING THE PRODUCT)

The Pre-Requisites for using the Product can be found at: https://support.measureflooring.com/hc/en-us/articles/115009820268-System-Requirements-for-Measure.

8.   IMPLEMENTATION METHODOLOGY

Implementing the Product is a simple process. Once the purchase is complete licenses will be issued and emailed to the registered Authorised User(s). Users are required to download the Product from the Windows Store by searching ‘RFMS’.

The Customer’s Agreement may include training or additional professional services. To secure a training session, use the Supplier’s booking page here: https://outlook.office365.com/owa/calendar/RFMSProfessionalServices@compusoftgroup.com/bookings/.

9.   SUPPORTED VERSION

9.1   All Customers are provided access to the latest version of the product.

9.2   The Supplier consistently updates and upgrades the Product. The Supplier ensures all Customers have the same versions available to maintain consistency and ensure everyone benefits from the latest features and developments.

9.3   The Supplier will provide support to previous versions of its products, however, if a Customer is using an outdated version of the Product and the Supplier is unable to duplicate the issues in the current version of the Product, the Customer will be required to update to the current version of the Product before further support can be provided.

10.   SERVICE DESK

10.1   Support Hours:

10.1.1   Monday–Friday: 7.00–17.00 (CST).

10.1.2   Weekend: Excluded. Public holidays in the US are also excluded.

10.1.3   Channels of communication with the Service Desk:

10.1.3.1   Via Email: rfms-apps@cyncly.com

10.1.3.2   Website: rfmsinc.zendesk.com

10.1.3.3   Contact telephone number: 888-215-8665

10.2   Who may contact the service desk:

10.2.1   The Customer’s staff need to be pre-registered

10.2.2   The Customer’s staff who are pre-registered will be working on the Customer’s service desk or will be in a resolver group associated with the Service Desk. The Service Desk will not deal directly with end users or resellers.

10.3   Information needed when contacting the Service Desk: Before contacting the Service Desk, the Customer’s support specialist must ensure:

10.3.1   The anomaly has been analyzed in order to confirm it is not an issue related to the data created by the Customer, or an issue related to the Customer’s [and/or resellers’ internal systems that are used with the Product (for example the Customer’s login system, the Customer’s appointment booking system, or others as applicable.)

10.3.2   Gather the information and documents that will allow the Supplier to reproduce and diagnose the incident.

10.3.3   The complete path and data entered to reproduce the incident.

10.3.4   The name and version of the operating system, server’s operating system, and SQL management studio version on which the incident can be reproduced (e.g. Windows 8.1, Windows 10, etc.)

10.3.5   The name and version of the web browser used to reproduce the incident, if utilizing payment, authorization links, or RFMS Next.

10.3.6   A description line, which will allow the incident to be recognised easily and understood when presented in a list.

10.3.7   A detailed description of the incident with the step-by-step procedure that reproduces the incident.

10.3.8   The results are normally expected when the software is working properly, as well as the results observed when the incident occurs.

10.3.9   Indicate if the incident occurs on computers in the stores or on the server.

10.3.10   A screenshot or video of when the incident occurs.

10.3.11   The priority of the incident, according to the agreed classification.

10.3.12   Any other information or files that may help to reproduce or diagnose the incident.

10.4   Supplier Incident Categorization:

10.4.1   Critical:

10.4.1.1   Incident management response time during support hours: Within 30 minutes.

10.4.1.2   Supplier’s commitment to troubleshooting:

10.4.1.2.1   Management Escalation: immediate.

10.4.1.2.2   Status update: less than two hours.

10.4.1.2.3   Continuous until the error is solved, alternatively until a temporary workaround solution is in place.

10.4.1.3   An incident that has a temporary workaround will automatically be downgraded to a high priority.

10.4.2   High

10.4.2.1   Incident management response time during support hours: Within 1 hour.

10.4.2.1.1   Supplier’s commitment to troubleshooting Management Escalation: immediate.

10.4.2.1.2   Status update: less than eight hours.

10.4.2.1.3   Investigate the issue and report continuously to the Customer. Proposals for workaround or final solutions.

10.4.3   Medium

10.4.3.1   Incident management response time during support hours: Within one working day.

10.4.3.2   Supplier’s commitment to troubleshooting:

10.4.3.2.1   Management Escalation: within two working days.

10.4.3.2.2   Status update: less than three working days.

10.4.3.2.3   Investigate the issue, real-time testing and check different solutions.

10.4.4   Low

10.4.4.1   Incident management response time during support hours: Within two working days.

10.4.4.2   Supplier’s commitment to troubleshooting:

10.4.4.2.1   Management Escalation: within ten working days.

10.4.4.2.2   Status update: less than five working days.

10.4.4.2.3   Committed to verify the causes of the problem and test the feasibility of the request.

10.5   The different “Severity Levels” are defined as follows:

10.5.1   Critical:

10.5.1.1   Critical is only applicable to live environments.

10.5.2   A true production downtime situation, where a major production area is down.

10.5.3   A major function is unavailable in a likely sequence (crash, data loss, data corruption, system unavailable).

10.5.4   A vulnerability which could result in a catastrophic adverse effect.

10.5.5   An issue which could result in significant financial loss.

10.6   High:

10.6.1   A major function is unavailable in an unlikely sequence.

10.6.2   A minor function is unavailable, and no workaround exists.

10.6.3   A vulnerability which could result in a serious adverse effect.

10.7   Medium:

10.7.1   A minor function is unavailable, but a workaround exists.

10.7.2   A vulnerability which could result in a limited adverse effect.

10.8   Low:

10.8.1   Defect is an inconvenience to users (e.g. cosmetic, spelling, layout).