EX-10.86 4 clgx-2012xex1086.htm EXHIBIT CLGX-2012-EX10.86
CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Exhibit 10.86 - Amendment No. 2 to Master Services Agreement
AMENDMENT NO. 2

TO THE

MASTER SERVICES AGREEMENT
And
SUPPLEMENT A

between

CORELOGIC SOLUTIONS, LLC

AND

DELL MARKETING L.P.


Amendment 2 Effective Date July 19, 2012



This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside either Party without the prior written permission of the other Party.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

AMENDMENT NO. 2
TO THE
MASTER SERVICES AGREEMENT
THIS AMENDMENT NO. 2 (this “Amendment”) is entered into as of October 26, 2012 (the “Amendment Date”) by and between CoreLogic Solutions LLC (“CoreLogic”) and Dell Marketing L.P. (“Supplier”) to be effective as of July 19, 2012 (the “Amendment Effective Date”).
WHEREAS, CoreLogic and Supplier are parties to a MSA and Supplement A, each dated as of July 19, 2012 and Amendment No. 1 to the MSA dated October 23, 2012; and
WHEREAS, CoreLogic and Supplier intend to further amend and restate the Agreement documents set forth below.
NOW THEREFORE, in consideration of the mutual promises and covenants contained in this Amendment, and of other good and valid consideration, the receipt and sufficiency of which is hereby acknowledged, CoreLogic and Supplier hereby agree as follows:
1.
APPLICABILITY OF PROVISIONS OF THE AGREEMENT

This Amendment is subject to, and shall be governed by, all of the provisions of the Agreement, except to the extent such provisions are expressly modified by this Amendment. Capitalized terms used herein shall have the respective meaning ascribed to each by the Agreement except as otherwise expressly set forth in this Amendment.
2.
AMENDMENT TO MSA

A new subsection (k) is added to Section 9.10 (Audit Rights) of the MSA as follows:
(k)
Data Requests and Legal Holds.  Supplier shall cooperate with any document and record discovery requests (whether in connection with pending litigation or other investigations) made by CoreLogic related to CoreLogic Data on Systems supported by Supplier as part of the Services, including without limitation, by promptly carrying out, at CoreLogic's direction: the dissemination of preservation requests; making data available for search; imaging of systems; back up of electronic information; maintenance, retention and production of any such data; assisting CoreLogic and its forensic experts with establishing the chain of custody of data while such data was in Supplier's control; and maintenance of detailed records of its efforts to preserve data, all as reasonably requested by CoreLogic.

3.
NEW AND AMENDED CONTRACT DOCUMENTS

Effective as of 12:00:01 a.m., U.S. Pacific Time on the Amendment Effective Date:
Amended and Restated Contract Documents. The following contract documents are hereby stricken in their entirety and replaced, respectively with those attached to this Amendment:
Supplement A    Data Center Services and Re-platforming Services
To remove the reference to Schedule A-13.3, to add Minnesota to Section 7.3 and to change the Term of the Supplement to January 31, 2020.

Schedule A-1    Supplement Definitions
To define the “terms to be defined” previously listed in Section 4.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS


Schedule A-2.5    Storage Services
To add functions under Section 1.2.3 (Storage Management Execution).

Schedule A-3.1    Service Level Matrix
To change the heading of column L from “Associated Hours of Operation” to “Measurement Window” and to correct the reference of “14 hours” to “14 days” in the Low Volume Eligible Column of the Physical Server Provisioning Midrange SLA.

Schedule A-4.2    Resource Unit Definitions
To remove incorrect reference to “iSeries” in Section 1.7 and to reflect the change from Linux Non Standard OS platform to Linux OS platform in Section 1.8.

Schedule A-4.5.2    Transformation Charges
To add new pricing for Mainframe Configuration Coding and Testing (Incremental Natural to COBOL).

Schedule A-7.1    CoreLogic Facilities
To add six new office locations.

Schedule A-13    Transformation Services        
To revise the service description, including to add Mainframe Configuration Coding and Testing (Incremental Natural to COBOL) Services.

4.
Deletion of Contract Documents.

Effective as of 12:00:01 a.m., U.S. Pacific Time on the Amendment Effective Date:
The following contract documents are hereby stricken in their entirety:
Schedule A-13.3             Natural to COBOL Conversion
5.
MISCELLANEOUS

5.1
Governing Law. This Amendment shall be governed by and construed in accordance with the terms set forth in Section 19.4 of the Agreement.

5.2
Headings. The article and section headings and the table of contents used herein are for reference and convenience only and will not be considered in the interpretation of this Amendment.

5.3
Other Provisions of the Agreement Unchanged. Except as specifically amended by this Amendment, all other provisions of the Agreement shall remain in full force and effect and shall not be altered by this Amendment.

5.4
Signatures. This Amendment may be signed in multiple counterparts, each of which shall be an original but all of which shall constitute one and the same Amendment. Signatures to this Amendment sent by facsimile or by PDF shall be deemed for all purposes to be the same as original signatures.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

IN WITNESS WHEREOF, the Parties have caused this Amendment to be executed by their respective duly authorized representatives as of the Amendment Effective Date.
CORELOGIC SOLUTIONS, LLC

By:                    

Printed Name:                

Title:                    



DELL MARKETING, L.P.

By:                    

Printed Name:                

Title:                    



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS



MASTER SERVICES AGREEMENT
by and between
CORELOGIC SOLUTIONS, LLC
and
dell marketing l.p.
July 19, 2012

SUPPLEMENT A
Data Center Services and Re-Platforming Services
July 19, 2012

Amendment 2
Amended and Restated Effective July 19, 2012

This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside either Party without the prior written permission of the other Party




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

CORELOGIC AND DELL CONFIDENTIAL    Supplement A    Page 2
SUPPLEMENT A TO
MASTER SERVICES AGREEMENT
Data Center Services and Re-Platforming Services
This Supplement A (this “Supplement”) is entered into effective as of July 19, 2012 (the “Supplement Effective Date”) by and between CoreLogic Solutions, LLC, a California limited liability company having a principle place of business in Santa Ana, California (“CoreLogic”), and Dell Marketing L.P., a Texas limited partnership having a principal place of business in Round Rock, Texas (“Supplier”) (collectively, the “Parties” and each, a “Party”).
This Supplement is entered into pursuant to and subject to that certain Master Services Agreement (“Master Services Agreement” or “MSA”) dated as of July 19, 2012, by and between the Parties, the terms of which, except as may be expressly modified or excluded herein, are incorporated herein by reference.
NOW THEREFORE, in consideration of the mutual promises contained herein, and of other good and valid consideration, the receipt and sufficiency of which is hereby acknowledged, the Parties hereby agree as follows:
1.
Introduction

1.1
Precedence of Obligations. The Parties acknowledge that certain obligations may be set forth in both this Schedule and elsewhere in the Agreement, and that in the event of a conflict, such conflict shall be resolved in accordance with Section 21.13 of the MSA.

1.2
References. All references in this Supplement to articles, sections and attachments shall be to this Supplement, unless another reference is provided.

1.3
Associated Supplement Documents.
This Supplement includes each of the following Schedules, all of which are incorporated into this Supplement by this reference:
Schedule A-1    Supplement Definitions
Schedule A-2    Statements of Work
Schedule A-2.1    Cross Functional Services
Schedule A-2.2    Service Management Services
Schedule A-2.3    Service Desk Services
Schedule A-2.4    Server Services
Schedule A-2.5    Storage and Backup Services
Schedule A-2.6    Desktop End User Messaging Services
Schedule A-2.7    Data Center, Mainframe, Production Control, and Monitoring Services
Schedule A-2.8    Media Services
Schedule A-2.9    Network Services
Schedule A-2.10    Reserved
Schedule A-2.11    Reserved
Schedule A-2.12     Disaster Recovery Services
Schedule A-3    Service Level Methodology
Schedule A-3.1    Service Level Matrix
Schedule A-3.2    Reserved
Schedule A-3.3    Critical Deliverables
Schedule A-4    Pricing Methodology
Schedule A-4.1    Baseline Charges
Schedule A-4.2    Resource Unit Definitions
Schedule A-4.3    Baseline Volumes
Schedule A-4.4    ARC / RRC Rates
Schedule A-4.5    Transition Charges and Transformation Charges



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-4.5.1    Transition Charges
Schedule A-4.5.2    Transformation Charges
Schedule A-4.6    Financial Responsibility Matrix
Schedule A-4.7    Rate Card
Schedule A-4.8    Termination Charges
Schedule A-4.9    Invoicing
Schedule A-4.10    Chargeable Projects
Schedule A-4.11    Project Pool
Schedule A-4.12    ***
Schedule A-5    Human Resources Provisions
Schedule A-5.1    Key Supplier Personnel
Schedule A-5.2    Affected Employees
Schedule A-5.3    Severance Formula
Schedule A-5.3.1    Directors for Enhanced Severance Benefits
Schedule A-6    Reserved
Schedule A-7    Facilities
Schedule A-7.1 CoreLogic Facilities
Schedule A-7.2 Supplier Facilities
Schedule A-8    Software and Equipment Inventory
Schedule A-8.1    Equipment Inventory
Schedule A-8.2    Supplier Tools & CoreLogic Tools
Schedule A-9    Approved Subcontractors
Schedule A-10    Transition Services
Schedule A-10.1    Initial Transition Plan
Schedule A-10.2    Reserved
Schedule A-10.3    Additional Transition Services Obligations
Schedule A-10.3.1 CoreLogic Projects as of Supplement Effective Date
Schedule A-11    Customer Satisfaction Surveys
Schedule A-12    Reports
Schedule A-13    Transformation Services
Schedule A-13.1    *** Application Scope Components
Schedule A-13.2    Acceptance Criteria for *** and ***
        
1.4    Definitions.

(a)
Schedule 1 to the MSA is hereby supplemented with the definitions set forth in Schedule A-1 to this Supplement.
(b)
The definitions added by this Supplement to Schedule 1 to the MSA shall apply only with respect to the Services provided under this Supplement.
2.SERVICES.

Schedule 2 to the MSA is hereby supplemented by Schedule A-2 to this Supplement. Supplier shall perform the Services set forth in Schedule A-2 to this Supplement during the Term of this Supplement, and CoreLogic shall perform the tasks, functions and responsibilities of CoreLogic set forth in Schedule A-2 to this Supplement during the Term of this Supplement. The Services that will be performed under this Supplement as *** Services are identified as such in Schedule A-2.
3.
SERVICE LEVELS.
Schedule 3 to the MSA is hereby supplemented by Schedule A-3 to this Supplement. Supplier shall provide the Services so as to meet or exceed the Service Levels identified in Schedule A-3 to this Supplement.
4.
PRICING AND FINANCIAL PROVISIONS.
Schedule 4 to the MSA is hereby supplemented by Schedule A-4 to this Supplement. The Charges for this Supplement are set forth in Schedule A-4 to this Supplement.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

In accordance with Section 12.1(b) of the MSA, Supplier will provide CoreLogic with invoices in the form as specified in Schedule A-4.10 to this Supplement.
5.
HUMAN RESOURCE PROVISIONS.
Schedule 5 to the MSA is hereby supplemented by Schedule A-5 to this Supplement.
In accordance with Section 8.2(b) of the MSA, the Key Supplier Personnel under this Supplement and their minimum retention periods are set forth in Schedule A-5. In accordance with Section 8.5(d) of the MSA, as of the Supplement Effective Date, there are *** the ***. In accordance with Section 8.2(c) of the MSA, as of the Supplement Effective Date, there are ***.
In accordance with Section 8.5(e) of the MSA, Supplier shall conduct *** Supplier Personnel prior to their performance of Services under this Supplement as required by applicable CoreLogic customers in accordance with the flow-down provisions of Section 9.17 of the MSA; provided, that the first *** Supplier Personnel to be *** shall be at no additional charge to CoreLogic.  If, pursuant to the preceding sentence, Supplier is required to *** more than *** Supplier Personnel, Supplier shall do so at CoreLogic's expense with respect to third party expenses only and Supplier shall not assess additional fees or other Charges to administer such fingerprinting (provided that Supplier notifies CoreLogic of such third party expenses, obtains CoreLogic's prior approval of, and uses commercially reasonable efforts to minimize, such third party expenses).
As of the Supplement Effective Date, there is no requirement to conduct *** on Supplier Personnel prior to their performance of Services; provided, however, in accordance with Section 8.5(e) of the MSA, Supplier shall conduct *** on Supplier Personnel prior to their performance of Services under this Supplement as required by applicable CoreLogic customers in accordance with the flow-down provisions of Section 9.17 of the MSA.
6.
GOVERNANCE.
6.1    Supplier Account Manager.
In accordance with Section 8.3 of the MSA, the Supplier Account Manager as of the Supplement Effective Date is ***.
6.2    CoreLogic Relationship Manager.
In accordance with Section 10.1(a) of the MSA, the CoreLogic Relationship Manager as of the Supplement Effective Date is ***.
7.
FACILITIES.
Schedule 7 to the MSA is hereby supplemented by Schedule A-7 to this Supplement.
7.1
CoreLogic Facilities. In accordance with Section 6.2 of the MSA, CoreLogic will provide Supplier with space and office furniture and the other accommodations required under Section 6.2 of the MSA in CoreLogic Facilities described in Schedule A-7.1 to this Supplement for the performance of the Services under this Supplement.

7.2
Supplier Facilities. In accordance with Section 6.1 of the MSA, Supplier may use Supplier Facilities set forth in Schedule A-7.2 to this Supplement for the performance of the Services under this Supplement.

7.3    Jurisdictions Where Services are Received.
In accordance with Section 11.3(d) of the MSA, for purposes of determining each Party's responsibility for Service Taxes under this Supplement, the Parties agree that, as of the Supplement Effective Date, the Services under this Supplement will be received in the following jurisdictions in the United States:
***            




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

If CoreLogic requires receipt of a material portion of the Services by Eligible Recipients in jurisdictions outside of the United States, the Parties will work in good faith to determine whether *** will be in local currency or in United States Dollars.
8.SOFTWARE AND EQUIPMENT INVENTORY.
Software and Equipment that are applicable to this Supplement are set forth in Schedule A-8 to this Supplement. Laptop computers, cell phones and pagers used by Transitioned Employees (collectively, “Personal EUC Devices”) may be retained by such employees after each such employee's Employment Effective Date; provided, that Supplier shall cause the Transitioned Employees to return such Personal EUC Devices to CoreLogic by the end of the Transition Period. CoreLogic shall make reasonably available to Supplier CoreLogic's inventory tracking and management reports during the Transition Period to assist Supplier in tracking and managing such Personal EUC Devices and shall maintain existing insurance and warranty coverage for such items to cover the loss, theft, damage or breakage of such Personal EUC Devices. All other CoreLogic property and materials in the control or possession of the Transitioned Employees, including calling cards, shall have been returned to CoreLogic by the Transitioned Employees on or prior each such employee's Employment Effective Date.
9.
THIRD PARTY CONTRACTS.

9.1
In accordance with Section 11.2(a) of the MSA, as of the Supplement Effective Date, the Administered Expenses applicable to this Supplement are invoices associated with CoreLogic's Third Party Contracts for transport charges for circuits and ***, as further described in Schedule A-2.9.

9.2
In accordance with Section 6.6(a) of the MSA, as of the Supplement Effective Date, there are no Third Party Contracts to be assigned by CoreLogic to Supplier pursuant to this Supplement.

9.3
In accordance with Section 4.5(c) of the MSA, as of the Supplement Effective Date, there are no Managed Third Parties applicable to this Supplement.

10.TRANSITION.

In accordance with Section 4.2(b) of the MSA, Schedule A-10.1 to this Supplement sets forth the initial Transition Plan. Schedule A-10 describes the Transition Services and Transition Milestones applicable to this Supplement. The Deliverable Credits that may be due to CoreLogic are as set forth in Schedule A-4.5.
11.CUSTOMER SATISFACTION SURVEYS.

Supplier shall conduct customer satisfaction surveys in accordance with Schedule A-11 to this Supplement.
12.TRANSFORMATION.

In accordance with Section 4.8 of the MSA, Schedule A-13.1 to this Supplement sets forth the initial Transformation Plan. Schedule A-13.1 describes the Transformation Services applicable to this Supplement. The Transformation Milestones applicable to this Supplement are set forth in Schedule A-13.2. The Deliverable Credits that may be due to CoreLogic and additional payment amounts that may be achieved by Supplier in connection with certain Transformation Services are as set forth in Schedule A-4.5.
13.REPORTS.
In accordance with Section 9.2 of the MSA, Supplier shall provide CoreLogic with the Reports identified in Schedule A-12 to this Supplement.
14.WARRANTY PERIOD FOR DEVELOPED MATERIALS.

In accordance with Section 15.2(c) of the MSA, the Warranty Period with respect to the Tax Transformation Services and U2L Services is as specified in Schedule A-13.2.
15.
SUBCONTRACTORS.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

In accordance with Section 9.11(a) of the MSA, Subcontractors approved by CoreLogic for the provision of Services under this Supplement are set forth in Schedule A-9 to this Supplement.
16.
CORELOGIC AUTHORIZED SIGNATORIES.
The CoreLogic Personnel set forth below are hereby approved by CoreLogic to execute changes in accordance with the Change Management Procedures and Work Orders, in each case in connection with this Supplement.
Name
Title/Role
***
Chief Information Officer
***
SVP, Business Integration and Process Excellence
***
VP, Enterprise Technology Services
***
SVP, Information Technology
***
VP, Data & Analytics

17.
SUPPLEMENT TERM.
The Term of this Supplement shall commence as of 12:00:01 a.m., Pacific Time on the Supplement Effective Date and continue until 11:59:59 p.m., Pacific Time, on January 31, 2020 unless this Supplement is terminated as provided herein or in the MSA, in which case the Term of this Supplement shall end at 11:59:59 p.m., Pacific Time, on the effective date of such termination or the date to which this Supplement is extended. The Commencement Date for all Service Areas is ***.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

SIGNATURE PAGE FOLLOWS
IN WITNESS WHEREOF, the Parties have caused this Supplement to be executed by their respective duly authorized representatives as of the Supplement Effective Date.

CORELOGIC SOLUTIONS, LLC
DELL MARKETING L.P.
By: _________________________________
By:_____________________________________
Title:________________________________
Title:____________________________________
Date:________________________________
Date:____________________________________
MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
and
DELL MARKETING, L.P.
July 19, 2012

SUPPLEMENT A

Amendment 2
Amended and Restated Effective July 19, 2012

SCHEDULE A-1
SUPPLEMENT DEFINITIONS




This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-1
Supplement Definitions

1.
INTRODUCTION

1.1
Agreement. This Schedule A-1 (this “Schedule”) is attached to and incorporated by reference in Supplement A to that certain Master Services Agreement by and between CoreLogic and (“Supplier”) dated July 19, 2012 (the “MSA”).

1.2
References. All references in this Schedule to articles, sections and attachments shall be to this Schedule, unless another reference is provided.

1.3
Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule 1 to the MSA or the other Schedules to the MSA or Supplement A.

2.SUPPLEMENT DEFINITIONS

The following terms, when used in Supplement A, have the meanings specified below:
Active Directory” means Microsoft's Active Directory Software that provides centralized management of corporate identities, credentials, information protection and resources.
Actual Uptime” means the aggregate number of minutes during the Scheduled Uptime that the full material functionality of a particular Configuration Item, System, Equipment or other Service component is available for use by CoreLogic and the Eligible Recipients. Actual Uptime will be calculated by subtracting Downtime from Scheduled Uptime.
Assets” means all elements of Software and hardware that are found in the environment, including CoreLogic Equipment and Software and any Supplier Equipment and Software (excluding Supplier financial and contractual information) used to deliver the Services. “Asset Management” means the set of processes that join up-to-date financial, contractual and inventory information to support life cycle management, reporting, and strategic decision making for the Assets.
Availability” means ability of a Configuration Item (CI) or IT Service to perform its agreed function when required. Availability is determined by reliability, maintainability, serviceability, performance, and security.
Availability Management Plans” means a document that details the Availability management approach, historical Availability of the Services and recommendations for improvements in Availability of the Services.
Business Day” means, as it relates to service level measurements, Monday through Friday from 8:00 AM through 5:30 PM local time, with such local time being the time zone for the applicable CoreLogic Facility from which CoreLogic receives Services from Supplier (each such time zone being a “Local Time Zone”), and excluding holidays recognized by the applicable CoreLogic Facility.
Business Hour” means an hour of local time within the Business Day of the CoreLogic Facility which receives Services from the Supplier.
Call Recording System” means call recording software and hardware designed to (i) record customer calls (ii) play back recorded calls and (iii) archive calls locally or remotely.
Capacity Management” means the processes, procedures, and reporting related to collaborating and collecting inputs related to infrastructure, Services, technology performance, business plans, procedures, processes, components, forecasts, and related information from CoreLogic and Supplier. (See Schedule A-2.2).
Change Advisory Board” or “CAB” means the team, including CoreLogic and Supplier that coordinates Change Management, and that reviews, approves requested changes, assesses the impact of changes, and prioritizes changes.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Change Calendar” means the approved schedule of known Systems changes.
Change Request” means the process and any related forms required to submit changes requested by Authorized Users, where such changes are within the scope of the existing Services as outlined in Section 3.1 of Schedule A-2.2
Change Management” means the processes relating to planning and implementing changes to the Services, Systems and Equipment that are requested, approved by CoreLogic or otherwise permitted in connection with the delivery of Services as outlined in Section 3.1 of Schedule A-2.2.
Clustering” means a set of connected Equipment and Software that are configured in order to support failover and also to perform as a single system or unit.
Configuration Item” or “CI” has the meaning given in Section 3.2.2 of Schedule A-2.2.
Configuration Management Database” has the meaning given in Section 1.1.3 of Schedule A-4.2.
Configuration Management” has the meaning given in Section 3.2.2 of Schedule A-2.2.
CoreLogic Cloud Environment” means a dedicated CoreLogic virtual computing environment that includes dedicated storage, dedicated servers, and other dedicated hardware and networking components.
Demand Forecast” means a report that captures CoreLogic's forecasted demand for Services based on historical trends, business activities and patterns, future needs, and the planning of capacity provisioning to meet such forecasted demand.
Data Leakage Protection” or “DLP” means a solution that includes systems that are designed to detect and prevent potential data breach incidents by monitoring data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage).
Demand Management means the process and procedures related to analyzing and forecasting CoreLogic demand for the Services.
Designated CoreLogic Data Centers” means the CoreLogic data centers listed as “Data Center Supplier Managed” in Schedule A-7.1.
Desktop Software” means the collective operating system, custom, off-the-shelf and other CoreLogic-developed software deployed on End User Devices for use by Authorized Users.     
Disaster Recovery” means the process, policies and procedures related to executing the recovery or continuation of CoreLogic Applications and Systems as well as Supplier Equipment and Systems critical to the Services after an unforeseen business interruption.
Disaster Recovery Plan” means a plan that includes procedures and the resources, actions, tasks and data required to manage the IT environment recovery process in the event of a critical business interruption. The plan is designed to assist in restoring the business process within the stated disaster recovery goals.
Disaster Recovery Services” means the Services described in Schedule A-2.12, including all actions and tasks required to continue the provisioning of the Services in the event of a critical business interruption. The Disaster Recovery Services include support and coordination with the business continuity activities.
Disaster Recovery Test” means the Services described in Schedule A-2.12 that test the processes, policies and procedures related to execution of the Disaster Recovery Plan.
Downtime means the aggregate number of minutes during the Scheduled Uptime that the full material functionality of a particular System, Equipment, or other Service component is not available for use by CoreLogic and the Eligible Recipients or is degraded in a material respect.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Enterprise Security” means preventative defense methods implemented by an enterprise to protect its business data and information for confidentiality, integrity and availability.
Event” means a change of state which has significance for the management of a Configuration Item or the Services. The term Event is also used to mean an Incident, Problem, change, Service Request, alert, or notification created by any Service, Configuration Item or monitoring tool.
Event Management” means the process responsible for managing Events throughout their lifecycle.
File Integrity Monitoring” means an internal control or process that performs the act of validating the integrity of critical System files using a verification method between the current file state and the known, good baseline to determine whether the file or log was changed.
FTE” or “Full Time Equivalent” has the meaning given in Schedule A-4.2.
IMACD” means End User IMACDs - Campus and End User IMACDs - Remote.
Incident” any means an unplanned interruption to a Service or System or a degradation in the quality of a Service or System, including the failure of a Configuration Item that has not yet impacted Services or Systems.
Incident Management” means a process to address Incidents and restore service operations with minimum disruption to business operations.
Incident Ticket” means an entry into Supplier's service management system documenting an Incident that has been reported.
Infrastructure” means the entire collection of Equipment, Systems and Software required for the provision of information technology Services to CoreLogic and the other Eligible Recipients.
Install, Move, Add, Change and Delete” or “IMACD” has the meaning given in Section 1.3.7 and Section 1.3.8 of Schedule A-4.2.
Intrusion Detection and Prevention Systems” means network security systems or appliances that monitor, report and protect network and/or system activities from malicious activity or policy violations.
ITSM Self-Service Portal” means a type of electronic support that allows Authorized Users to access information and perform routine tasks via the portal without assistance.
LAN Devices” means any network attached device for the purpose of local area network computing.
Level 1 Support” means the first level of support that could be assigned to resolve or fulfill lower complexity Incidents or Service Requests in support of the Services.
Level 2 Support means the second level of support that could be assigned to resolve or fulfill more complex or high impacting Incidents or Service Requests in support of the Services that cannot be resolved by Level 1 Support.
Level 3 Support means the third level of support that could be assigned to resolve or fulfill the most complex or high impacting Incidents or Service Requests in support of the Services that cannot be resolved by Level 1 Support and Level 2 Support.
Mainframe” means a large-scale computer used primarily for bulk data and transaction processing.
Maintenance” means preventive and remedial services that repair, maintain or optimize Systems, including software and hardware maintenance and repairs made in response to Incidents.
Measurement Period” has the definition given in Section 1.3 of Schedule A-3.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Messaging” has the definition given in Section 3 of Schedule A-2.6.
Monitoring Levels” means a predefined threshold of performance and availability for monitored Systems.
Natural” means a programming language from Software AG used in mainframe programming.
Network Equipment” means all devices (e.g., switches, routers, load-balancers, firewalls and DNS) that connect computers and allow for electronic communications.
Network Zone” means a logically segregated network within the CoreLogic Network that may be used to isolate network connectivity or access for the purpose of authorized use or performance.
Operational Transition Planning Phase” means the collective set of activities required to plan for the Operational Transition activities as described in Schedule A-10.
Physical Server Provisioning” means building a server and typically includes the following: assigning the data center location, engineering review, racking and stacking, networking, assigning IP, DNS, installing anti-virus software, firewall rules, setup server for IPS/IDS, allocation of SAN, allocation of multi-pathing software, setup of server for Software distribution and asset management, installation of the operating system and associated components, setup server in SIEM if applicable, Equipment configuration for monitoring, backup setup, CMDB setup, job scheduling, installation of agents, participation in a database requirements review, performance of server quality tests, maintenance setup and a “hand off” to CoreLogic.
Private Cloud Environment” means a CoreLogic virtual computing environment that includes dedicated storage, dedicated servers, dedicated other hardware and networking components.
Problem(s)” means an Incident or set of recurring Incidents with an unknown root cause. The cause is not usually known at the time a Problem record is created, and the Problem Management process is used for further investigation and root cause analysis of Problems.
Problem Management means the processes and procedures to manage and resolve the root causes of incidents, to minimize the re-occurrence of such incidents and their subsequent impact to CoreLogic Systems, the Equipment and Services.
Problem Management System” means an application that stores and tracks Problem records.
Production” means an information technology system(s) or discrete part of an information technology system(s), made up of hardware and system software, which are used to run software and processes to fulfill goods and services.
Project Management” has the meaning given in Section 1.6 of Schedule A-2.1.
Project Management Office” means a department or group that defines and maintains the standards of process, generally related to project management, within the organization.
Project Management Methodology” means the formal documentation of a set of processes and procedures to execute projects which achieve specific goals.
Project Plans” means a formal, approved document used to guide both project execution and project control. The primary uses of Project Plans are to document planning assumptions and decisions, facilitate communication among stakeholders, and document approved scope, cost, and schedule baselines.
Release Management” has the meaning given in Section 3.3 of Schedule A-2.2.
Remote Sites” means any of the CoreLogic facilities identified in Schedule A-7.1 designated as “Dispatch.”
Request Management means the collective process and procedures to submit, manage and fulfill Service Requests.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Resolution” or “Resolve” means an action taken to restore Services in connection with an Event or an Incident or to remediate the root cause of a Problem.
Resolver Group” means a team or functional group responsible for the Resolution of Events, Incidents or Problems.
Restoration” or Restore means taking action to return the Services to normal functionality after repair and recovery from an Incident
SAN Fabric” means the hardware that connects workstations and servers to storage devices in a SAN. The SAN fabric enables any-server-to-any-storage device connectivity through the use of fibre channel switching technology.
SAN Fabric Incident” means an Incident created due to unsatisfactory performance and availability of the SAN Fabric.
Scheduled Downtime” means the number of minutes of scheduled Downtime for System, Equipment or other Service components during any Measurement Period required to perform system maintenance (for example, preventive maintenance, system upgrades, etc.), scheduled in accordance with Change Management Procedures.
Scheduled Uptime” means the number of minutes during which a particular System, Equipment or other Service component expected to be available during the Measurement Period minus Scheduled Downtime.
Server” means a device, usually a self-contained computing device, that provides services to other intelligent devices, end-point devices and users. A server is a computer dedicated to running one or more services, to serve the need of users, other computers and end-point devices.
Service Desk” means the central point of contact between service providers (e.g., Supplier) and users (e.g., Authorized Users) on a day-to-day basis. It is also a focal point for reporting and resolving Incidents and for Service Requests. The Service Desk also provides an interface to other service management teams for activities (e.g., change, problem, configuration, release, and continuity management).
Service Improvement” means a process to continually improve the effectiveness and efficiency of IT processes and services.
Service Improvement Plan” means a document that details Service Improvement approach or an approved document used to guide the improvement of operational inefficiencies and ineffectiveness of IT processes and Services.
Service Management Services” has the definition given in Section 1.1.4 of Schedule A-2.2.
Service Portfolio” means the complete set of services that are performed or managed by Supplier or Third Party Contractors and services within CoreLogic that are captured within the Service management tool. The Service Portfolio is used to manage the entire lifecycle of all Services.
Service Request” means any request from an Authorized User that has been entered within Supplier's service management system.
Service Catalog” means a database or structured document/form with information about the Services. The Service Catalogue includes information about deliverables, prices, contact points, ordering and service request process as outlined in Section 4.1 of Schedule A-2.2.
Severity 1 Incident” means an Incident that: (i) causes a “***” or “***” or “***” to be “***” or “***”, or (ii) is an “***” or “***” that “***”, or “***” performing a “***” and for which no workaround solution exists.
Severity 2 Incident” means an Incident that: (i) causes the “***” or “***” or “***” of “***” of a “***” or “***” or “***”, or (ii) is an “***” or “***” that “***”, or “***” performing “***” and for which a workaround solution may exist which allows for continued essential operations.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Severity 3 Incident” represents a lower impact problem that involves a “***” or “***” of “***”, or some other problem involving “***”. CoreLogic can continue “***” operations and a workaround solution may exist which allows for continued “***” operations.
Service Level Management” means the processes and procedures relating to the development, maintenance, monitoring, review and reporting of the performance of the Services using data, metrics, service quality and key performance indicators (KPI) against defined Service Levels.
Security Information Event Management” or “SIEM” means SIM and SEM.
Security Information Management” or “SIM” means a technology that provides for log management, which is the collection, reporting, storage and analysis of log data.
Security Event Management” or “SEM” means the processing of event data from security devices, network devices, systems and Applications in real time to provide security monitoring, event correlation and incident response.
Software License Management” means the administration of license planning, acquisition, allocation, deployment, tracking and operation and the maintenance of compliance with terms and conditions in software license agreements.
Source Assessment Transformation Approach Report” means a report documenting issues before and during performance of the Transformation Services, including the analysis of issues and remediation activities.
Special Retention Backups” means backups of CoreLogic Data and email mailboxes that have been identified by CoreLogic for unique retention requirements (e.g. litigation holds, human resources investigations).
Standard Server” means the requirements identified in Appendix A of Schedule A-4.2.
Standard Template” means a standard set of pre-defined templates that include standard profile and configuration settings used to provision a new Server.
Storage Area Network” or “SAN” means a network whose primary purpose is to support the storage infrastructure and transfer of data between computer systems and storage elements.
Storage Equipment” means Equipment used for recording and retrieval of data connected to physical and logical storage resources, including storage elements, storage devices, appliances, virtual devices, disk volumes and file resources.
Target Platform” means the technical parameters of the System(s) for which a piece of software is being developed, including CPU, RAM, hard disk, storage, operating system, network, and security configuration.    
Tool” means software, application or hardware used for management or monitoring of the Systems and Equipment.
U2L Services” means the Services and activities described in Section 2.4 of Schedule A-13.
Virtual Server” means a completely isolated guest operating system installation within a normal host operating system. Virtual Servers are implemented with either software emulation or hardware virtualization, though in most cases, both are implemented together.
Virtual Server Provisioning” means the creation of a virtual server and typically includes the following: assigning the data center location, engineering review, networking, assigning IP, DNS, install anti-virus software, firewall rules, setup server for IPS/IDS, allocation of SAN, allocation of multi-pathing software, setup of server for Software distribution and asset management, installation of the operating system and associated components, setup server in SIEM if applicable, Equipment configuration for monitoring, backup setup, CMDB setup, job scheduling, installation of agents, participation in a database requirements review, performance of server quality test, maintenance setup and a “hand off” to CoreLogic.
Voice Response Unit” or “VRU” means the Systems that allow a computer to interact with humans through the use of voice and keypad inputs.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Workstation” means the collective desktops, laptops, phones and associated peripherals (e.g. local printers, storage devices, docking stations, external monitors) connected (e.g. wired, WiFi, Bluetooth) to the Authorized User's physical computing device.
3.
COMMONLY USED ACRONYMS

ACL        access control list
ASB        architecture standards board
AOS        assumption of service
CISO        Chief Information Security Officer
DCTMV    Data Center Transformation Migration and Virtualization
DHCP        dynamic host configuration protocol
DoS        denial of services
FAQs         frequently asked questions
GAL        global address list
IMAC         install, move, add, change
ITIL        Information Technology Infrastructure Library
ITSM        Information Technology Service Management
OEM        original equipment manufacturer
PMBOK        project management book of knowledge
PMO        project management office
PPD        project plan document
PPM        Policy and Procedures Manual
PPW        project planning workshop
QOS        quality of service
RCA        Root Cause Analysis
RDBMS        relational database management system
RPO        recovery point objective
RTM        requirements traceability matrix
RTO        recovery time objective
SIP        session initiation protocol
SOP        standard operating procedures
SSL        secure socket layer
VOIP        voice over internet protocol
VPN        virtual private network


4.
RESERVED.






CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS



MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
and
DELL MARKETING L.P.
July 19, 2012


SUPPLEMENT A
AMENDMENT 2
AS AMENDED AND RESTATED EFFECTIVE JULY 19, 2012

SCHEDULE A-2.5

Storage & Backup Services



This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-2.5
Storage and Backup Services
1.
INTRODUCTION

1.1.1
Agreement. This Schedule A-2.5 (this “Schedule”) is attached to and incorporated by reference in Supplement A to that certain Master Services Agreement by and between CoreLogic and Supplier dated July 19, 2012 (the “MSA”).

1.1.2
References. All references in this Schedule to articles, sections and exhibits shall be to this Schedule, unless another reference is provided.

1.1.3
Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule A-1 to Supplement A, Schedule 1 to the MSA or the other Schedules to the MSA or Supplement A.

1.1.4
Overview. Supplier shall be responsible for performing the storage and backup services, functions and responsibilities in this Schedule (the “Storage and Backup Services”).

1.1.5
Service Availability. Supplier shall provide the Services on a 24x7 basis; unless otherwise agreed by CoreLogic.

1.1.6
Responsibilities.
In the matrices in this Schedule, “P” means “Perform”. The Party identified as “Perform” for an activity is responsible for the successful and appropriate completion of such activity.
In the matrices in this Schedule, “A” means “Approve”. Approve means that the applicable activity performed by the “Perform” Party will be subject to the approval of the “Approve” Party.

1.2
Storage/Backup and Restore Management and Operations.
This Section details the obligations and responsibilities of the Parties regarding storage and backup and Restore management. Except where a responsibility is identified as a “P” responsibility for CoreLogic in the matrices below, Supplier shall be responsible for the following activities:

1.2.1
Storage Management.
This Section details the obligations and responsibilities of the Parties regarding storage management.

1.2.2
Storage Management Requirements.
This Section details the obligations and responsibilities of the Parties regarding the storage management requirements.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
1.2.2.1
Define, update, and communicate storage requirements across platforms and Services.
 
P
1.2.2.2
In accordance with Schedule A-12, provide a monthly summary of pending storage provisioning requests to CoreLogic.

P
 
1.2.2.3
Initiate requests for new storage resources or for increases/decreases of existing storage resources.

P
A
1.2.2.4
On a *** basis and in accordance with Schedule A-12, provide detailed report of storage provisioned, by business unit in support of allocations model.

P
A

1.2.3
Storage Management Execution.
This Section details the obligations and responsibilities of the Parties regarding the execution of the storage management requirements.

No.
Description
Supplier
CoreLogic
1.2.3.1
Develop, maintain and update as appropriate existing detailed SAN design, engineering, SAN testing and integration procedures that meet CoreLogic’s requirements.

P
A
1.2.3.2
Identify and Resolve storage equipment and SAN Fabric Incidents.
P
 
1.2.3.3
Interface with Authorized Users and manage file share access and space requests.
P
 
1.2.3.4
Provide storage space allocations.
P
 
1.2.3.5
Provide, manage and maintain Tape libraries and Tape drives.

P
 
1.2.3.6
Maintain inventory of storage media equipment, volumes allocated and naming assignments within the Designated Data Center environments and Remote Sites set forth in Schedule A-7.

P
 
1.2.3.7
Mount, dismount, initialize and manage storage media as required within the Designated Data Centers and CoreLogic Facilities set forth in Schedule A-7.

P
 
1.2.3.8
Perform storage management functions with respect to the Windows and UNIX attached SAN (e.g., RAID array, SAN, NAS, tape, optical), as well as locally attached storage.

P
 
1.2.3.9
Manage storage data in a manner that shall meet the Availability requirements set forth in Schedule A-3.1.
P
 
1.2.3.10
Manage and optimize storage performance in support of the Services.
P
 
1.2.3.11
Allocate, de-allocate, and re-allocate storage as required or requested by CoreLogic.
P
 
1.2.3.12
Migrate data as required or requested by CoreLogic.
P
 
1.2.3.13
Implement security practices (e.g., logical unit masking) to prevent unauthorized storage access.
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
1.2.3.14
Perform data replication in accordance with Schedule A-12, and data recovery Services in accordance with Section13.2(d) of the MSA and CoreLogic’s requirements.

P
 
1.2.3.15
Update/manage storage recovery procedures and processes across the storage platforms.
P
 
1.2.3.16
Monitor storage systems for reliability and malfunction.
P
 
1.2.3.17
Maintain and improve storage resource efficiency and space requirements.
P
 
1.2.3.18
Provision storage from arrays to host(s) in accordance with CoreLogic requirements.

P
 
1.2.3.19
Through mutual agreement on replication requirements, configure and maintain local and remote SAN-based replication.

P
A
1.2.3.20
   Configure and reconfigure Storage Equipment and Software as required or requested by CoreLogic, including any required third party support.

P
 
1.2.3.21
In accordance with Schedule A-12, perform *** true-up reporting reconciling all storage deployed in the previous quarter from the CoreLogic *** capacity-on-demand pool for all *** storage hardware used to provide storage Services.

P
 
1.2.3.22
Load and maintain removable media Equipment (including peripheral Equipment, such as Tape drives) with appropriate media for operating runs.
 
P
 
1.2.3.23
Coordinate transport and delivery of media to and from the applicable third party offsite secure storage Supplier (e.g., Iron Mountain) to CoreLogic-designated locations as required to perform the Services and required by CoreLogic and store removable media returned by such third party supplier.
 
P
 
1.2.3.24
Manage the distribution of all Tapes.
P
 
1.2.3.25
Maintain a media inventory catalog of all files and Tapes (or alternative media) used to store CoreLogic Data.

P
 
1.2.3.26
Retain backups in accordance with the retention period for Contract Records set forth in Section 9.10(a) of the MSA for auditing purposes and change backup retention periods and create and maintain new backup jobs as required by CoreLogic in connection with CoreLogic’s legal requirements (e.g. litigation holds, Human Resource investigations, special retention backups).

P
 
1.2.3.27
Coordinate management of media.
P
 
1.2.3.28
Develop and document manual media (e.g., Tapes) processing procedures that meet CoreLogic’s requirements and data retention policies and include the following: (i) procedures governing cycling/rotation/disposal of media; and (ii) media management and media retention periods (including for auditing purposes).

P
 
1.2.3.29
Perform a *** audit of offsite stored media against the offsite inventory catalog.
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
1.2.3.30
Promptly change backup retention periods and create and maintain new backup jobs as required by CoreLogic (e.g., litigation holds, internal and government investigations)
P
 
1.2.3.31
Promptly isolate, configure, manage and maintain email mailboxes for CoreLogic Personnel that have been identified by CoreLogic for unique and temporary retention requirements (e.g., litigation holds, internal and government investigations) (“Targeted Retention Mailboxes”), which may include: (i) retention of deleted email; (ii) targeted backup retention periods; (iii) support of CoreLogic's e-discovery requests; and (iv) making available to CoreLogic and its designated third parties access to such mailboxes or mailbox files in the format required by CoreLogic (“CoreLogic Special Retention Services”).  Supplier shall discontinue the CoreLogic Special Retention Services upon request by CoreLogic and reconfigure the Targeted Retention Mailboxes to their normal operating functions and configurations
P
 

1.2.4
Storage Performance Monitoring.
This Section details the obligations and responsibilities of the Parties regarding monitoring storage performance.

No.
Description
Supplier
CoreLogic
1.2.4.1
Resolve exceptions and alerts related to Enterprise Storage and the Storage Equipment.
P
 
1.2.4.2
Analyze storage capacity on a *** basis and propose to CoreLogic changes to the Enterprise Storage (e.g., elimination of unused Enterprise Storage and appropriate allocations of Enterprise Storage, recommended additional capacity of Enterprise Storage).
 
P
 
1.2.4.3
Develop and implement data migration, archival, backup, catalogue maintenance, and retention management procedures.
P
A
1.2.4.4
Perform storage performance analysis in response to Incidents, Service Requests, and as needed to provide the Services.

P
 
1.2.4.5
Configure and maintain existing Storage Management Software for storage reporting, monitoring and management.

P
 
1.2.5
Backup and Restore Management.
This Section details the obligations and responsibilities of the Parties regarding backup and R estore management.

No.
Description
Supplier
CoreLogic
1.2.5.1
Perform data backups and monitor for the successful completion of backups and create Incidents for failed backups. Install and configure backup Equipment, schedule backups, and through Request Management procedures, execute on-demand backups.

P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
1.2.5.2
Perform and monitor the successful completion of backup procedures and create Incidents for unsuccessful backups. Install and configure backup equipment, schedule backup processes, and through Request Management Procedures, execute on-demand backup.
P
 
1.2.5.3
Perform and monitor for the successful completion of recovery procedures, including online, partial, or other recovery procedures and create Incidents for unsuccessful recoveries.

P
 
1.2.5.4
Resolve exceptions and alerts related to the Enterprise Storage and Storage Equipment.
P
 
1.2.5.5
Subject to the capabilities of the replication method selected, provide a recovery procedure for restoring a data image to a previous level within the applicable timeframes.

P
 
1.2.5.6
On a *** basis, provide recommendations to CoreLogic regarding backup and recovery considerations, such as improved levels of protection, efficiencies and cost reductions.
P
A
1.2.5.7
Implement CoreLogic-approved recommendations on backup and recovery considerations.

P
A
1.2.5.8
Backup CoreLogic Data and information in accordance with CoreLogic backup, archive and retention schedules and other requirements, as provided by CoreLogic, including regular backups on all Systems.

P
 
1.2.5.9
Maintain and manage backup schedule and backup windows per environment to minimize the impact on the CoreLogic environments.
P
 
1.2.5.10
Resolve backup failure Incidents in accordance with applicable Incident Management requirements.
P
 
1.2.5.11
Through agreed upon Restore criteria and requirements, perform random sample test Restores from backups for validity checks and troubleshoot and remediate any issues relating from such test.

P
 
1.2.5.12
Restore backup data image to the appropriate target Server, including multiple data sets restores, as required to perform the Services or to fulfill CoreLogic requests.

P
 
1.2.5.13
Create scripts for customized backups as required to meet backup windows.
P
 
1.2.5.14
Implement procedures for retrieving backed-up and archived storage media (onsite or offsite) as requested by CoreLogic or as required to support the Services.

P
 
1.2.5.15
Configure and schedule backup and recovery Tools.
P
 
1.2.5.16
Following Incidents related to the Storage Equipment or Software, implement improvements in backup procedures and Tools.

P
 
1.2.5.17
Perform load balancing on backup schedules to optimize performance.
P
 
1.2.5.18
Load and configure backup Software on Systems.
P
 
1.2.5.19
Maintain and manage the scratch Tape queue.

P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
1.2.5.20
Escalate Tape library or Tape drive failures to applicable Third Party Contractors (e.g., Sun).

P
 
1.2.5.21
Perform all activities necessary to connect new Infrastructure components to shared storage and backup Infrastructure.

P
 
1.2.5.22
Implement changes to the backup/recovery system based on generally accepted industry and manufacturer best practices.

P
A
1.2.5.23
Dispose of storage media (e.g. Tapes, disks, etc.) at CoreLogic Facilities in accordance with Section 6.5(e)(ii) of the MSA and CoreLogic security and compliance policies.
 
P
A
1.2.5.24
Implement procedures for recycling media regularly, managing media replacement and recopying media to provide data integrity and quality.

P
 
1.2.5.25
In accordance with CoreLogic encryption requirements and Schedule 12 to the MSA, implement necessary capability and procedures for encrypting removable media (for backup purposes).

P
A




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS


MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
and
DELL MARKETING L.P.
July 19, 2012
SUPPLEMENT A
AMENDMENT 2
AS AMENDED AND RESTATED EFFECTIVE JULY 19, 2012

Schedule A-3.1
Service Level MATRIX
This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1. INTRODUCTION

1.1 Agreement. This Schedule A-3.1 (this “Schedule”) is attached to and incorporated by reference in Supplement A, dated July 19, 2012, to that certain Master Services Agreement by and between CoreLogic and Supplier dated July 19, 2012 (the “MSA”).

1.2 References. All references in this Schedule to articles, sections and attachments shall be to this Schedule, unless another reference is provided.

1.3 Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule 1 to the MSA, Schedule A-1 to Supplement A or elsewhere in the Agreement.

The terms below shall have the following meanings:

"Enterprise Infrastructure Applications" include ***,***/***,***,***,***, ***,***, ***,*** anything defined as enterprise system in ***.

"High Availability" or "HA" means redundancy such that a single operating system or device failure will not degrade the performance of a Service or cause a Service to become unavailable.

"Normal Patch" has the meaning giveb by the applicable product vendor.

"*** Hardware Exception" means Supplier's failure to meet the timing requirements of any single Unit that is subject to the applicable Service Level shall be excused if and to the extent such failure is caused by the failure of a *** to repair or replace ***, other than *** that is included within Supplier’s ***; but only if (i) Supplier uses commercially reasonable efforts to cause such *** to perform within the time frame required for such Unit, (ii) Supplier notifies CoreLogic promptly after such *** failure or delay and (iii) Supplier documents such failure in a Root Cause Analysis after such failure. Any time for which Supplier’s failure to meet the applicable timing requirement is excused by the immediately preceding sentence shall be removed (i.e., excluded) from the calculation of total time to restore such Unit as defined in the Service Level definition. For purposes of the *** Exception, "Unit" means the applicable unit of measurement for the applicable Service Level (e.g., Incident or other applicable unit that is being measured in accordance with the definition and formula for such Service Level).





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.1
Service Management
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
Incident Management
 
 
 
 
 
 
 
 
 
 
 
 
Incident Handling - Severity 1 (Critical): Percent of Severity 1 Incidents that are restored within the target timeframe
Critical Service Level
***% of Incidents are restored within *** hours
Measures the time interval between an Incident record being registered in the service management tool for Severity 1 Incidents to the time normal service operation is restored via implementing a solution to the known error or by employing a workaround
Service Level Achievement = (A/B) * 100%
A = Count of Severity 1 Incidents resolved on time
B = Count of Severity 1 Incidents resolved for the Measurement Period
Restoration Time does not include the following:
* Time that Incident Tickets are in “suspend mode” due to previously unknown third-party software defects.
* Time that Incident Tickets are in “suspend mode” for equipment-related failures at non-Supplier Facilities.
* Time incurred restoring Application data and/or functionality from tape media after Supplier has returned Equipment to service.
* Third Party Hardware Exception
* Adjustments to the Service Levels approved by CoreLogic in its sole discretion pursuant to the last sentence of Section 4.4 of the MSA in order to permit the performance of new or additional work activities as contemplated by Section 4.4 of the MSA
OPAS Incident Tickets
24x7
Yes, provided that if any single Incident is not resolved within ***hours, then this *** exception shall not apply
No
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Incident Handling - Severity 2 (High): Percent of Severity 2 Incidents that are restored within the target timeframe
Critical Service Level
***% of Incidents are restored within *** hours
Measures the time interval between an Incident record being registered in the service management tool for Severity 2 Incidents to the time normal service operation is restored via implementing a solution to the known error or by employing a workaround
Service Level Achievement = (A/B) * 100%
A = count of Severity 2 Incidents resolved on time
B = count of Severity 2 Incidents resolved for the Measurement Period
Restoration Time does not include the following:
* Time that Incident Tickets are in “suspend mode” due to previously unknown third-party software defects.
* Time that Incident Tickets are in “suspend mode” for equipment-related failures at non-Supplier Facilities.
* Time incurred restoring Application data and/or functionality from tape media after Supplier has returned Equipment to service.
* Third Party Hardware Exception
* Adjustments to the Service Levels approved by CoreLogic in its sole discretion pursuant to the last sentence of Section 4.4 of the MSA in order to permit the performance of new or additional work activities as contemplated by Section 4.4 of the MSA
OPAS Incident Tickets
24x7
Yes, provided that if any single Incident is not resolved within ***hours, then this *** exception shall not apply
Yes
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Incident Communication - Initial: Percentage of Severity 1 and Severity 2 Incidents that are communicated within the target timeframe
Key Measurement
***% of Incidents are communicated within *** min
Measures the time interval between an Incident record being registered in the service management tool for Severity 1 and Severity 2 Incidents and the time a page/phone and email is sent to CoreLogic via OPAS’s FYI paging functionality. Elapsed number of minutes between the creation of a Severity Level 1 Incident and the time that Dell activates the Major Incident Management process (MIM), including notifying CoreLogic via using the standard High Priority Incident Notification Email template, to resolve such Severity Level 1 Incident, as reflected in the corresponding Incident Ticket.
Service Level Achievement = (A/B) * 100%
A = count of all Severity 1 & Severity 2 Incidents communicated within timeframe
B = count of Severity 1 and Severity 2 Incidents for the Measurement Period
* Does not include actual timestamp of receipt or any communication outside the automated Dell OPAS solution.
OPAS Incident Tickets
24x7
Yes, provided that if any single Incident is not resolved within ***minutes, then this *** exception shall not apply.
No
***
Percentage of notifications (including automated alerts) that are accurately ***, *** and *** into the appropriate ***
Key Measurement
***% of Severity 1 and 2 Incident notifications are accurately***, *** and *** into ***
Measures the percentage of incidents that are submitted to the ticketing system and have initial accurate categorization and assignment. For greatest accuracy, an Incident record should be created to track each inaccuracy. This would be measured using OPAS Incidents and reporting exceptions.
Service Level Achievement = (A/B) * 100%
A = count of total Severity 1 and 2 Incidents - count of Severity 1 and 2 inaccurate Incidents
B = total count of Severity 1 and 2 Incidents for the Measurement Period
* Any trusted or custom event source incidents (those submitted from outside the current Supplier tools or teams) will be agreed upon before being included in this calculation.
OPAS Incident Tickets
24x7
Yes
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Incident Communication - Continual: Percentage of Incidents where updates are sent within the target
Key Measurement
97% of Severity 1 updates sent every *** min
Measures the percentage of Incidents where communication to applicable stakeholders is performed within the appropriate timeframes for Severity 1 Incidents. Measurement of this will be through an agreed-upon process and timestamp within the OPAS system or transmission mechanism.
Service Level Achievement = (A/B) * 100%
A = count of total Severity 1 Incidents - count of Severity 1 Incidents with missed communication targets
B = total count of Severity 1 Incidents for the Measurement Period
* This does not include any communication outside the Supplier Service Management process.
OPAS Incident Tickets
24x7
Yes, provided that if any single updateis not resolved within ***(***) minutes, then this *** exception shall not apply.
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS


Problem Management
 
 
 
 
 
 
 
 
 
 
 
 
Percentage of times a service impact document that covers the items listed below is completed for Severity 1 and Severity 2 Incidents and a Problem Review Meeting is completed within the target timeframe.
* Incident details through restoration
* Business impact
* RCA - if known
* Long term - fix if known
Key Measurement
***% of service impact documents are created within*** for Severity*** Incidents
Within *** day, an initial Problem record is created (service impact document), and within *** business days, a draft Root Cause Analysis (RCA) is created. Measures the percentage of times a service impact document that covers the items listed below is completed for Severity 1 Incidents and a Problem Review Meeting is completed within the target timeframe.

* Incident details through restoration
* Business impact
* RCA - if known
* Long term - fix if known

Problem review meeting will be held and draft RCA will be ready within 48 hours. Actual closure of the RCA and Problem record is dependent on change activities needed.
Service Level Achievement = (A/B) * 100%
A =count of service impact documents created on time
B = total count of service impact documents required for the measurement period
* Excludes Problem records where CoreLogic critical/key stakeholder participation was not included within the target timeframe.
OPAS Problem Records
Business Hours
No
Yes
***
Asset Management
 
 
 
 
 
 
 
 
 
 
 
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Asset inventory accuracy percentage
Key Measurement
***%
Measures the accuracy of 10% of CIs and associated attributes (as defined in the Policy and Procedures Manual) stored in the Supplier Asset Management Database
Service Level Achievement = (A/B) * 100%
A = count of accurate reported CIs and associated attributes within sample set
B = total count of sample set CIs and associated attributes within the asset database for the Measurement Period
• Any assets within the sample set that are unavailable or inaccessible to Supplier tools and/or Supplier Personnel will be excluded from this calculation.
OPAS Asset Management and KACE
Business Hours
No
No
***
CSAT SLA
 
 
 
 
 
 
 
 
 
 
 
***
CoreLogic Operation Managers customer satisfaction
Key Measurement
>=***
Measures Supplier’s performance through a jointly created quarterly survey to ‘CoreLogic Operational Managers’ (Measured on a 1 - 5 scale). Expected survey set of 15-20 individuals. Average of all of the numeric scores selected by an Operational Managers in such survey (on a scale of 1 to 5, with 5 representing the highest level of satisfaction
Service Level Achievement = (A/B) * 100%
A = Sum of score responses from Operational Managers
B = Number of responses received
* Minimum acceptable returned surveys:: ***% of surveys returned
OPAS
NA
No
No
***
End User customer satisfaction
Key Measurement
>=***
Measures Supplier’s performance through a survey sent to 30% of ‘End Users’ (Measured on a 1 - 5 scale). Average of all of the numeric scores selected by an Authorized User in such survey (on a scale of 1 to 5, with 5 representing the highest level of satisfaction
Service Level Achievement = (A/B) * 100%
A = Sum of score responses from Authorized Users
B = Number of responses received
* Minimum acceptable sample: ***% of surveys distributed
OPAS
NA
No
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

End User customer satisfaction drop
Key Measurement
***
Number of months in a year (measured annually) when end user CSAT dropped below the prior month. Auto surveys based on services requested across all towers/functions. Compiled and summarized monthly.
Count of number of months with Auhtorized User satisfaction below prior month
NA
NA
* Measured at the anniversary of Service Commencement Date
* Drops in Authorized User satisfaction due to exceptional business events or due to CoreLogic directed
OPAS
NA
No
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.2
Employee Service Desk
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Average Speed to Answer (ASA) - Percentage of help desk calls that are responded to within a target timeframe
Critical Service Level
***% of calls answered <=*** seconds
Average Speed to Answer (ASA) is the average across all calls to the Service Desk for the time taken from when a call is deemed to have entered the “wait queue” (once the caller has made their final selection from the IVR (interactive voice response) menu) to the time a Service Desk agent answers the call for the purposes of providing Services
Service Level Achievement = A / B
A = the aggregate elapsed time in the Measurement Period within which telephone calls placed to the Service Desk by Authorized Users are answered
B = the total number of telephone calls to Service Desk in the applicable Measurement Period that are answered
Excludes abandoned calls.
Automatic Call Distribution (ACD)
24x7
No
Yes
***%
 
Average Handle Time (AHT) - Percentage of help desk calls that are handled to within the target timeframe
Key Measurement
KPI
Average Handle Time (AHT) is the average across all calls to the Service Desk for a Measurement Period of the time taken on the phone by the Service Desk agent for each call. Need to immediately make this a KPI on Day 1
Service Level Achievement = A / B
A = total time in seconds of all calls answered by a Service Desk agent during the Measurement Period
B = number of answered calls
None
Automatic Call Distribution (ACD)
24x7
No
Yes, but capped at ***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Abandon Rate - Maximum percentage of help desk calls that are abandoned
Key Measurement
<=***%
Call Abandon Rate measured as a percentage by adding the total number of calls to the Service Desk that hang up after selecting an option on the Voice Response Unit and before the call is answered by a live person and dividing this by the total number of calls to the Service Desk during the Measurement Period
Service Level Achievement = (A/B) * 100%
A = The number of abandoned calls queued to an agent
B = total calls answered + number of abandoned calls queued
None
Automatic Call Distribution (ACD)
24x7
No
Yes
***
 
First Call Resolution - Percentage of help desk calls that are resolved on the first call in less than *** minutes.
Critical Service Level
>=***%
First Call Resolution is the measurement of how many calls are resolved by the Service Desk upon first contact by the Authorized User.
Service Level Achievement = (A/B) * 100%
A = Total Incidents where Authorized User’s Incident is resolved on 1st contact at the Service Desk
B = Total Incident Tickets received by the Service Desk via phone contact
* Incidents received by the Service Desk by means other than telephone (for example, e‑mail, fax, self service portal) will be excluded when calculating attainment for this Service Level; Calls for which a ticket has already been opened for the same Incident. Incidents that cannot be resolved by the Service Desk, as defined in a list to be developed by Dell during Transition Period and updated from time to time, in each case approved by CoreLogic.
OPAS Incident Tickets
24x7
No
Yes
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.3

End User Device Support and Engineering
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
End User Devices (Desktops, Laptops, Printers, Phones and Wireless Devices) Note: Includes call center agents
 
 
 
 
 
 
 
 
 
 
 
 
 
End User Device Setup (new user) - Percentage of new user setups that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within *** days
Measures the percentage of New Authorized User setup requests that are completed within the required timeframes during the Measurement Period
Service Level Achievement = (A/B) * 100%
A = Number of On-Time End User Device Setup Service Requests
B = Total number of End User Device Setup Service Requests for the Measurement Period
* Batch new user setups will be excluded from the On-Time Completion percentage calculation.
* Time before arrival of assets will be excluded from this measurement (i.e., ticket is submitted after arrival of all necessary assets.)
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) days, then this *** exception shall not apply
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
End User Device Services Support - Percentage of end user device service support Incidents that are successfully completed within the target timeframe
Key Measurement
***% of Incidents completed within *** at staffed sites and within *** *** for non-staffed sites
Measures the time interval between an Incident record being registered in the service management tool for Desktop Services related Incidents to the time that operation is restored
Service Level Achievement = (A/B) * 100%
A = count of Desktop Services related Incidents resolved on time
B = count of Desktop Services related Incidents for the Measurement Period
Restoration Time does not include the following:
* Time that Incident Tickets are in "suspend mode" due to previously unknown third-party Software defects
* Time that Incident Tickets are in "suspend mode" for equipment-related failures at non-Dell facilities.
* Time incurred restoring Application data and/or functionality from tape media after Dell has returned Equipment to service.
* Third Party Hardware Exception
* Adjustments to the Service Levels approved by CoreLogic in its sole discretion pursuant to the last sentence of Section 4.4 of the MSA in order to permit the performance of new or additional work activities as contemplated by Section 4.4 of the MSA
OPAS Incident Tickets
Business Hours
Yes, provided that if any single Incident is not resolved within *** (***) days at staffed sites and more than *** (***) days for non-staffed sites, then this *** exception shall not apply
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
End User Device Termination - Percentage of employee end user device termination requests that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within *** days
Measures the degree of compliance of request for End User Device termination within the time period specified. The time period used is the elapsed time from activation of a task to closure of the Service Management Workflow System record.
Service Level Achievement = (A/B) * 100%
A = Number of On-Time End User Device Termination Service Requests
B = Total number of End User Device Termination Service Requests for the Measurement Period
* This excludes any recovery of employee physical assets (for assets not in CoreLogic offices)
OPAS Service Requests
Business Hours
Yes, if single Incident resulting in default is restored in less than *** days
Yes
***
 
Packaging (Develop and Push) - Percentage of packaging requests that are successfully completed within the target timeframe
Key Measurement
***% of work requests are completed within *** days
Measures the time taken to package software from the receipt of a request for new software to the time that the software is available for the Authorized User to install via the software distribution system
Service Level Achievement = (A/B) * 100%
A = Number of packaging Service Requests completed within the required timeframe
B = Total number of packaging Service Requests for the Measurement Period
* Any time greater than *** business days for CoreLogic to perform applicable testing of the software package
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) days, then this *** exception shall not apply
No
***
 
End User Device Moves/Adds/Changes - Percentage of move requests that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within *** days at staffed sites and *** days at non-staffed sites
Measures the percentage of Moves/Adds/Changes (MACs) Service Requests completed within the required timeframes during the Measurement Period
Service Level Achievement = (A/B) * 100%
A = Number of MAC Service Requests completed within the required timeframes
B = Total number of MAC Service Requests received during the Measurement Period
* Batch (*** IMACDs in a day per CoreLogic Facility) Moves/Adds/Changes will be excluded from the on-Time Completion percentage calculation.
OPAS Service Requests
Business Hours
Yes, provided that if any single Incident is not resolved within *** (***) days at staffed sites and more than*** (***) days for non-staffed sites, then this *** exception shall not apply
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4

Enterprise Services, Exchange & Email
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Enterprise Services
 
 
 
 
 
 
 
 
 
 
 
 
 
Patch management: Servers - Percentage of servers that are successfully patched within the target timeframe (from release of patch)
Key Measurement
***% of normal patches applied in *** and critical patches applied in *** hours
Apply Patches to all instances of enterprise infrastructure applications including acquiring, testing, and installing multiple patches (Service Pack) Patch management tasks include: maintaining current knowledge of available patches, deciding what patches are appropriate, ensuring that patches are installed properly, testing systems after installation, and documenting all associated procedures, such as specific configurations required
Service Level Achievement = (A/B) * 100%
A = Total number of Enterprise Patches that are successfully installed in accordance with the Patch Management Policy
B = Total number of Enterprise Patches that are scheduled to be completed during the Measurement Period
* Post implementation of service pack, if Microsoft through their website releases a bug notification related to that specific Service Pack & that has caused unsuccessful implementation of patch.
* Time between Dell’s request for CoreLogic’s approval and when CoreLogic provides its approval
OPAS Change Records

Measurement Method will be manual and a combination of timestamp release by Microsoft and change management records. Clock starts at release of patch; clock stops when patch is successfully applied.
24x7
No
No
***
 
Percentage Availability of Right Fax Service
Key Measurement
***%
Service availability for Right Fax (including SQL server database) server to send and receive faxes.
Service Level Achievement = (A/B) * 100%
A=Total number of hours of Right Fax Availability excluding Scheduled Downtime from maintenance
B=Total number of hours in a month
* Single point of failure of hardware, Software, or carrier services
OPAS Incident Tickets

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Exchange
 
 
 
 
 
 
 
 
 
 
 
***
 
Percentage Availability of Exchange E‑mail Service (including domain authentication and OWA)
Critical Service Level
***%
Service Availability is defined as the ability of an Authorized User on an Exchange account to (a) access and retrieve information from an individual mailbox, and (b) send and receive messages via his or her mailbox using the Services (Outlook MAPI, OWA, IMAP or POP3).
Service Level Achievement = (A/B) * 100%
A=Total number of hours of Exchange availability excluding Scheduled Downtime from maintenance
B=Total number of hours in a month
* Individual mailbox or mobile device Availability, individual incoming and outgoing mail delivery time.
* Single point of failure (excluding RAID0 mail stores) of hardware, Software, or carrier services
OPAS Incident Tickets

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***%
 
Percentage Availability of Citrix Metaframe Service (Can encompass multiple farms)
Critical Service Level
***%
Service Availability is defined by availability of core Citrix services like IMA service, Print spooler, XML service and published applications.
Service Level Achievement = (A/B) * 100%
A=Total number of hours of Citrix Availability excluding Scheduled Downtime from maintenance
B=Total number of hours in a month
* Individual Citrix clients, individual Citrix Desktop Availability
* For published applications, where the application is the root cause of the unavailability.
OPAS Incident Tickets

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.5

Network
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Data Network
 
 
 
 
 
 
 
 
 
 
 
 
 
Percentage Availability of Connectivity required for business operations - LAN (Data Center locations)
Critical Service Level
***%
Availability within data center, common communication between computing and associated devices. Redundant equipment is required. The service is determined to be available if either side of the redundancy is up and operational.
Service Level Achievement = (A/B) * 100%
A=Total number of seconds of LAN Availability excluding Scheduled Downtime from maintenance
B=Total number of seconds in a month excluding Scheduled Downtime from maintenance
* Third Party Hardware Exception
OPAS Incident Tickets

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Percentage Availability of Connectivity required for business operations - WAN (Data Center locations)
Critical Service Level
***%
Availability for inter-data center connection, internet, intranet, extranet, devices and circuits. Reachability; measurement of the total number of hours of Availability through VLANS and firewalls to internet service provider circuits, intranet and extranet circuit service providers, communication between data centers. Redundant equipment is required. The service is determined to be available if either side of the redundancy is up and operational.
Service Level Achievement = (A/B) * 100%
A=Total number of seconds of WAN Availability excluding Scheduled Downtime from maintenance
B=Total number of seconds in a month excluding Scheduled Downtime from maintenance
*Third Party Hardware Exception
OPAS Incident Tickets

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Percentage availability of LAN (Campus Sites)
Key Measurement
***%
Availability within campus buildings, common communication between computing and associated devices. Assume redundant equipment exists at some level. The service is determined to be available if either side of the redundancy is up and operational.
Service Level Achievement = (A/B) * 100%
A=Total number of seconds of LAN Availability excluding Scheduled Downtime from maintenance
B=Total number of seconds in a month excluding Scheduled Downtime from maintenance
* Third Party Hardware Exception
OPAS Incident Tickets

Will be measured using an incident RCA based measurement approach
24x7
No
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
IT Security - Percent of Firewall requests, I.P. Address Add, Change or Open HTTP Port requests that are successfully completed within Target timeframe
Key Measurement
***% of requests completed within***; ***% completed within ***
Measures the time taken between processing of approved request (s)
Service Level Achievement = (A/B) * 100%
A=Number of successfully completed requests
B= Total number of requests in the measurement period
* Any hold in approval processes or change request initiated by CoreLogic
* Supplier’s failure to meet this Service Level in respect of any hardware-related Incidents shall be excused to the extent that such failure is caused by any Supplier third party provider’s failure to perform, or delay in performing, any repair or replacement actions required to be performed by such third party provider in connection with the resolution of any such Incident; provided, that (i) Supplier uses commercially reasonable efforts to cause such third party providers to perform within the required time frame and (ii) to the extent documented in Supplier’s Root Cause Analysis.”
OPAS Service Requests
24x7
No
No
***
 
Voice Network
 
 
 
 
 
 
 
 
 
 
 
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Percentage Availability of Voice Service (includes VOIP)
Critical Service Level
***%
Voice Availability consists of time voice communication between users was available. Includes contact center and end user. Redundant equipment and circuits are required.
Service Level Achievement = (A/B) * 100%
A=Total number of seconds of VOIP Availability excluding Scheduled Downtime from maintenance
B=Total number of seconds in a month excluding Scheduled Downtime from maintenance
* Connection unavailability from provider of the network pipe;
*Third Party Hardware Exception
* Excludes Avaya, Nortel and other non‑enterprise VOIP systems
Cisco operations manager or equivalent

Will be measured using an Incident RCA based measurement approach.
24x7
No
No
***%
 
 New contact center workflow service request.
Key Measurement
***%***complete with in ***
Measures the time taken between processing of approved request(s)
Service Level Achievement = (A/B) * 100%
A=Number of successfully completed requests
B= Total number of requests in the Measurement Period
* Any hold in approval processes or change request initiated by CoreLogic Note: change requests should be after initial submission
* Excludes batch submissions and limited to <=4 or more call flow requests at one time.
OPAS Service Requests
24x7
Yes, provided that if any single request is not resolved within***days, then this *** exception shall not apply
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.6

Midrange
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Overall Server Availability
 
 
 
 
 
 
 
 
 
 
 
 
 
Server Availability - High
Critical Service Level
***%
Measures the Availability of an individual cluster or System that are classified as High
Service Level Achievement = (A/B) * 100%
Sum total of individual cluster Actual Uptime or System Actual Uptime classified as High
Sum total Scheduled Uptime for individual cluster or system classified as High during the Measurement Period
* Lack of availability caused by CoreLogic or Third Party Contractor as documented in Supplier’s Root Cause Analysis
* Third Party Hardware Exception
* If any node of the cluster is not available and cluster it self is available then cluster is considered available.
* Any server classified as High which does not meet the minimal configuration requirements as defined in Resource Unit Definition Schedule A 4.2 at any time during the Measurement Period will be excluded
* Unavailability caused by a CoreLogic employee, as documented in the Root Cause Analysis
OPAS Incident Tickets
24x7
No
No
***%
 
Server Availability - Standard
Critical Service Level
***%
Measures the Availability of an individual cluster or System that are classified as Standard
Service Level Achievement = (A/B) * 100%
Sum total of individual cluster Actual Uptime or System Actual Uptime classified as Standard
Sum total Scheduled Uptime for individual cluster or system classified as Standard during the Measurement Period
* Lack of availability caused by CoreLogic or Third Party Contractors as documented in Supplier’s Root Cause Analysis
* Third Party Hardware Exception
OPAS Incident Tickets
24x7
No
No
***%



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Server Availability - Low
Key Measurement
***%
Measures the Availability of servers that are classified as Low Availability with no single Low server having downtime > 10 hours. Any single server with downtime >10 hours will result in service level default for “Low” servers.

Note: Availability for servers under the control of application development staff will be excluded from the measurement and will be treated as a KPI with a target measurement of 95%
Service Level Achievement = (A/B) * 100% or with single Low server having downtime > 10 hours
Sum total Actual Uptime for all systems designated as Low Availability
Sum total Scheduled Uptime for all Systems designated as Low Availability during the Measurement Period
*if the RCA for “Low” category server is not available due to configuration changes by CoreLogic application development team that server will be excluded from the measurement.
*Third Party Hardware Exception
OPAS Incident Tickets
24x7
No
Yes, provided that not more than ***% of the servers have an aggregate availability less than***%
***
 
Physical Server
 
 
 
 
 
 
 
 
 
 
 
***
 
Physical Server Provisioning - Percentage of physical server installation requests that are successfully completed within the target timeframe (includes server configuration, backup and other workload automation)
Key Measurement
***% of requests completed within ***
Measures the percentage of Physical Service Provisioning Service Requests that are fulfilled by Supplier within the required timeframe. This Service Level applies to standard configuration x86 servers
Service Level Achievement = (A/B) * 100%
Total number of Physical Service Provisioning Service Requests completed within defined timeframe
Total number of Physical Service Provisioning Service Requests that are scheduled to be completed during the Measurement Period
* Greater than 10 in single request is batch and will be excluded from the on-Time Completion percentage calculation.
* Time before arrival of assets will be excluded from this measurement (i.e. ticket is submitted after arrival of all necessary assets.)
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) hours, then this *** exception shall not applys
Yes
***
 
Virtual Server
 
 
 
 
 
 
 
 
 
 
 
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Add server(s) into Cloud Environment: Less than Ten (10) VM’s - Percentage of server provisioning requests that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within ***
Measures the percentage of Virtual Service Provisioning Requests (less than ten {10}) that are fulfilled by Supplier within the required timeframe
Service Level Achievement = (A/B) * 100%
Total number of Virtual Service Provisioning Service Requests that are less than ten {10} VMs during the Measurement Period for which the Completion Time is met
Total number of Virtual Service Provisioning Service Requests that are less than ten {10} VM’s that are scheduled to be completed during the Measurement Period
* Any requests for 10 or more VMs will be an exception
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) days, then this *** exception shall not apply
Yes
***
 
Patch management: Servers - Percentage of servers that are successfully patched within the target timeframe (from release of patch)

Note: This is for non-Enterprise Servers (employee systems)
Key Measurement
***% of normal patches applied *** and critical patches applied in ***
Patch Management of Non-Enterprise Servers” means a patch scheduled to be deployed by Dell for Server Operating Systems in accordance with the Patch Management Policy. This will be a quarterly Service Level.
Service Level Achievement = (A/B) * 100%
Total number of Non-Enterprise Patches that are successfully installed in accordance with the Patch Management Policy for Server Equipment and Software
Total number of Non-Enterprise Patches that are scheduled to be completed during the Measurement Period
* Excludes time between Dell’s request for CoreLogic’s approval and when CoreLogic provides its approval.
OPAS Change Records and associated Server logs.
Business Hours
No
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.7

Storage
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Storage
 
 
 
 
 
 
 
 
 
 
 
 
 
Percentage Availability of Storage
Crticial Service Level
0.999

Measures the average percentage of time that Storage Frames are Available for use during Scheduled Uptime in the applicable Measurement Period
Service Level Achievement = (A/B) * 100%
Sum total of Uptime for all storage Systems
Sum total of Scheduled Uptime for all storage systems during the Measurement Period
Availability excludes the following:
* Incidents caused by CoreLogic or Third Party Contractors as documented in Supplier’s Root Cause Analysis
* Third Party Hardware Expense
OPAS Incident Tickets
24x7
No
Yes
***%
 
Tier 1, 2, 3 Storage Provisioning <5% of allocated - Percentage of requests that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within *** day
Measures the percentage of Tier 1, 2, and 3 storage configuration service requests, less than 5% of all allocated storage, that are performed within the required timeframe during the Measurement Period
Service Level Achievement = (A/B) * 100%
Number of On-Time Tier 1, 2, and 3 Storage Provisioning Service Requests that are <5% of allocated
Number of On-Time Tier 1, 2, and 3 Storage Provisioning Service Requests that are <5% of allocated Requests
* Any Storage provisioning requests which exceed (in sum) more than 5% of allocated storage during the designated Measurement Period will be excluded.
* Locally attached storage
* Third Party Hardware Exception
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) days, then this *** exception shall not apply
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Tier 1, 2, 3 Storage Provisioning >5% of allocated - Percentage of requests that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within ***s
Measures the percentage of Tier 1, 2, and 3 storage configuration service requests, greater than 5% of all allocated storage, that are performed within the required timeframe during the Measurement Period
Service Level Achievement = (A/B) * 100%
Number of On-Time Tier 1, 2, and 3 Storage Provisioning Service Requests that are >5% of allocated
Number of On-Time Tier 1, 2, and 3 Storage Provisioning Service Requests that are >5% of allocated Requests
* Locally attached storage.
OPAS Service Requests
Business Hours
No
Yes
***
 
Backup
 
 
 
 
 
 
 
 
 
 
 
***
 
Add backup service - Percentage of requests to add servers to backup that are successfully completed within the target timeframe
Key Measurement
***% of requests completed within *** days
Measures the percentage of new backup Service Requests that are performed within the required timeframe during the Measurement Period
Service Level Achievement = (A/B) * 100%
Number of backup Service Requests completed within the required timeframe
Total number of backup Service Requests for the Measurement Period
* Add backup service requests - If the number of Add backup service requests is greater than 10 per business day, this will be considered a batch submission and executed as a project.
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within ***(***)***days, then this *** exception shall not applys
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Emergency Restore Requests - Percentage of restoration requests for business critical restore of file(s), folder(s), sub directory which is currently offsite completed within the target timeframe
Key Measurement
***% of requests initiated within*** day
Measures the percentage of emergency restore Service Requests that are (initiated via the physical restore) within the required timeframe during the Measurement Period
Service Level Achievement = (A/B) * 100%
Number of emergency physical restore Service Requests initiated within the required timeframe
Total number of emergency physical restore Service Requests for the Measurement Period
* Emergency restore requests - If the number of emergency restore requests is greater than 10 per business day, this will be considered a batch submission and executed as a project.
OPAS Service Requests
24x7
No
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Business critical, backup job failure - Percentage of backup job failures that are successfully addressed within the target timeframe
Key Measurement
***% of failures are successfully completed within*** days
Measures the percentage of backup job failures that are successfully completed within the required timeframe during the Measurement Period
Service Level Achievement = (A/B) * 100%
Number of backup job failures Incident Tickets that are resolved within the required timeframe
Total number of backup job failures incident tickets for the Measurement Period
Restoration Time does not include the following:
* Time that Incident Tickets are in “suspend mode” due to previously unknown third party software defects.
* Time that Incident Tickets are in “suspend mode” for equipment related failures at non‑Dell facilities.
* Third Party Hardware Exception
*
 Adjustments to the Service Levels approved by CoreLogic in its sole discretion pursuant to the last sentence of Section 4.4 of the MSA in order to permit the performance of new or additional work activities as contemplated by Section 4.4 of the MSA
OPAS Incident Tickets
24x7
Yes, provided that if any single failure successfully completed is not resolved within *** (***) days, then this *** exception shall not apply
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
CoreLogic requested restore of up to 1.0% of the backup media per/ semiannual or per compliance policy - Percentage of restores successfully completed within the target timeframe
Key Measurement
***% of restores are successfully completed without fault and within *** days.
Measures the percentage of random restores that are successfully completed during designated Change Window
Service Level Achievement = (A/B) * 100%
Number of random restores change tickets completed within the required timeframe
Total number of random restores change tickets executed
 
OPAS Change Tickets
Reported semi-annually
Yes, provided that if any single restore is not resolved within *** (***) days, then this *** exception shall not apply
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.8

Mainframe
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
zO/S and Communications Components: Percentage of the agreed upon hours the System is on the wire and Available
Critical Service Level
***%
Measures the Availability of the mainframe environment, including zO/S and associated Communication Components
Service Level Achievement = (A/B) * 100%
Total Uptime for all mainframe systems
Total Scheduled Uptime for all mainframe systems during the Measurement Period
Availability excludes the following:
* Non-production environments
*Third Party Hardware Exception
OPAS Incident Tickets
24x7
No
No
***%
 
CICS Production Availability
Critical Service Level
***%
Measures the Availability of the CICS environment
Service Level Achievement = (A/B) * 100%
Total Uptime for all CICS systems
Total Scheduled Uptime for all CICS systems during the Measurement Period
Availability excludes the following:
* Non-production environments
* Third Party Hardware Exception
OPAS Incident Tickets
24x7
No
No
***%
 
Percentage availability of ADABAS
Key Measurement
***%
Measures the Availability of the production ADABAS environment
Service Level Achievement = (A/B) * 100%
Total Uptime for production ADABAS system
Total Scheduled Uptime for production ADABAS systems during the Measurement Period
Availability excludes the following:
* Non-production environments
* Third Party Hardware Exception
OPAS Incident Tickets
24x7
No
Yes
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.9

EAPM
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
EAPM – Percent of monitoring setup (server based) completed in the following timeframe:
Key Measurement
***% of requests completed in the target timeframe:

*** or fewer servers – ***hrs.
*** to *** servers – *** hrs.
*** or more servers – *** hrs.
Measures the amount of time between receipt of a monitoring setup request and the completion of the monitoring setup activity
Service Level Achievement = (A/B) * 100%
A = total number of monitoring setup request tickets where the closure time is greater than the target
B = total number of monitoring setup requests in the Measurement Period
None
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) times, then this *** exception shall not apply
No
***
 
EAPM – Percent of Synthetic Transaction monitoring setup completed in the following timeframe:
Key Measurement
***% of transactions (web page calls) completed in the target timeframe:

***or fewer transactions - *** business hours
*** to *** transactions - *** business hours
*** to *** transactions - ***business hours
Measures the amount of time between receipt of a monitoring setup request and the completion of the monitoring setup activity
Service Level Achievement = (A/B) * 100%
A = total number of monitoring setup request tickets where the closure time is greater than the target
B = total number of monitoring setup requests in the Measurement Period
None
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within ***(***)***times, then this *** exception shall not apply
No
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.10
Central Account Provisioning
 
 
Service Level
Category
Service Level Metric
Definition
Formula
Formula Variable A
Formula Variable B
Exceptions
Measurement Method
Measurement Window
*** Eligible
Continuous Improvement Eligible
Weighting
 
Percent of new user account setup requests completed within the target timeframe
Key Measurement
***% of requests completed within *** days
Measures the time taken between processing of approved request to setup the account(s)
Service Level Achievement = (A/B) * 100%
A=Number of successfully completed requests
B= Total number of requests in the Measurement Period
Any hold in approval processes or Change Request initiated by CoreLogic
OPAS Service Requests
Business Hours
Yes, provided that if any single request is not resolved within *** (***) days, then this *** exception shall not apply
No
***
 
Percent of user terminations that are completed within the target timeframe
Critical Service Level
***% within *** hours and 100% within ***hours
Measures the time taken between processing of approved request to terminate the account(s)
Service Level Achievement = (A/B) * 100%
A=Number of successfully completed requests
B= Total number of requests in the Measurement Period
Any hold in approval processes or Change Request initiated by CoreLogic

Any termination requests over 40 during a given day will not be measured
OPAS Service Requests
24x7
No
No
***%




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
and
DELL MARKETING L.P.
July 19, 2012


SUPPLEMENT A
AMENDMENT 2
AS AMENDED AND RESTATED EFFECTIVE JULY 19, 2012


SCHEDULE A-4.2
Resource Unit Definitions



This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-4.2
Resource Unit Definitions

1.1
Introduction.

1.1.1
Agreement. This Schedule A-4.2 (this “Schedule”) is attached to and incorporated by reference in Supplement A to that certain Master Services Agreement by and between CoreLogic and Supplier dated July 19, 2012 (the “MSA”).

1.1.2
References. All references in this Schedule to articles, sections and exhibits shall be to this Schedule, unless another reference is provided.

1.1.3
Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule A-1 to Supplement A, Schedule 1 to the MSA or the other Schedules to the MSA or Supplement A.

The following terms have the meanings specified below:
Configuration Management Database” or “CMDB” is a database that identifies and tracks relevant information and relationships about Configuration Items (CI) and any changes made to CI in a comprehensive and systematic fashion.

FTE” or “Full Time Equivalent” means the full-time equivalent of a Supplier Personnel performing Services for a minimum of *** Hours per Contract Year effort (whether by one person or more than one person). Each dedicated FTE shall be deemed to be a fraction of an FTE equal to the number of *** Hours worked by such dedicated FTE in a Contract Year divided by ***.

Service Request” means any request from the authorized user to add, remove or change to a service. One request may contain one or more related tasks.

1.1.4
General. This Schedule describes the terms and definitions of billable Resource Units applicable to Supplement A. There are no other billable Resource Units applicable to Supplement A.

1.2
Network Services
This Section details the Resource Units associated with Schedule A-2.9 (Network Services)
1.2.1
Network Switch/Router
Network Switch/Router” means a network switch/router device for which Supplier performs Network Services that is installed and located outside of a Supplier Data Center. For clarity, Supplier owned routers and switches located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the router or switch is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Network Switch/Router as measured using data from the CMDB (excluding Network Switch/Routers that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.

1.2.2
Physical Firewall - Clustered
Physical Firewall - Clustered” means a physical firewall device that is configured in an active/passive or active/active pair with failover mode, for which Supplier performs Network Services that is installed and located outside of a Supplier Data Center. For clarity, Supplier provided Firewalls located within a Supplier Facility are supported in accordance with



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Physical Firewall - Clustered is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Physical Firewall - Clustered as measured using data from the CMDB (excluding Firewalls that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.3
Physical Firewall - Standalone
Physical Firewall - Standalone” means a single standalone physical firewall device for which Supplier performs Network Services that is installed and located outside of a Supplier Data Center. For clarity, Supplier provided Firewalls located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Physical Firewall - Standalone is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Physical Firewall - Standalone as measured using data from the CMDB (excluding Firewalls that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.4
Virtual Firewall - Clustered
Virtual Firewall - Clustered” means a virtual firewall device that is configured in an active/passive or active/activepair with failover mode, for which Supplier performs Network Services that is installed and located outside of a Supplier Data Center. For clarity, Supplier provided Firewalls located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Virtual Firewall - Clustered is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Virtual Firewall - Clustered as measured using data from the CMDB (excluding Firewalls that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.5
Virtual Firewall - Standalone
Virtual Firewall - Standalone” means a single standalone physical firewall device for which Supplier performs Network Services that is installed and located outside of a Supplier Data Center. For clarity, Supplier provided Firewalls located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Virtual Firewall - Standalone is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Virtual Firewall - Standalone as measured using data from the CMDB (excluding Firewalls that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.6
Security Appliances
Security Appliance” means a purpose built Security Appliance including adaptive security appliances, web security appliances, key management appliances, encryption appliances, IPS devices, IDS devices, Security Information and Event Management appliances, and content filters that are in production and located outside of a Supplier Data Center. For clarity, Supplier provided Security Appliances located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Security Appliance is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels
Resource Unit Definition: Each Security Appliance as measured using data from the CMDB (excluding Security Appliances that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.2.7
VOIP Phone
“VOIP Phone” means a VOIP phone device at supported Facilities for which Supplier performs VOIP Services.
Resource Unit Definition: Each VOIP Phone as measured using data from the call management system on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.8
Miscellaneous Network Devices
Miscellaneous Network Device” means a purpose-built network device for which Supplier performs Network Services which is not included in the other network device charges in this Schedule A-4.2. Miscellaneous Network Devices include “***” and “***”. For clarity, Supplier provided Miscellaneous Network Devices located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Miscellaneous Network Device is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Miscellaneous Network Device as measured using data from the CMDB (excluding Miscellaneous Network Devices that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.9
Load Balancer - Clustered
Load Balancer - Clustered” means two purpose-built devices configured in an active/passive or active/active pair with failover mode used to manage and distribute workload across multiple computing resources. For clarity, Supplier provided Load Balancers located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Load Balancer - Clustered is specifically requested by CoreLogic and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Load Balancer - Clustered as measured using data from the CMDB (excluding Load Balancers that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.10
Load Balancer - Standalone
Load Balancer - Standalone” means a purpose-built device used to manage and distribute workload across multiple computing resources. For clarity, Supplier provided Load Balancers located within a Supplier Facility are supported in accordance with Schedule A-2, but are excluded from the measurement of this Resource Unit unless the additional Load Balancer - Standalone is specifically requested by CoreLogic, and is not otherwise required to provide Services in accordance with this Agreement and Service Levels.
Resource Unit Definition: Each Load Balancer - Standalone as measured using data from the CMDB (excluding Load Balancers that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.11
Wireless Access Points
Wireless Access Point” means a Network wireless access point device located at CoreLogic Facilities for which Supplier performs Network wireless Services.
Resource Unit Definition: Each Wireless Access Point as measured using data from CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.2.12
Network IMADS
Network IMAD” means installs, moves, adds or removals (deletes) of Network devices as requested by CoreLogic excluding IMADs resulting from activities performed under Schedule A-13.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Resource Unit Definition: Each Network IMAD as measured using data from the Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.
1.3
End User Desktop Support.
This Section details the Resource Units associated with Schedule A-2.6 (End User Desktop Support and Messaging Services).
1.3.1
EUC (Desktop/Laptop)
EUC Device” means an end user computing device that is a desktop or laptop personal computing device running a single Microsoft or Apple Operating System.
EUC Device Resource Unit represents the Charges for the Services (e.g., EUC Services and Network Services) for all EUC Devices (other than Mobile Devices and Thin Clients).
Resource Unit Definition: Each EUC Device as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.2
Network Printer
Network Printer” means: (A) a printing device that: (i) is connected to the CoreLogic Network via Ethernet, (ii) is located at a CoreLogic Facility, and (iii) to which Authorized Users are able to print using a EUC Device; and (B) is in-service.
Resource Unit Definition: Each Network Printer as measured using data from CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.3
*** Email Account
Email Mailbox” means an authorized account on the CoreLogic email system for which Supplier is required to provide content-filtering, including user mailboxes, group mailboxes, or system mailboxes. *** Email Accounts shall not include any accounts on the CoreLogic email system allocated to Supplier.
Resource Unit Definition: Each Email Mailbox as measured using data from Exchange Messaging System (excluding Email Mailboxes that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.4
Mobile Device
A “Mobile Device” means a personal hand-held device used by an Authorized User that provides the functions of a cellular phone and/or also allows the receipt and creation of email messages. Mobile Devices exclude bar code readers, digital scanners and RFI devices. The Resource Unit includes support of the Enterprise Server for Active Sync.
Resource Unit Definition: Each Mobile Device as measured using data from the Supplier's mobile device management system (excluding Mobile Device that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.5
Desktop Application Packages
Desktop Application Package means any custom compilation of a commercial-off-the-self ("COTS") or custom in-house application, packaged for automated delivery and requested by CoreLogic, by image type as applicable (e.g., *** variations, etc.). Desktop Application Packages include de-install packages required for proper installation to an end user device. The pricing for the Desktop Applications Package Resource Unit categories is on a services-only basis.
Resource Unit Definition: Each Desktop Application Package as measured using data from the Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.6
Desktop Image Management
Desktop Image Management” means a pre-configured, deployable image validated on one (1) or more currently supported desktop hardware platforms in the CoreLogic environment.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

The pricing for the Desktop Image Management Resource Unit categories is on a services-only basis.
Resource Unit Definition: Each Desktop Image Management as measured using data from the Supplier Desktop Management System on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.7
End User IMACDs - Campus
End User IMACD - Campus” means physical installs, moves, adds, changes or deletions for End User Devices as requested by CoreLogic at sites designated as Campus facilities.
Resource Unit Definition: Each End User IMACD - Campus as measured using data from the Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.
1.3.8
End User IMACDs - Remote
End User IMACD - Remote” means physical installs, moves, adds, changes or deletions for End User Devices as requested by CoreLogic at sites not designated as Campus facilities.
Resource Unit Definition: Each End User IMACD - Remote as measured using data from the Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.

1.4
Service Desk.
This Section details the Resource Units associated with Schedule A-2.3 (Service Desk Services).
1.4.1
Service Desk Tickets
Service Desk Ticket” means a ticket created by a Service Desk agent that is initiated by the Authorized User by telephone or Self Service. One (1) such Ticket equals one (1) Resource Unit. Tickets that are routed by the Supplier's service management system to Resolver Groups other than the Service Desk are excluded from this Resource Unit.
Resource Unit Definition: Each Service Desk Ticket as measured using data from the Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.
1.5
Mainframe Services.
This Section details the Resource Units associated with Schedule A-2.7 (, Mainframe, Services).
1.5.1
Mainframe Service
Mainframe Services Unit” means a Mainframe Service that provides installed mainframe processing capabilities of *** Millions of Instructions Per Second (MIPS) and useable Direct Access Storage Drive (DASD) storage of *** terabytes.
Resource Unit Definition: Each Mainframe Services Unit as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.5.2
Mainframe Tape
“ Mainframe Tape” means a physical tape mount associated with the mainframe.
Resource Unit Definition: Each Mainframe Tape as measured using data from the mainframe system management facility records (SMF) during the applicable calendar month shall be equal to one (1) Resource Unit.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.6
Server (Services Only). This Section details the Resource Units associated with Schedule A-2.4 (Server Services). Any Operating System instances that are used to deliver Services already charged by different Resource Units (e.g., *** Email Mailboxes, monitoring, DLP, etc.) as identified in CMDB will be excluded from the device count.

1.6.1
Linux High OS Instance
Linux High OS Instance” means an Operating System instance that operates on a Linux Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Linux High OS Instance” Services described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Linux High OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.2
Linux Standard OS Instance
Linux Standard OS Instance” means an Operating System instance that operates on a Linux Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Linux Standard OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Linux Standard OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.3
Linux Low OS Instance
Linux Low OS Instance” means an Operating System instance that operates on a Linux Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Linux Low OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Linux Low OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.4
Windows High OS Instance
Windows High OS Instance” means an Operating System instance that operates on a Microsoft Windows Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Windows High OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A)
Resource Unit Definition: Each Windows High OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.5
Windows Standard OS Instance
Windows Standard OS Instance” means an Operating System instance that operates on a Microsoft Windows Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Windows Standard OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Windows Standard OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.6.6
Windows Low OS Instance
Windows Low OS Instance” means an Operating System instance that operates on a Microsoft Windows Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “Windows Low OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Windows Low OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.7
UNIX High OS Instance
UNIX High OS Instance” means an Operating System instance that operates on the Solaris or AIX Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “UNIX High OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Unix High OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.8
UNIX Standard OS Instance
UNIX Standard OS Instance” means an Operating System instance that operates on a the Solaris or AIX Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “UNIX Standard OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Unix Standard OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.9
UNIX Low OS Instance
UNIX Low OS Instance” means an Operating System Instance that operates on a the Solaris or AIX Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to (i) receive the “UNIX Low OS Instance” described in Schedule A-2.4 (Server Services); and (ii) have the applicable minimum computing requirements described in Appendix A below.
Resource Unit Definition: Each Unix Low OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.10
ESX/Xen Host
ESX/Xen Host” means device running the ESX or XenServer Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to receive the “ESX /XenServer OS Instance” described in Schedule A-2.4 (Server Services).
Resource Unit Definition: Each ESX /Xen Host Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.6.11
iSeries OS Instance
iSeries OS Instance” means an Operating System instance that operates on a the iSeries (AS 400) Operating System platform on a Server at a CoreLogic Data Center or Supplier Facility that CoreLogic has designated to receive the “iSeries OS Instance” described in Schedule A-2.4 (Server Services).



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.7
Resource Unit Definition: Each OS Instance as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.Supplier Server Hardware

This Section details the Resource Units associated with Schedule A-2.4 (Server Services). All of the *** and *** associated with providing the Server Services are included in the Charges for the Resource Units covered in this Section.
1.7.1
Physical Server Small Server
Physical Server Small” means a physical Server that operates on a Microsoft Windows or Linux Standard OS platform and has a baseline of computing resources up to *** GB MEM and up to *** Cores of CPU and boot drive storage (which is not *** to CoreLogic).
Resource Unit Definition: Each Physical Server Small as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.7.2
Physical Server Medium Server
Physical Server Medium” means a physical Server that operates on a Microsoft Windows or Linux Standard OS platform and has a baseline of computing resources greater than ***- but less than *** GB MEM and up to *** Cores of CPU and boot drive storage (which is not *** to CoreLogic).
Resource Unit Definition: Each Physical Server Medium as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.7.3
Physical Server Large Server
Physical Server Large” means a physical Server that operates on a Microsoft Windows or Linux Standard OS platform and has a baseline of computing resources equal to or greater than ***- but less than ***- GB MEM and up to *** Cores of CPU and boot drive storage (which is not *** to CoreLogic).
Resource Unit Definition: Each Physical Server Large as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.7.4
Physical Server Extra-Large Server
Physical Server Extra-Large” means a physical Server that operates on a Microsoft Windows or Linux Standard OS platform and has a baseline of computing resources equal to or greater than *** GB MEM and up to *** Cores of CPU and boot drive storage (which is not *** to CoreLogic).
Resource Unit Definition: Each Physical Server Extra-Large as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.8
Private Cloud
All of the *** and *** associated with providing private cloud Services are included in the Charges for the Resource Units covered in this Section.

1.8.1
Private Cloud Small Server
Private Cloud Small Server” means a Virtual Server that operates on a Microsoft Windows or Linux OS platform in the Private Cloud Environment that has a baseline of computing resources up to *** GB vMEM and *** - *** Cores of vCPU.
Resource Unit Definition: Each Private Cloud Small Server as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.8.2
Private Cloud Medium Server
Private Cloud Medium Server” means a Virtual Server that operates on a Microsoft Windows or Linux OS platform in the Private Cloud Environment that has a baseline of computing resources between *** and *** GB vMEM and up to *** Cores of vCPU.
Resource Unit Definition: Each Private Cloud Medium Server as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.8.3
Private Cloud Large Server
Private Cloud Large Server” means a Virtual Server that operates on a Microsoft Windows or Linux OS platform in the Private Cloud Environment that has a baseline of computing resources between *** and *** GB vMEM and up to *** Cores of vCPU.
Resource Unit Definition: Each Private Cloud Large Server as measured using data from the CMDB on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.

1.9
Cross Functional.
This Section details the Resource Units associated with Schedule A-2.1 (Cross Functional Services).
1.9.1
Service Management Resolver Licenses
Service Management Resolver License” means a license required for CoreLogic employees and contractors (“Resolvers”) to create, update, and/or close tickets in the Supplier's service management system. For clarity, (i) a resolver license is not required for CoreLogic employees and contractors to open and check status for Incidents and Requests, and (ii) a resolver license for Supplier employees and contractors is excluded.
Resource Unit Definition: Each Service Management Resolver License as measured using data from the Supplier's service management system (excluding Service Management Resolver Licenses that do not meet the definition above) on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.9.2
Electronic Data Exchange (EDE)
Electronic Data Exchange” means the number of dedicated FTEs required to perform file transfer Services as defined in Schedule A-2.8
Resource Unit Definition: Each named FTE supporting file transfer service as set forth in Schedule A-2.8 within the applicable calendar month, shall be equal to one (1) Resource Unit.
1.10
Security Administration Services
This Section details the Resource Units associated with Security Administration Services.
1.10.1
User Security Administration:
A "User Security Administration Request" means an add, delete or change for access or secure authentication to an Application or Systems Software.
Resource Unit Definition: Each User Security Administration Request measured in Supplier's service management system in the applicable calendar month shall be equal to one (1) Resource Unit.
1.10.2
End Point Log Retention and Monitoring Sources
End Point Log Retention and Monitoring Source” means an end point log source captured and monitored by the Supplier's security information event management system. All end points must be directly connected to the CoreLogic network and be approved for consolidated logging by the CoreLogic security team.
Resource Unit Definition: Each End Point Log Retention and Monitoring Source as measured using data from Supplier's security information and event management system on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1.10.3
Firewall Rule Changes
Firewall Rule Change” means a Service Request covering additions, changes or deletions to the Firewall rules, including system or group definitions, Network routing tables, access control lists and authentication configurations.
Resource Unit Definition: Each Firewall Rule Change as measured by Supplier's service management system during the applicable calendar month shall be equal to one (1) Resource Unit.
1.11
Storage and Backup Services.
This Section details the Resource Units associated with Schedule A-2.5 (Storage and Backup Services).
1.11.1
Storage Management (Services Only)
Storage Management (Services Only)” means CoreLogic provided storage for which Supplier performs Services.
Storage Management (Services Only) is measured based on the aggregate amount of usable TBs of CoreLogic storage identified in the Storage Management software that is allocated to a Server.
Resource Unit Definition: Each usable TB of Storage Management (Service Only) allocated to a server measured in the storage management system on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.11.2
Backup Management (Services Only)
Backup Management (Services Only)” means operation, support and management of the CoreLogic provided backup systems by the Supplier as set forth in Schedule A-2.5.
Resource Unit Definition: Each gigabyte of data that is processed by the Backup Management System during applicable calendar month as measured by CoreLogic's Backup Management System shall be equal to one (1) Resource Unit.
1.11.3
Tier 1 Storage (Services and Hardware)
Tier 1 Supplier SAN Storage” means Supplier-owned, configured and CoreLogic-usable SAN Supplier storage (with a drive geometry of ***GB or ***GB @ *** RPM and a redundant array of independent disks (RAID) level of ***) that is allocated to a Server. Tier 1 Supplier SAN Storage is measured based on usable TBs of Tier 1 Supplier SAN Storage identified in the Storage Management Software that is allocated to Servers.
The Tier 1 Storage Resource Unit represents the Charges for all of the Equipment, Software and Services associated with Tier 1 Supplier Storage.
Resource Unit Definition: Each usable TB of Tier 1 Supplier SAN Storage allocated to a Server measured by Supplier's storage management system on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
 
1.11.4
Tier 2 Storage (Services and Hardware)
Tier 2 Supplier SAN Storage” means Supplier-owned, configured and CoreLogic-usable Supplier storage (with a drive geometry of ***GB or ***GB @ *** RPM and a redundant array of independent disks (RAID) level of ***) that is allocated to a Server.
Tier 2 Supplier SAN Storage is measured based on usable TBs of Tier 2 Supplier SAN Storage identified in the Storage Management Software that is allocated to Servers.
The Tier 2 Storage Resource Unit represents the Charges for all of the Equipment, Software and Services associated with Tier 2 Supplier Storage.
Resource Unit Definition: Each usable TB of Tier 2 Supplier SAN Storage measured by Supplier's storage management system allocated to Server on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.11.5
Tier 3 Storage (Services and Hardware)



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Tier 3 Supplier SAN Storage” means Supplier-owned, configured and CoreLogic-usable Supplier storage (with a drive geometry of ***, ***, or *** @ *** RPM and a redundant array of independent disks (RAID) level of ***) that is allocated to a Server. Tier 3 Supplier SAN Storage is measured based on TBs of Tier 3 Supplier Storage identified in the Storage Management software that is allocated to Servers.
The Tier 3 Storage Resource Unit represents the Charges for all of the Equipment, Software and Services associated with Tier 2 Supplier Storage.
Resource Unit Definition: Each TB of Tier 3 Supplier SAN Storage allocated to a Server as measured by Supplier's storage management system on the fifteenth day of the applicable calendar month shall be equal to one (1) Resource Unit.
1.11.6
Backup Management (Services and Hardware)
Backup Management (Services and Hardware)” means a backup of CoreLogic Data to tape media that is performed by Supplier using Supplier-owned Backup Management Systems and that is managed by Supplier on-site at a Supplier Facility or off-site at a Supplier vaulting service provider.
Backup Management (Services and Hardware) Resource Unit represents the Charges for all of the Equipment (e.g., Supplier's management Systems), Software and Services associated with Backup Management (Services and Hardware).
.Resource Unit Definition: Each gigabyte of data that is processed by the Backup Management System during applicable calendar month as measured by Supplier's Backup Management System shall be equal to one (1) Resource Unit.




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

CORELOGIC AND DELL CONFIDENTIAL     Schedule A-4.2    Page 13

Appendix A - Minimum Server Requirements

 
Windows, UNIX Linux OS High
Windows, UNIX Linux OS Standard
Windows, UNIX Linux OS Low
Clustering Required
***
***
***
Software Requirements
***
***
***
***
***
Hardware Requirements
***
***
***
***
***
***
***
LAN
***
***
***
***
***
***
SAN & Storage
***
***
***
***
***
***
Load Balancer (if required by application)
***
***
***
***

***
***

Firewall
***
***
***
***
***
***

IDS/ IPS
***
***
***
***
***
***
***
***
Vendor 24x7, 4 hour response Maintenance and Support Required
***
***
***
***
***
***
Dell Data Center Location / CoreLogic Location / Both
***
***
***
***
***
***





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
MASTER SERVICES AGREEMENT
 
 
 
 
 
between
 
 
 
 
 
CORELOGIC SOLUTIONS, LLC
 
 
 
 
 
 
 
 
and
 
 
 
 
 
DELL MARKETING L.P.
 
 
 
 
 
July 19, 2012
 
 
 
 
 
SUPPLEMENT A
 
 
 
 
 
Amendment 2
 
 
Amended and Restated Effective July 19, 2012
 
 
 
 
 
SCHEDULE A-4.1 - BASELINE CHARGES
 
 
SCHEDULE A-4.3 - BASELINE VOLUMES
 
 
SCHEDULE A-4.4 - ARC/RRC RATES
 
 
SCHEDULE A-4.5.1 - TRANSITION CHARGES
 
 
SCHEDULE A-4.5.2 - TRANSFORMATION CHARGES
 
 
SCHEDULE A-4.7 - RATE CARD
 
 
SCHEDULE A-4.11 - PROJECT POOL
 
 
 
 
 
 
 
This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-4.1 Baseline Charges
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Baseline Charges
2012
2013
2014 **
2015
2016
2017
2018
2019
2020 *
Total
***
 
 
 
 
 
 
 
 
 
***
Account and Service Management
-
***
***
***
***
***
***
***
***
***
DR
-
***
***
***
***
***
***
***
***
***
Chargeable Project Management
-
***
***
***
***
***
***
***
***
***
Telecom Expense Management
-
***
***
***
***
***
***
***
***
***
***
 
 
 
 
 
 
 
 
 
***
Network
-
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
-
***
***
***
***
***
***
***
***
***
Employee Service Desk
-
***
***
***
***
***
***
***
***
***
Mainframe
-
***
***
***
***
***
***
***
***
***
Midrange and Server
-
***
***
***
***
***
***
***
***
***
Storage
-
***
***
***
***
***
***
***
***
***
Backup
-
***
***
***
***
***
***
***
***
***
Cross Functional and Media Center
-
***
***
***
***
***
***
***
***
***
Security
-
***
***
***
***
***
***
***
***
***
 
 
 
 
 
 
 
 
 
 
***
Totals
-
***
***
***
***
***
***
***
***
***
 
*
2020 fees represent charges for January of 2020 only
 
 
 
 
 
 
**
2014 Mainframe fees cover charges for the first six months of the year.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
On the January 2013 invoice, *** will provide a*** to *** in the amount of $***
 
 
 
 
 
 
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-4.3 Baseline Volumes
 
 
 
 
 
 
 
 
 
 
The definitions associated with these Resource Units are set forth in Schedule A-4.2
 
 
 
 
 
 
 
 
Description
Banding
 
 2013 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Description
Banding
 
 2014 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Description
Banding
 
 2015 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Description
Banding
 
 2016 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Description
Banding
 
 2017 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Description
Banding
 
 2019 Monthly Volumes
Network
 
 
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sept
Oct
Nov
Dec
Network Switch /Router
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Appliances
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Wireless Access Points
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Misc. Network Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
VoIP Phones
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network IMADS
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Network Printer
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Exchange Email Account
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mobile Device
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Desktop Application Package
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Desktop Image Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Mainframe Service
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Mainframe Tapes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Physical Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Small
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Medium
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cloud Server Large
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Linux OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Linux OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Low
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS Standard
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Windows OS High
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
i-Series
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
ESX/Xen Host
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Storage Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Tier 1 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 2 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Tier 3 Storage
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Backup Management
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Service Management Resolver Licenses
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
 
 
 
 
 
User Security Administration
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
No Band
 
***
***
***
***
***
***
***
***
***
***
***
***
Description
Banding
 
 2020 Monthly Volumes
Network
 
 
Jan
Network Switch /Router
No Band
 
***
Physical Firewall - Clustered
No Band
 
***
Physical Firewall - Standalone
No Band
 
***
Virtual Firewall - Clustered
No Band
 
***
Virtual Firewall - Standalone
No Band
 
***
Security Appliances
No Band
 
***
Wireless Access Points
No Band
 
***
Load Balancer - Clustered
No Band
 
***
Load Balancer - Standalone
No Band
 
***
Misc. Network Device
No Band
 
***
VoIP Phones
No Band
 
***
Network IMADS
No Band
 
***
End User Device Support and Messaging
 
 
 
EUC (Desktop/Laptop)
No Band
 
***
Desktop IMACS - Campus
No Band
 
***
Desktop IMACS - Remote
No Band
 
***
Network Printer
No Band
 
***
Exchange Email Account
No Band
 
***
Mobile Device
No Band
 
***
Desktop Application Package
No Band
 
***
Desktop Image Management
No Band
 
***
Employee Service Desk
 
 
 
Service Desk Tickets
***
 
***
Mainframe
 
 
 
Mainframe Service
No Band
 
***
Mainframe Tapes
No Band
 
***
Midrange and Server
 
 
 
Hardware
 
 
 
Physical Server Small
No Band
 
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Physical Server Medium
No Band
 
***
Physical Server Large
No Band
 
***
Physical Server Extra Large
No Band
 
***
Cloud Server Small
No Band
 
***
Cloud Server Medium
No Band
 
***
Cloud Server Large
No Band
 
***
Services
 
 
 
Linux OS Low
No Band
 
***
Linux OS Standard
No Band
 
***
Linux OS High
No Band
 
***
Windows OS Low
No Band
 
***
Windows OS Standard
No Band
 
***
Windows OS High
No Band
 
***
UNIX Low OS Instance
No Band
 
***
UNIX Medium OS Instance
No Band
 
***
UNIX High OS Instance
No Band
 
***
i-Series
No Band
 
***
ESX/Xen Host
No Band
 
***
Storage and Backup Services
 
 
 
Services Only
 
 
 
Storage Management
No Band
 
***
Backup Management
No Band
 
***
Services and Hardware
 
 
 
Tier 1 Storage
No Band
 
***
Tier 2 Storage
No Band
 
***
Tier 3 Storage
No Band
 
***
Backup Management
No Band
 
***
Cross Functional Services
 
 
 
Service Management Resolver Licenses
No Band
 
***
Electronic Data Exchange (EDE)
No Band
 
***
Security Administration Services
 
 
 
User Security Administration
No Band
 
***
End Point Log Retention & Monitoring
No Band
 
***
Firewall Rule Changes
No Band
 
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

The definitions associated with these Resource Units are set forth in Schedule A-4.2
ARC/RRC Rates
2012
2013
2014
2015
2016
2017
2018
2019
2020
Network
 
 
 
 
 
 
 
 
 
Network Switch /Router
***
***
***
***
***
***
***
***
***
Physical Firewall - Clustered
***
***
***
***
***
***
***
***
***
Physical Firewall - Standalone
***
***
***
***
***
***
***
***
***
Virtual Firewall - Clustered
***
***
***
***
***
***
***
***
***
Virtual Firewall - Standalone
***
***
***
***
***
***
***
***
***
Security Appliances
***
***
***
***
***
***
***
***
***
Wireless Access Points
***
***
***
***
***
***
***
***
***
Load Balancer - Clustered
***
***
***
***
***
***
***
***
***
Load Balancer - Standalone
***
***
***
***
***
***
***
***
***
Miscellaneous Network Device
***
***
***
***
***
***
***
***
***
VoIP Phones
***
***
***
***
***
***
***
***
***
Network IMACS
***
***
***
***
***
***
***
***
***
End User Device Support and Messaging
 
 
 
 
 
 
 
 
 
EUC (Desktop/Laptop)
***
***
***
***
***
***
***
***
***
Desktop IMACS - Campus
***
***
***
***
***
***
***
***
***
Desktop IMACS - Remote
***
***
***
***
***
***
***
***
***
Network Printer
***
***
***
***
***
***
***
***
***
Exchange Email Account
***
***
***
***
***
***
***
***
***
Mobile Device
***
***
***
***
***
***
***
***
***
Desktop Application Package
***
***
***
***
***
***
***
***
***
Desktop Image Management
***
***
***
***
***
***
***
***
***
Employee Service Desk
 
 
 
 
 
 
 
 
 
Service Desk Tickets
***
***
***
***
***
***
***
***
***
Mainframe
 
 
 
 
 
 
 
 
 
Mainframe Service
***
***
***
***
***
***
***
***
***
Mainframe Tapes
***
***
***
***
***
***
***
***
***
Midrange and Server
 
 
 
 
 
 
 
 
 
Hardware
 
 
 
 
 
 
 
 
 
Physical Server Small
***
***
***
***
***
***
***
***
***
Physical Server Medium
***
***
***
***
***
***
***
***
***
Physical Server Large
***
***
***
***
***
***
***
***
***
Physical Server Extra Large
***
***
***
***
***
***
***
***
***
Cloud Server Small
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Cloud Server Medium
***
***
***
***
***
***
***
***
***
Cloud Server Large
***
***
***
***
***
***
***
***
***
Services
 
 
 
 
 
 
 
 
 
Linux Low OS Instance
***
***
***
***
***
***
***
***
***
Linux Medium OS Instance
***
***
***
***
***
***
***
***
***
Linux High OS Instance
***
***
***
***
***
***
***
***
***
 
***
***
***
***
***
***
***
***
***
Windows Low OS Instance
***
***
***
***
***
***
***
***
***
Windows Medium OS Instance
***
***
***
***
***
***
***
***
***
Windows High OS Instance
***
***
***
***
***
***
***
***
***
 
***
***
***
***
***
***
***
***
***
UNIX Low OS Instance
***
***
***
***
***
***
***
***
***
UNIX Medium OS Instance
***
***
***
***
***
***
***
***
***
UNIX High OS Instance
***
***
***
***
***
***
***
***
***
 
 
 
 
 
 
 
 
 
 
i-Series
***
***
***
***
***
***
***
***
***
ESX/Xen Host
***
***
***
***
***
***
***
***
***
Storage and Backup Services
 
 
 
 
 
 
 
 
 
Services Only
 
 
 
 
 
 
 
 
 
Storage Management
***
***
***
***
***
***
***
***
***
Backup Management
***
***
***
***
***
***
***
***
***
Services and Hardware
 
 
 
 
 
 
 
 
 
Tier 1 Storage
***
***
***
***
***
***
***
***
***
Tier 2 Storage
***
***
***
***
***
***
***
***
***
Tier 3 Storage
***
***
***
***
***
***
***
***
***
Backup Management
***
***
***
***
***
***
***
***
***
Cross Functional Services
 
 
 
 
 
 
 
 
 
Service Management Resolver Licenses
***
***
***
***
***
***
***
***
***
Electronic Data Exchange (EDE)
***
***
***
***
***
***
***
***
***
Security Administration Services
 
 
 
 
 
 
 
 
 
User Security Administration
***
***
***
***
***
***
***
***
***
End Point Log Retention & Monitoring
***
***
***
***
***
***
***
***
***
Firewall Rule Changes
***
***
***
***
***
***
***
***
***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule 4-5.1 Transition Charges
 
 
 
Month
Operational Transition
Stabilization and reboot
DCTMV Planning
DCTMV Migration
Total
Aug-12
$ ***
$ ***
$ -
$ ***
$ ***
Sep-12
$ ***
$ ***
$ ***
$ ***
$ ***
Oct-12
$ ***
$ ***
$ ***
$ ***
$ ***
Nov-12
$ ***
$ ***
$ ***
$ ***
$ ***
Dec-12
$ ***
$ ***
$ ***
$ ***
$ ***
Jan-13
$ ***
 
$ ***
$ ***
$ ***
Feb-13
 
 
 
$ ***
$ ***
Mar-13
 
 
 
$ ***
$ ***
Apr-13
 
 
 
$ ***
$ ***
May-13
 
 
 
$ ***
$ ***
Jun-13
 
 
 
$ ***
$ ***
Jul-13
 
 
 
$ ***
$ ***
Aug-13
 
 
 
$ ***
$ ***
Sep-13
 
 
 
$ ***
$ ***
Oct-13
 
 
 
$ ***
$ ***
Nov-13
 
 
 
$ ***
$ ***
Dec-13
 
 
 
$ ***
$ ***
Jan-14
 
 
 
$ ***
$ ***
Feb-14
 
 
 
$ ***
$ ***
Mar-14
 
 
 
$ ***
$ ***
Apr-14
 
 
 
$ ***
$ ***
May-14
 
 
 
$ ***
$ ***
Jun-14
 
 
 
$ ***
$ ***
Total
$ ***
$ ***
$ ***
$ ***
$ ***




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule 4-5.2 Transformation Charges
Month
Mainframe Planning and Assessment
Mainframe Configuration, Coding and Testing
***
U2L Planning and Assessment
U2L Configuration, Coding and Testing
Total Transformation
Aug-12
$***
$***
 
$***
$***
$***
Sep-12
$***
$***
 
$***
$***
$***
Oct-12
$***
$***
***
$***
$***
$***
Nov-12
$***
$***
***
$***
$***
$***
Dec-12
$***
$***
***
$***
$***
$***
Jan-13
$***
$***
***
$***
$***
$***
Feb-13
$***
$***
***
$***
$***
$***
Mar-13
$***
$***
***
$***
$***
$***
Apr-13
$***
$***
***
$***
$***
$***
May-13
$***
$***
***
$***
$***
$***
Jun-13
$***
$***
***
$***
$***
$***
Jul-13
$***
$***
***
$***
$***
$***
Aug-13
$***
$***
***
$***
$***
$***
Sep-13
$***
$***
***
$***
$***
$***
Oct-13
$***
$***
***
$***
$***
$***
Nov-13
$***
$***
***
$***
$***
$***
Dec-13
$***
$***
***
$***
$***
$***
Jan-14
$***
$***
***
$***
$***
$***
Feb-14
$***
$***
***
$***
$***
$***
Mar-14
$***
$***
***
$***
$***
$***
Apr-14
$***
$***
***
$***
$***
$***
May-14
$***
$***
 
$***
$***
$***
Jun-14
$***
$***
 
$***
$***
$***
Jul-14
$***
$***
 
$***
$***
$***
Aug-14
$***
$***
 
$***
$***
$***
Sep-14
$***
$***
 
$***
$***
$***
Oct-14
$***
$***
 
$***
$***
$***
Nov-14
$***
$***
 
$***
$***
$***
Total
$***
$***
***
$***
$***
$***
 
 
 
 
 
 
 
Optional Pricing Section per Schedule A.13
 
 
 
 
 
 
 
 
 
 
 
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

 
Natural to COBOL Optional Pricing
 
 
 
 
 
 
$***
 
 
 
 
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Resource Type
Resource Location
Role Description
 Years of Experience
 Bill Rate (per FTE/Hr) for a project of LESS than 3 months of duration
 Bill Rate (per FTE/Hr) for a project of GREATER than 3 months of duration
Help Desk Agent
Onsite
Service Desk Support - T1
US 1-5
$ ***
$ ***
Offshore
Service Desk Support - T1
India 1-5
$ ***
$ ***
Unix Midrange Engineer - Senior
Onsite
Systems Engineering - T3
US 8+
$ ***
$ ***
Offshore
Systems Engineering - T3
Malaysia 8+
$ ***
$ ***
Unix Midrange Engineer - Junior
Onsite
Systems Engineering - T1
US 1-3
$ ***
$ ***
Offshore
Systems Engineering - T1
Malaysia 1-3
$ ***
$ ***
Wintel Midrange Engineer - Senior
Onsite
Systems Engineering - T3
US 8+
$ ***
$ ***
Offshore
Systems Engineering - T3
Malaysia 8+
$ ***
$ ***
Wintel Midrange Engineer - Junior
Onsite
Systems Engineering - T1
US 1-3
$ ***
$ ***
Offshore
Systems Engineering - T1
Malaysia 1-3
$ ***
$ ***
SAN/Backup Storage Engineer - Senior
Onsite
Storage Services Open - T3
US 8+
$ ***
$ ***
Offshore
Storage Services Open - T3
India 8+
$ ***
$ ***
SAN/Backup Storage Engineer - Junior
Onsite
Storage Services Open - T1
US 1-3
$ ***
$ ***
Offshore
Storage Services Open - T1
India 1-3
$ ***
$ ***
Messaging Engineer - Senior
Onsite
Messaging Services - T3
US 8+
$ ***
$ ***
Offshore
Messaging Services - T3
Malaysia 8+
$ ***
$ ***
Messaging Engineer - Junior
Onsite
Messaging Services - T1
US 1-3
$ ***
$ ***
Offshore
Messaging Services - T1
Malaysia 1-3
$ ***
$ ***
Network (Data) Engineer - Senior
Onsite
Network Design - T3
US 8+
$ ***
$ ***
Offshore
Network Design - T3
India 8+
$ ***
$ ***
Network (Data) Engineer - Junior
Onsite
Network Design - T1
US 1-3
$ ***
$ ***
Offshore
Network Design - T1
India 1-3
$ ***
$ ***
Network (Voice) Engineer - Senior
Onsite
Network Convergence - T3
US 8+
$ ***
$ ***
Offshore
Network Design - T3
India 8+
$ ***
$ ***
Network (Voice) Engineer - Junior
Onsite
Network Convergence - T1
US 1-3
$ ***
$ ***
Offshore
Network Convergence - T1
India 1-3
$ ***
$ ***
EUC Technician - Senior
Onsite
Client Technical Support - T3
US 8+
$ ***
$ ***
Offshore
Client Technical Support - T3
India 8+
$ ***
$ ***
EUC Technician - Junior
Onsite
Client Technical Support - T1
US 1-3
$ ***
$ ***
Offshore
Client Technical Support - T1
India 1-3
$ ***
$ ***
Project Manager - Senior
Onsite
Project Services - T3
US 5+
$ ***
$ ***
Offshore
Project Services - T3
India 5+
$ ***
$ ***
Nearshore
Project Services - T3
Mexico 5+
$ ***
$ ***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Project Manager - Junior
Onsite
Project Services - T1
US 2-5
$ ***
$ ***
Offshore
Project Services - T1
India 2-5
$ ***
$ ***
Nearshore
Project Services - T1
Mexico 2-5
$ ***
$ ***



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-4.11 Project Pool
 
 
 
 
 
 
 
 
 
 
 
Discretionary Projects
2012
2013
2014
2015
2016
2017
2018
2019
2020
Total
Discretionary Project Pool
 
***
***
***
***
***
***
***
 
***





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
and
DELL MARKETING L.P.
July 19, 2012
***
***


SUPPLEMENT A


Schedule A-7.1
CORELOGIC FACILITIES

This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

1. INTRODUCTION

1.1 Agreement. This Schedule A-7.1 (this “Schedule”) is attached to and incorporated by reference in Supplement A to that certain Master Services Agreement by and between CoreLogic and Supplier dated dated July 19, 2012 (the “MSA”).

1.2 References. All references in this Schedule to articles, sections and attachments shall be to this Schedule, unless another reference is provided.

1.3 Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule 1 to the MSA, Schedule A-1 to Supplement A or elsewhere in the Agreement.

Office
Business Unit
Onsite Support Staff
Data Center CoreLogic Managed / Data Center Supplier Managed / No
Space Required for Transitioned Employees
Other Space To Be Provided
***
***
Dispatch
No
5 cubicles
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Office
Business Unit
Onsite Support Staff
Data Center CoreLogic Managed / Data Center Supplier Managed / No
Space Required for Transitioned Employees
Other Space To Be Provided
***
***
Dispatch
No
5 cubicles
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Office
Business Unit
Onsite Support Staff
Data Center CoreLogic Managed / Data Center Supplier Managed / No
Space Required for Transitioned Employees
Other Space To Be Provided
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Onsite
No
1 office and 7 cubicles
2 cubicles and 5X5 (approximate) sq ft lockable storage closet
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
 
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
2 cubicles
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Onsite
No
-
-



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Office
Business Unit
Onsite Support Staff
Data Center CoreLogic Managed / Data Center Supplier Managed / No
Space Required for Transitioned Employees
Other Space To Be Provided
***
***
Onsite
Data Center Supplier Managed
16 offices and 66 cubicles
1 office space, 8 cubicles, and 20X20 (approximate) sq ft lockable storage space; One 12-person (approximate) conference room
***
***
Onsite
No
-
-
***
***
Onsite
No
-
-
***
***
Onsite
Data Center Supplier Managed
10 offices and 59 cubicles
9 cubicles and 10X10 (approximate) sq ft lockable storage space; One 12-person conference room
***
***
Dispatch
No
1 cubicle
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-
***
***
Dispatch
No
-
-






CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

MASTER SERVICES AGREEMENT
between
CORELOGIC SOLUTIONS, LLC
And
SUPPLIER MARKETING L.P.
July 19, 2012


SUPPLEMENT A
Amendment 2
Amended and Restated Effective July 19, 2012

SCHEDULE A-13
TRANSFORMATION SERVICES


This document contains proprietary and confidential information of CoreLogic and Dell. The information contained in this document may not be disclosed outside your company without the prior written permission of CoreLogic and Dell.





CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Schedule A-13
Transformation Services

1.
INTRODUCTION
1.1
Agreement. This Schedule A-13 (this “Schedule”) is attached to and incorporated by reference in Supplement A to that certain Master Services Agreement by and between CoreLogic and Supplier dated July 19, 2012 (the “MSA”).
1.2
References. All references in this Schedule to articles, sections and exhibits shall be to this Schedule, unless another reference is provided.
1.3
Definitions. Terms used in this Schedule with initial capitalized letters but not defined in this Schedule shall have the respective meanings set forth in Schedule A-1 to Supplement A, Schedule 1 to the MSA or the other Schedules to the MSA or Supplement A.
1.4
Overview. This Schedule sets forth the Transformation Services to be performed by Supplier including services, functions, responsibilities, governance requirements, assumptions and charging methodologies for the transformational activities to be undertaken by Supplier as part of the Services, and the corresponding tasks to be performed by CoreLogic in order for Supplier to perform the Transformation Services.
1.5
Attachments. Attached and incorporated into this Schedule are the following Schedules related to the Transformation Services:
Schedule A-13.1
Application Scope Components for *** Transformation Services
Schedule A-13.2
Acceptance Criteria and Milestones for *** Transformation and U2L
Schedule A-13.3
Natural to Cobol Conversion
1.6
Responsibilities. In the matrices in this Schedule, “P” means “Perform”. The Party identified as “Perform” for an     activity is responsible for the successful and appropriate completion of such activity.
In the matrices in this Schedule, “A” means “Approve”. Approve means that the applicable     activity     performed by the “Perform” Party will be subject to the approval of the “Approve” Party.
2.
TRANSFORMATION SERVICES
2.1    Transformation Services.
The Transformation Services are comprised of (i) the transformation of the *** System from the legacy Mainframe of *** MIPS to the proposed x86 platforms (the “*** Transformation Services”); and (ii) the transformation of certain physical CoreLogic UNIX Servers to physical and virtual Linux Servers (the “U2L Services”), all as more specifically described in this Schedule. The Transformation Services will be conducted as two separate projects managed in accordance with the program and project management processes described in Section 2.2.
Supplier will prepare and deliver to CoreLogic a detailed Transformation Plan in accordance with Section 4.8 of the MSA which will align with the Transformation Milestones within Schedule A-13.2 and Schedule A-4.5. Each version (*** Transformation Services and U2L Transformation Services) will describe in greater detail the specific Transformation Services to be performed by the Parties during the Transformation Period and will incorporate the additional information gathered during the activities described in this Schedule (e.g., in the project initiation workshops). Unless otherwise agreed by the Parties, each new version of the Transformation Plan shall be consistent in all material respects with this Schedule and the prior version of the Transformation Plan approved by CoreLogic.
Supplier has responsibility for planning and management of the Transformation Services as described in Section 2.2. Each Party shall perform the functions and responsibilities identified as its responsibility in this Schedule and in the Transformation Plans, as such plans are updated from time to time as approved by CoreLogic. CoreLogic will provide access to technical and business personnel and provide Supplier with necessary data and information regarding CoreLogic's business and Systems as required for Supplier to perform the Transformation Services. CoreLogic will make decisions and obtain required management approvals as required to complete the Transformation Services within the timeframes required by the Transformation Plans.
2.2    Transformation Services Program Management.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

This Section details the obligations and responsibilities of the Parties regarding the general program management activities to be undertaken by Supplier with respect to the Transformation Services. Except where a responsibility is identified as a “P” CoreLogic responsibility in the matrices below, Supplier shall be responsible for the following activities:
No.

Description
Supplier
CoreLogic
2.2.1
Define a single Project Management Office (“PMO”) structure, scope and objectives that will apply to all three (3) transformation projects
P
A
2.2.2
Implement a PMO to oversee all Transformation Services activities performed
P
 
2.2.3
Manage Transformation Services activities in support of the completion of the projects
P
 
2.2.4
Develop list of project deliverables to be created by the Parties and applicable Acceptance criteria
P
A
2.2.5
Provide CoreLogic with updates on the progress of deliverables
P
 
2.2.6
Present completed deliverables for review and Acceptance by CoreLogic in accordance with the timeframes set forth in the applicable Transformation Plan
P
 
2.2.7
Review deliverables for Acceptance and sign-off
 
P
2.2.8
Identify and address transformation project issues and communicate and escalate issues to CoreLogic as required
P
 
2.2.9
Manage the project in accordance with the approved project schedules
P
 
2.2.10
Utilize the Change Management Procedures to communicate and address changes to the projects
P
 
2.2.11
Utilize the Change Management Procedures to request changes to the projects
 
P
2.2.12
Manage procurement of Supplier assets to be acquired for the Transformation Services
P
 
2.2.13
Act as a central administrative point for Transformation Plan management, work management, and communications
P
 
2.2.14
Provide *** status and reporting cycle updates to CoreLogic
P
 
2.2.15
Identify, prioritize, authorize and manage Transformation Services program and project activities
P
 
2.2.16
Facilitate the Transformation Services activities by providing analysis and critical reporting to support governance boards and CoreLogic
P
 
2.2.17
Conduct project resource management, encompassing capacity planning, forecasting, utilization, analysis, and reporting, as well as allocation of resources across the portfolio of transformation projects
P
 
2.2.18
Conduct transformation project portfolio management, including identifying, prioritizing, authorizing, managing, and controlling programs, projects, and other related work to maximize the value and achieve specific strategic business objectives of the portfolio
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.

Description
Supplier
CoreLogic
2.2.19
As part of the Transformation Plan, develop and manage a quality management plan, including *** performance monitoring, standardized performance metrics and reporting, red/yellow action plan reviews and intervention and remediation activities
P
 
2.2.20
Lead PMO organization (e.g., plan, design, develop, and manage the PMO organization, including project management staff)
P
 
2.2.21
Utilize Supplier’s project management methodologies
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.3    *** System Transformation
The *** System Transformation Services provided by Supplier will include (i) converting Natural (batch), COBOL (online/batch) Applications to COBOL, (ii) re-hosting CICS Online Natural Objects (programs, subprograms, subroutines, help routines, maps, local data areas, parameter data areas, global data areas) to COBOL and BMS maps, (iii) converting ADABAS file design and data to an ANSI Standard Database, (iv) installing / configuring replacement Infrastructure, monitoring, and security Software, (v) providing Server-side Entire / X replacement services to Natural and COBOL Applications, (vi) providing batch environment that addresses JCL utilities, and (vii) TSO development replacement.

(a)
Regarding the CICS source components on the mainframe , the CICS online Application components (including Natural, COBOL and assembler) will be transformed to COBOL in being moved by Supplier to the Intel x86-based Linux “Target Platform” and will execute within the *** TPE Application execution environment. In performing the migration, the number of *** TPE regions on the Target Platform will be the same number of the CICS regions on the Mainframe. The presentation Application layer will use BMS maps to communicate with direct end user correspondents in the same manner that they do today with CICS. The business logic layer will be retained although programming languages may change. COBOL will remain COBOL, Natural will be transformed to COBOL, and Assembler will be converted to COBOL. COBOL ADASQL calls will be converted to EXEC SQL calls and Adabas Direct Calls will also be converted to EXEC SQL.
*** TPE tables will be configured by Supplier from the CICS System converted information. This information will need to be provided in a specific format (as specified in Supplier asset download instructions) for conversion.
BMS maps will be re-hosted by Supplier. Natural maps will be converted to BMS maps by Supplier.
CICS COBOL programs will be adapted by Supplier to run in the *** TPE *** Application execution environment.
CICS Natural online programs will be transformed to COBOL by Supplier with EXEC CICS command interfaces to run in the UniKix TPE vCOBOL application execution environment.
CICS assembler modules called by CICS COBOL will be replaced by Supplier depending upon the function of the module, one of the following approaches will be used unless otherwise agreed.
The assembler module will be re-implemented by Supplier in COBOL or C as an Application module.
The assembler module will be replaced by Supplier by configuration options, user exit code or COBOL functions (e.g., date functions).
The assembler module will be deleted by Supplier if the function was not required or not accessible. An existing higher-level language Application module would need to be changed to adapt to this change in function.
All direct end user interactive communication with the Applications in the *** TPE will be through TN3270 clients connections.
The Supplier *** Secure environment will be used for the *** TPE transaction processing user identification, authentication, transaction access control, other transaction processing resource access control, transaction processing audit logs, etc. on the Target Platform.
The Entire/X Broker communication Mainframe Server-side replacement (including the specified client Software interfaces) will be replaced by Supplier to remove *** Software dependency. Entire/X non-Mainframe Application client-side modifications to incorporate Entire-X replacement is out of Supplier scope and will need to be addressed by CoreLogic

(b)
This paragraph is intentionally left blank.


(c)
With respect to the Batch / *** Batch Processing Environment source components on Linux, Batch Application components will be moved by Supplier to the *** BPE environment in an Intel x86-based Linux “Target Platform.” *** BPE will provide JCL translation, job/proc step processing capabilities, dynamic submission of JCL jobs from Natural / COBOL programs, GDG/concatenated data set support, and monitoring/accounting facilities for a production batch Application execution environment on the Target Platform.
Batch COBOL programs will be adapted by Supplier to run in the *** BPE vCOBOL environment.
Batch Natural programs (both submitted from JCL and through Natural via RJE) will be converted by Supplier to (replaced by) COBOL programs that will execute in the *** BPE vCOBOL environment.



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

Batch DYL280 programs will be transformed by Supplier to COBOL that will execute in the *** environment.
Batch assembler modules will be replaced by Supplier. JCL for Jobs/Procs will be adapted / translated by Supplier to *** BPE macro scripts.
JCL will be developed / extended by Supplier on the Target Platform.
Supplier will migrate all IDCAMS, IEFBR14, IEBGENER, SORT (and similar Mainframe sort utilities like DFSORT, ICEMAN, SYNCSORT), FTP, NDMBATCH, RDBMS, IKJEFTxx utilities invoking RDBMS utilities, MTPBATCH, file back-up, and WTO utilities as well as CoreLogic abend programs (e.g., ILOABN0). Other utilities will be considered within scope if an existing replacement utility is available or if a replacement utility can be written in two days. Out of scope utilities will be identified as soon as possible so CoreLogic can identify short-term work around options and long-term solutions.
Standard Target Platform operating System (OS) level security will be used by Supplier for batch processing identification and authentication. Standard Target Platform operating System (OS) level security will be used by Supplier to manage access to individual files on disk. CoreLogic will configure security parameters for all operating System instances of the Target Platform.
(d)
For the TSO / uni-SPF Extended for *** on Linux migration, the CLIST modules / scripts will be converted by Supplier to REXX to be compatible with uni-REXX or converted to scripts on uni-SFP Extended for *** on the Intel x86-based Linux Target Platform. The specific transformation option for each module is influenced by what capabilities are used in the module. No CoreLogic ISPF panels will be migrated for the Applications.

(e)
Sequential / GDG Data Files will be migrated by Supplier to sequential/GDG files on the batch processing Intel x86-based Linux Target Platform.
(f)
Regarding VSAM files and Adabas database files / RDBMS on Linux (***)), Adabas database file data needs will be migrated by Supplier to RDBMS tables (***). RDBMS DDL, ADABAS data extract programs, and Adabas data conversion programs will be generated from the ADABAS definitions. VSAM file data will be migrated by Supplier to *** RDBMS database tables. Standard RDBMS security will be used by Supplier for the selected RDBMS.
(g)
Regarding other Linux operating environment products, BMC Control-M is the current Mainframe batch scheduler and the expected batch scheduler on the Target Platform will be BMC Control-M (although the master schedule may be on Windows with an agent on the Linux System). $avrs, XPTR, LPserve / VPS (AFP/PSF) products are used for print distribution and archival on the Mainframe. The print distribution facility on the Target Platform will be Levi, Ray and Shoup VPSX and related products, although this selection will be refined by Supplier, as needed, during the operational planning phase. *** will be the sort package. Subversion is expected to be the target source code change control management system.
(h)
The Application source components listed by type and counts in Schedule A-13.1 will be in scope for Supplier's performance of the *** Transformation Services. Analysis, collection or conversion of components that do not reside on the CoreLogic Mainframe or written in languages other than those specifically listed above is out of scope. Any Application under consideration for transformation that is not currently active or is not presently used in production today will be addressed through the Change Control Procedures. Following asset confirmation at the start the project, CoreLogic will continue to update the Mainframe *** System in parallel with the Transformation Services project. Prior to Application source freeze period, CoreLogic Application changes and the Supplier transformation changes will be synchronized in an Application Source Retrofit process. The scope of the Application Source Retrofit will include the following.
(1)
CoreLogic will be able to create or change up to *** of the BMS Maps, COBOL modules (e.g., programs, subprograms, copybooks, include files), DYL280 programs, TSO CLIST modules, assembler modules and JCL modules (e.g., jobs, procs, parmlib members, control cards) of those same modules of the baseline defined in the asset confirmation (e.g., the number changed COBOL programs would not exceed ***(***) of the COBOL programs counted for in the asset confirmation) for the Application source retrofit where the total lines of code in each changed module does not change more than ***(***).



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

(2)
CoreLogic will be able to create up to ***(***) new total sequential, GDG, and / or VSAM files of the baseline defined in the asset confirmation.
(3)
CoreLogic will be able to update up to ***(***) total of the existing sequential file, GDG file, and / or VSAM files of the baseline defined in the asset confirmation.
(4)
CoreLogic will use the same external interfaces in the Application as was used in the baseline defined in the asset confirmation.
(5)
Corelogic will use the same batch scheduler functions as was done at the time of receiving the batch schedule.
(i)
In connection with the *** Transformation Services    ***(***)*** after the Supplement Effective Date, (i) CoreLogic and ***, shall execute a Binary Code License Agreement and Maintenance and Support Agreement . CoreLogic's warranty, license and other rights with respect to the *** Materials shall be as specified in such agreements and the terms of the Agreement shall not apply to such Materials.
(j)
This paragraph is intentionally left blank.
(k)
This Section details the obligations and responsibilities of the Parties regarding the *** Transformation Services. Except where a responsibility is identified as a “P” responsibility for CoreLogic in the matrix below, Supplier shall be responsible for the associated activities.
No.
Description
Supplier
CoreLogic
2.3.1
Identify Application source to be migrated. Natural source code for the transformation implementation will be collected only from partitioned datasets and/or ADABAS/Natural data dictionaries. Verify that source code to be converted is able to be compiled in the Mainframe environment error free
 
P
2.3.2
Identify Application data to be migrated
 
P
2.3.3
Develop a comprehensive strategy for in-scope Applications and data sources then-located on the Mainframe
P
A
2.3.4
Provide reasonable access to Application owners/developers who possesses relevant knowledge of the technical Application details and who will be responsible to participate actively throughout the Transformation Period process as required (i.e., from beginning through end)
 
P
2.3.5
Provide a primary and secondary point of contact in database administration, Application development resources or subject matter experts on Mainframe who are responsible for:
•    Completing the source code collection
•    Assisting in the definition of the logical Applications
•    Resolving missing, duplicate and other special interest components
•    Locating appropriate CoreLogic Personnel to answer questions from the Supplier team

 
P
2.3.6
Provide:
•    information and support from Third Party Contractors of Corelogic Equipment without unreasonable delay
•    Access to relevant System and Application documentation and records.
•    Participation in planning and preparation meetings
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.7
Provide the Supplier US and international teams access to the CoreLogic test environment on Target Platform (***)
 
P
2.3.8
Provide Supplier US and international teams with remote access to the existing CoreLogic test Mainframe environment
 
P
2.3.9
Provide Supplier with read-only access to the dictionaries and partitioned datasets that contain the source code and definitions that will be converted
 
P
2.3.10
Provide Supplier with authority to use the in-scope Application and database Tools and any other Tools necessary for Supplier to research issues, locate code version differences, monitor execution or performance, or perform other activities to assist CoreLogic with fast conversion issue resolution
 
P
2.3.11
Provide Supplier with remote access to environments where necessary for Supplier to assist with issue resolution
 
P
2.3.12
Resolve any issues related to Supplier connectivity and/or access to any of the CoreLogic environments
•    Test the connectivity and access between Supplier and CoreLogic environments
•    Provide details on any connectivity issues encountered
•    Resolve any connectivity, authority or training issues that are under its control
P
 
2.3.13
Resolve, where applicable, or assist Supplier in resolving, where applicable, any issues related to Supplier connectivity and/or access to any of the CoreLogic environments
•    Test the connectivity and access between Supplier and CoreLogic environments
•    Provide details on any connectivity issues encountered
Resolve any connectivity, authority or training issues that are under its control
 
P
2.3.14
Provide student profiles *** (***) *** prior to *** training
 
P
2.3.15
Provide *** (***) *** product training session for administrators and Application development staff (one training session at West Lake for up to *** (***) *** for up to *** in class duration and one training session in an India location for up to *** (***) *** for up to **** in class duration), such training to cover:
•    *** Transaction Processing Environment,
•    *** Manager,
•    *** Secure, and
•    *** Batch Processing Environment
with *** COBOL compiler and runtime
P
 
2.3.16
Attend *** product training (***)
 
P
2.3.17
Provide student profiles *** (***) *** prior to training
 
P
2.3.18
 
 
 
2.3.19
Conduct transformation planning including asset cataloging (AC), source planning (SP), operational planning (OP), and project planning (PP)
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.20
AC: Using Supplier-provided instructions, provide the following inputs to Supplier via FTP / SFTP as prerequisites for the Asset cataloging:
•    Program source code, JCL, copy books, parameter libraries, BMS maps and other relevant source modules being considered for Application re-host transformation to be submitted to Supplier in a mutually acceptable format.
A
P
2.3.21
AC: Establish and populate a project directory of source component modules by type of source component at the Supplier Facilities.
P
 
2.3.22
AC: Create project change request, to be addressed through the Change Control Procedures, if source programs that are not COBOL, DYL280, CLIST or assembler are encountered and the Application component counts received exceed the Application component counts in Schedule A-13.1.  
 
P
2.3.23
AC: Perform an analysis of the Application source components. The analysis addresses source code classification, quantification, inventory issues, and interface usage
P
 
2.3.24
AC: Examine Application program (e.g., COBOL) source and JCL to determine missing and unused source components
P
 
2.3.25
AC: Produce an initial list (Initial Missing List Report) of detected missing Application source inventory components (e.g., missing programs, copybooks, include files, JCL Procs, parmlibs) for CoreLogic
P
 
2.3.26
AC: Review Initial Missing List Report
 
P
2.3.27
AC: Submit changes to the source code inventory by adding to, replacing, or deleting members of the current inventory (within five (5) business days of receiving Initial Missing List Report) in one delivery to Supplier to address the items determined to be missing or unused from the Initial Missing List Report prior to any final Asset cataloging iteration and provide a single list of changes to the source code inventory
 
P
2.3.28
AC: Receive and integrate CoreLogic-provided changes to the source code inventory
P
 
2.3.29
AC: Conduct a final analysis on the findings from the analysis of Application source components to provide an Asset cataloging Report
P
 
2.3.30
SP: Using the source code inventory received from the AC phase, prepare to perform source planning
P
 
2.3.31
SP: Examine BMS maps, COBOL source modules (programs, copybooks, include files), JCL (jobs, procs, utilities, parmlibs), and CICS configuration tables for non-Natural CICS regions. Identify areas requiring custom adaptation including, but not limited to syntax differences, collating sequence related differences, features used that are not in underlying supported products, etc.
P
A
2.3.32
SP: Examine source modules that require transformation prior to or as a part of re-hosting to the Target Platform. These source modules (e.g., assembler, TSO CLIST, DYL280) will need to be transformed, re-engineered, replaced, or deleted
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.33
SP: Document the analysis results in a Source Assessment Transformation Approach Report
•    Identify issues that will need further investigation before and as part of the transformation
•    Present an analysis outlining the discovered transformation issues that require special attention and/or custom conversion
P
 
2.3.34
SP: Document the refined/ updated transformation approach in the Source Assessment Transformation Approach Report. Refine project and technical scope assumptions and transformation approach for specific Application source and Application data transformation
P
 
2.3.35
OP: Review the Software mapping information for the following
o Application Development Environment (Text Editing, compiling, testing / debugging, change / version control)
o Sort utility requirements
o Batch Scheduler
o Print Distribution Facility
o Security: Transaction Processing Security (Identification, Authentication, Authorization, Audit, Programmatic interface requirements)
o Security: System security (Identification, Authentication, Authorization, Audit, Programmatic interface requirements, Directory Services)
o CICS connectivity (sockets, ECI/EPI, TN3270, CICS Web API)
o Entire / X Broker “Server-side” replacement
o File transfer facilities
o Database capabilities
o System / Storage / Network Management (including monitoring, alerts, automated responses, hierarchical storage management, tape management)
o Data Back-up / Availability (mirror)
• The following areas will not be addressed in the Operational Assessment Software Mapping sub-activity:
o System platform availability – Hot Back-up Availability
o System platform availability – Disaster Recovery Synchronization
o Security: Any Message Privacy / Integrity considerations (Message Encryption)
o Web Server / Application Server
o SNA Communications (SNA terminal / SNA printer or emulator (SNA LU2/3), SNA LU0, peer to peer (SNA LU6.2))
o SNA Communications (RJE / NJE)
o SOA / Web Service Communications
o MQSeries integration
o Data Reporting / Data Editing Tools
o Email
o Software product interfaces (Input / Output Impact)
o Operational requirements specifically related exclusively to Application(s) not being rehosted by Supplier as part of a larger Application rehost transformation. 
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.36
Perform o System platform availability – Hot Back-up Availability
o System platform availability – Disaster Recovery Synchronization

P
 
2.3.37
OP: Review the following operational data transformation requirements
o Batch schedule transformation
o ACF2 CICS security configuration to *** Secure transformation
o Source code control transformation
• The following topics are not included in the Operational Assessment Operational Data Transformation sub-activity
o System and RDBMS security configuration mapping to the underlying Target Platform
o Archive Tape Migration
P
 
2.3.38
OP: Review the Software mapping information and discuss operational data transformation in an onsite operational planning workshop for up to a four (4) day period
P
 
2.3.39
OP: Review the Software mapping information and discuss operational data transformation in an onsite operational planning workshop for up to a four (4) day period
 
P
2.3.40
OP: Provide completed Supplier Infrastructure questionnaire and Supplier Software solution mapping document
 
P
2.3.41
OP: Provide list of all Mainframe Software products in use that support the Application being re-hosted
 
P
2.3.42
OP: Provide list of CoreLogic Software standards, recommended practices, or Software usage on open System platforms
 
P
2.3.43
OP: Identify external interfaces and make necessary changes to the interfaces
 
P
2.3.44
OP: Review the Mainframe batch schedule characteristics to assess transformation options for moving the batch schedule from Mainframe BMC Control-M to Target Platform BMC Control-M
P
 
2.3.45
OP: Review the Mainframe security characteristics to assess transformation options for moving selected Mainframe CICS-related security configuration parameters from ACF2 to Supplier *** Secure repository
P
 
2.3.46
OP: Review the Mainframe change control System characteristics to assess transformation options  for setting up the source code parameters from Mainframe CA-Endevour to Subversion
P
 
2.3.47
SP: Complete an operational assessment Report consisting of a one-to-one mapping of operational requirements to the appropriate distributed System target
 
P
2.3.48
OP: Define the findings in the operational assessment Report consisting of a one-to-one mapping of operational Software requirements (including some alternative products for consideration) to the appropriate distributed System target. This will include appropriate configuration information

P
 
2.3.49
Inform CoreLogic that the collating sequence for ASCII differs from that of EBCDIC
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.50
Provide an environment on which the Mainframe Applications and storage will migrate
P
 
2.3.51
Install re-hosting Software as necessary for Application transition
P
 
2.3.52
Provide to Supplier Personnel valid user-ids and log-on permissions with sufficient authority to perform installations services, batch schedule transformation, *** Secure security configuration, source code control source transformation, compiles, or access to a person with sufficient System access and authority to participate in Supplier installation services of Supplier Software products and licenses on Target Platform
 
P
2.3.53
License the *** Software to include *** TPE, *** BPE, *** Secure, appropriate C compiler (e.g., Linux GCC 4.1.2 C Compiler), *** COBOL compiler and runtime, *** , *** and other requisite Software products
 
P
2.3.54
Order, receive, and provide third party vendor Software products (or authorized internet access to the Software products) to be installed
 
P
2.3.55
Provide third party vendor Software product installation instructions and Software product license keys
 
P
2.3.56
Install the following vendor Software products on *** (***) *** System instance on the Target Platform
•    Linux GCC 4.1.2 C Compiler
•    Subversion for source control management System
•    *** for external sort
•    *** Batch Processing Environment for batch processing environment (Supplier)
•    *** Transformation Toolkit (Supplier)
•    *** Secure
•    *** Transaction Processing Environment for transaction processing environment and VSAM file services (Supplier)
•    uni-REXX (The Workstation Group)
•    uni-SPF Extended for *** for text editing (Supplier)
•    *** Development System and *** Runtime Environment
P
 
2.3.57
Item intentionally left blank
 
 
2.3.58
Provide third party vendor Software product selection, acquisition, installation, configuration, implementation, integration, and testing of any product that is necessary for Supplier to complete the Transformation Services but is not identified as Supplier responsibility in this Schedule including, but not limited to, other programming language compilers / runtimes, print output management / print distribution facility, text editor, source change / version control package, System / storage management facilities, file transfer packages, relational database management System (RDBMS) Software, etc.

 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.59
Provide
•    Additional Software product installation on additional operating System instances.
•    Any tape specific processing.
•    Back-up procedures and related utilities.

P
A
2.3.60
Provide
•    Finalized *** Secure security configuration such as password changes following transformation.
•    *** Secure configuration for other operating System instances not required to be addressed by Supplier (if required)

 
P
2.3.61
Complete Application source transformation (including migrate the COBOL, Assembler ALC, Natural and ADABAS components)
P
 
2.3.62
Review any updates to project pricing and duration in the Source Assessment Transformation Approach report
 
P
2.3.63
Set up a remote transformation environment with Application component inventory in a Supplier defined directory structure. This transformation environment will use Application source components as provided by CoreLogic during the Source Assessment (which is completed prior to this service activity)
P
 
2.3.64
Provide knowledgeable personnel to provide information during the Application re-host transformation. The following areas of expertise are required:
•    User Application knowledge
•    Application development knowledge of the specific Application logic and data layout characteristics
 
P
2.3.65
Assist CoreLogic with reconciling the Application component inventory to be migrated by identifying missing and apparently unused components in each CoreLogic-submitted source update prior to the Asset confirmation Report. Supplier will issue an Asset confirmation Report following either reaching the desired thresholds (***% ***) or maximum number of iterations (***) (whichever happens first) to confirm the Application components to be migrated
P
 
2.3.66
Identify / reconcile the Application source components to be included in the project in at most *** (***) iterations (Asset confirmation). The new/updated source components are to be supplied in one (1) delivery to Supplier for each iteration (i.e., not a series of multiple deliveries for each iteration). This step must be completed within *** (***) *** of the start of this Application source and data transformation service activity. 
 
P
2.3.67
Convert CICS table configuration to generate initial *** TPE table production region configuration
P
 
2.3.68
Adapt BMS (basic mapping set) maps to address differences between the source and target environment so that maps will assemble without “fatal” error on the Target Platform
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.69
Adapt COBOL programs to:
•    Change ADASQL calls to embedded EXEC SQL, Adabas Direct Calls to embedded EXEC SQL as well, VSAM calls to access a RDBMS, and return the correct results to the originating program
•    Address differences between the source and target environment so that programs will compile without “fatal” error in the Target Platform
P
 
2.3.70
Convert batch Natural programs to COBOL. Adapt generated-COBOL programs to address differences between the source and target environment so that programs will compile without “fatal” error in the Target Platform
P
 
2.3.71
Transform online Natural objects to COBOL to be executed in the *** TPE *** environment on Linux. Transform Natural maps to BMS maps to be executed in the *** TPE *** environment. Compile the transformed online application code in Supplier Linux environment.

P
 
2.3.72
Item intentionally left blank.

 
2.3.73
Item intentionally left blank.


 

2.3.74
Transform batch DYL280 Application programs to batch COBOL programs that will compile without material error when compiled for the without “fatal” error in the Target Platform
P
 
2.3.75
Convert Assembler programs to COBOL for the target environment so that programs will compile without “fatal” error in the Target Platform
P
 
2.3.76
Adapt Jobs and Procs
•    Create an initial file map from the JCL
•    Convert sort parameters to operate with *** on the Target Platform
•    Adapt utilities in JCL that have different parameters or syntax on Target Platform
•    Replace utilities in JCL that are not available on Target Platform as depicted within the scope of the assumptions
•    Adapt JCL and translate Jobs and Procs to *** Batch Processing Environment macro scripts
P
 
2.3.77
Provide a list of preferred utility replacement options to Supplier to determine acceptable replacement steps in the JCL where the operational utilities differ substantially in functionality between the Mainframe and the Target Platform
 
P
2.3.78
Transform TSO CLIST modules to REXX (operating under uni-REXX) or scripts for the Target Platform
P
 
2.3.79
Provide more detailed *** TPE and *** BPE configuration to integrate with *** Runtime Environment, *** sort product, BMC Control-M batch scheduler, Oracle RDBMS, an LP-based interface print distribution facility, Linux, and JCL utilities integration
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.80
Provide file data layout information, rules for interpreting any redefined fields or record types, and test data for data conversion tasks for VSAM files, sequential files, and / or GDG files whose data needs to be migrated (e.g.,master/ input / historical files, but not intermediate results files or non-historical output files). Supplier will provide instructions for providing this information in a format that can be readily processed by Supplier Tools
 
P
2.3.81
Establish data conversion procedures for VSAM files for those files whose data needs to be migrated to Target RDBMS on the Target Platform:
•    Generate data conversion programs from CoreLogic-provided file data record layout definitions for ***
•    Generate scripts to sort and load converted data in to Target RDBMS
•    Data will be converted / transformed in to a format that can be loaded in to the RDBMS. During the load process, multi-record type files will be split across multiple database tables
•    Test data conversion programs and conversion scripts with a small amount of data (less than *** per file, *** for all files) that includes a separate file for each unique file data record layout

P
 
2.3.82
Establish data conversion procedures for sequential/GDG files for those files whose data needs to be migrated to Target Platform:
•    Generate data conversion programs from CoreLogic-provided file data record layout definitions
•    Customize conversion scripts for specific file types
•    Test data conversion programs and conversion scripts with a small amount (less than *** per file, *** for all files) of data that includes a separate file for each unique file data record layout
P
 
2.3.83
For Adabas to ANSI standard RDBMS database parameter and preference setup for each SOURCE database file that is scheduled for conversion:
• Provide a file definition worksheet for each SOURCE database file definition
• Provide reports regarding occurs clauses, redefines clauses, group levels and potential date fields
• Provide guidance in correctly and completely filling out the database definition workbook
• Apply all preferences, standards and parameters as rules
• Verify and manage the rules throughout the conversion lifecycle
P
 
2.3.84
For Adabas to ANSI standard RDBMS database parameter and preference setup:
• Respond to Supplier questions regarding the conversion
• Provide additional information as required to allow the full definition of the target databases
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.85
For ADABAS test data creation:
• Create test environments for use in testing the new Applications and the new ANSI standard databases
• Define processes that will allow the for testing and refreshing the unrestricted data in the target ANSI standard database environment and existing Mainframe test environment
P
 
2.3.86
For ADABAS test data creation:
• Locate or create a full set of SOURCE data that contains no sensitive data and can be used in its entirety in testing by Supplier and CoreLogic
• Ensure that the created data is suitable to allow the Applications to execute completely
• Test the execution of the CoreLogic Applications against the new set of unrestricted data
• Execute the deliver SOURCE extract processes against the unrestricted data in the Mainframe SOURCE
•    Resolve any data cleansing issues in the unrestricted data so that no cleansing rule changes are applied to the unrestricted data during the extract process UAT test
 
P
2.3.87
For ADABAS test data creation:
• Define processes that will allow Supplier to test and refresh the data in SOURCE and in a target ANSI standard environment
• Create test scripts, test cases, and use cases for each process using the data

P
 
2.3.88
For ADABAS unrestricted test data creation in UAT:
• Create working test scripts, test cases, and use cases for the execution of the Applications using the unrestricted test data
• Create test environments for use in testing the new Applications and the new ANSI standard databases
• Define processes that will allow the for testing and refreshing the unrestricted data in the target ANSI standard database environment and existing Mainframe test environment
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.89
For Adabas SOURCE database file definitions that are scheduled for conversion:
• Import the SOURCE file definition report(s) for the file definition(s) as collected
• Generate the first-pass SQL Imager reports for the file definition(s)
• Review the reports for the file definition(s)
• Review log messages for any errors during the import and initial parse phases
• Load the table and column naming rules defined by CoreLogic in the Conversion Workbook
• Load the date rules for each SOURCE date element as defined by CoreLogic
• Load the CoreLogic adjustment rules for any redefines, occurs clauses and group levels
• Present questions regarding the first-pass conversion
• Conduct a walkthrough of the deliverables and the processing instructions
• Implement the first-pass ANSI standard database DDL for the databases at Supplier
• Review and test the resulting database structures using the ANSI standard database Tools and other Tools as desired
• Deliver the resulting DDL for the new databases to the CoreLogic teams
• Respond to CoreLogic questions regarding the DDL
• Conduct a post-conversion walkthrough of the resulting databases
• Apply table, column and other naming changes based upon CoreLogic team input
• Apply data cleansing rules as submitted by CoreLogic team
• Re-generate the ANSI Standard Database DDL or SOURCE extracts as required
•    Enable referential integrity on the target databases as required
•    Respond to CoreLogic questions regarding the first-pass conversion

P
 
2.3.90
For First-Pass ANSI Standard Database DDL delivery and installation:
• Respond to Supplier questions regarding the first-pass conversion
• Provide additional information as required to allow the full definition of the target databases

 
P
2.3.91
For First-Pass ANSI Standard Database DDL delivery and installation:
• Receive and implement the first-pass ANSI Standard Database DDL for the databases at the CoreLogic site
• Review and test the resulting database structures using the ANSI Standard Database Tools and other Tools as
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
 
For First-Pass Data Extract and Population:
• Generate the data extract JCL and modules for the file definitions that are being converted
• Deliver the date extract JCL and modules and instructions to CoreLogic for execution in the CoreLogic SOURCE environment.
• Receive and review the extracted data files
• Populate the new ANSI Standard databases at Supplier with the unrestricted data provided by CoreLogic
• Review and touch test the resulting ANSI Sstandard database structure using ANSI standard Tools
• Log and document any issues with the received data
• Present the CoreLogic with details regarding any data issues encountered
• Make any adjustments in order to make the initial database data useable for the initial pass
• Backup the populated ANSI standard databases
• Deliver the backups to CoreLogic for installation in the CoreLogic test environment
P
 
2.3.92
For First-Pass Data Extract and Population:
• Receive and install the data extract JCL and modules on the CoreLogic Mainframe
• Compile and execute the data extract JCL and modules against the predefined SOURCE unrestricted databases for each SOURCE file definition according to the instructions provided
• Ensure that all jobs and steps are executed in the correct sequence and with successful return codes
• Provide Supplier with all extracted data and completed job output in text format as extracted using the Supplier supplied data extract JCL and modules without any manual change pre-extract or post-extract

 
P
2.3.93
For First-Pass Data Extract and Population:
•    Restore the backups into the CoreLogic environment Review and touch test the resulting ANSI standard database structure using ANSI standard Tools or other Tools
• Backup the populated ANSI standard databases
• Define and manage procedures for controlling instances of ANSI standard data for testing.
P
 
2.3.94
Implement a one-time retrofit process (Application source retrofit) to synchronize Mainframe CoreLogic Application extensions and Supplier Application transformation changes during the transformation implementation phase of the project. CoreLogic Application extensions will include new modules and updated modules within the scope defined in Section 2.3 (g).

P
 
2.3.95
At the time of Application source production freeze, provide the Mainframe Application source in scope for input to the Application source retrofit process within scope as defined in Section 2.3 (g).
 
P
2.3.96
Create file data record layouts for all new VSAM files, sequential files, and GDG files for the Application source retrofit for scope defined in Section 2.3 (g).
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.97
Provide any updated file data record layouts for changes to VSAM, sequential, and GDG file formats from the previous baseline definitions for VSAM files, sequential files, and GDG files within scope as defined in Section 2.3 (g).
 
P
2.3.98
For each SOURCE file definition that is scheduled for conversion, the following activities will take place during the collection and definition process:
• Provide a file definition worksheet for each SOURCE file definition
• Provide reports regarding occurs clauses, redefines clauses, group levels and potential date fields
• Provide guidance in completing the database definition workbook
• Apply all preferences, standards and parameters as rules
• Verify and manage the rules throughout the conversion lifecycle
P
 
2.3.99
For each SOURCE file definition scheduled for conversion:
• Respond to questions regarding the conversion
• Provide additional information as required to allow the full definition of the target databases
 
P
2.3.100
Provide transformation planning services including, but not limited to, Application source module categorization and quantification, source planning, and operational requirements planning
P
 
2.3.101
Complete usability and UI design of converted components  
 
P
2.3.102
Item intentionally left blank.

 
2.3.103
Complete the Application and data conversion to the Target Platform
P
A
2.3.104
Prior to delivering re-hosted source components for testing, Supplier will have completed the following
• Installed, configured the following with regards to the migrated environment
o Open System hardware and operating System environment
o third party vendor Software products (e.g., batch scheduler, C, print distributed facility, Syncsort DMExpress, etc.)
• Prepare a set of test plans to be used for the various testing stages
• Plan staffing for testing and production cutover.
Set up development and testing environments
P
 
2.3.105
Prior to receiving re-hosted source components for testing, CoreLogic will have completed the following:
• Selected, acquired and provide to Supplier, the following with regards to the migrated environment
o third party vendor Software products (e.g., batch scheduler, C, print distributed facility, Syncsort DMExpress, etc.)
• Prepare a set of UAT test plans to be used for Application acceptance
• Plan staffing for UAT testing and production cutover
• Attend training sessions on the open System environment products
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.106
Provide valid remote user-ids and log-on permissions with sufficient authority to perform Application source drops, data conversion Tool drops, compilations, Application discrepancy support.
P
A
2.3.107
Provide drop(s) of the migrated Application source and the generated data conversion programs to one (1) unique operating System instance for Linux
P
 
2.3.108
Provide test data for data conversion tasks. Test data will be limited in size for the initial test data. For final testing there will not be any limitation on size of database
 
P
2.3.109
Unload Mainframe VSAM files. Transfer sequential files with VSAM file data, sequential file data, and GDG file data to Target Platform for so that the data can be converted
P
 
2.3.110
Assist Supplier in unloading Mainframe VSAM files, transferring sequential files with VSAM file data, sequential file data, and GDG file data to Target Platform so that the data can be converted
 
P
2.3.111
The testing team and production cutover team use the Supplier-provided data conversion procedures (programs and scripts) to convert data from unloaded VSAM files, sequential files, and GDG files (for those files whose data needs to be migrated to target platform) for Application testing and prior to production cutover
P
 
2.3.112
Review the data conversion report which covers the testing procedure results. (Some errors / warnings are the result of acceptable conditions (e.g., low values in some uninitialized alphanumeric fields) while other errors / warnings may identify bad data in the original records)
P
 
2.3.113
Correct or re-create bad or missing data in the data conversion report provided by Supplier
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.114
During conversion:
• Import the SOURCE file definition report(s) for the file definition(s) as collected
• Generate the first-pass SQL Imager reports for the file definition(s)
• Review the reports for the file definition(s)
• Review log messages for any errors during the import and initial parse phases
• Load the table and column naming rules defined by CoreLogic in the conversion workbook
• Load the date rules for each SOURCE date element as defined by CoreLogic
• Load the CoreLogic adjustment rules for any redefines, occurs clauses and group levels
• Present questions regarding the first-pass conversion
• Conduct a walkthrough of the deliverables and the processing instructions
• Implement the first-pass ANSI standard DDL for the databases  
• Review and test the resulting database structures using the ANSI standard Tools and other Tools as desired
• Deliver the resulting DDL for the new databases to the CoreLogic teams
• Respond to CoreLogic questions regarding the DDL
• Conduct a post-conversion walkthrough of the resulting databases
• Apply table, column and other naming changes based upon team input
• Apply data cleansing rules as submitted by CoreLogic team
• Re-generate the ANSI standard DDL or SOURCE extracts as required
P
 
2.3.115
For the SOURCE file definitions that are scheduled for conversion, the following activities will take place during the First-Pass Data Extract and Population.
• Generate the data extract JCL and modules for the file definitions that are being converted
• Deliver the date extract JCL and modules and instructions for execution in the CoreLogic SOURCE environment.
• Receive and review the extracted data files
• Populate the new ANSI standard databases with the unrestricted data provided by CoreLogic
• Review and touch test the resulting ANSI standard database structure using ANSI standard Tools
• Log and document any issues with the received data
• Present CoreLogic with details regarding any data issues encountered
• Make any adjustments in order to make the initial database data useable for the initial pass
• Backup the populated ANSI standard databases
• Deliver the backups to CoreLogic for installation in the CoreLogic test environment
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.116
Correct material Application discrepancies discovered by testers and analyzed by CoreLogic during testing for the current Mainframe environment, and the Target Platform. For cases where result discrepancies arise from where results on the Mainframe are different from results on the Target Platform for the same programs and data, the tester and CoreLogic will isolate the discrepancy cause and Supplier will address the discrepancy. Once corrected, the test will need to be re-run until the results match the corresponding run on the Mainframe or the discrepancy is resolved to the mutual satisfaction of CoreLogic and Supplier.
• For wrong results, Supplier will adapt the Application components to correct the discrepancy. CoreLogic will assign a person to assist in isolating the cause of the discrepancy.
• For different, but not wrong, functional results (e.g., sorted data in a different collating sequence), Supplier will work with CoreLogic to determine whether this difference requires any further adaptation or not.
• All CoreLogic source assets (code, data definition language, BMS map, JCL, etc.) directly or indirectly related to a discrepancy must be available to our team. If a problem in any CoreLogic program (or job) is reported, if CoreLogic has not provided to Supplier the available CoreLogic source to all modules called by that program (or job) after Supplier request for source, Supplier will immediately turn that entire program over to CoreLogic and Supplier has no further responsibility to correct, debug, or test (as applicable).
• Supplier will provide Application discrepancy correction support of Application transformation testing across multiple operating System instances where
§ Supplier is provided remote access to the operating System instance and related test environment and
§ The operating System instances are of the same operating System and the same vendor Software product versions
• Supplier will Resolve Application discrepancies for in-scope testing tasks, through the earlier of:
o *** (***) *** following the initial migrated source delivery or
o Production cutover
P
 
2.3.117
Application subject matter experts shall be available to assist in isolating Application discrepancy areas or causes
 
P
2.3.118
Log discrepancies in a defect / bug tracking system that is accepted by both CoreLogic and Supplier. Discrepancy descriptions and supporting information need to provide sufficient details for analysis or reproduction of the situation
P
 
2.3.119
During UAT, log discrepancies in a defect / bug tracking system that is accepted by both CoreLogic and Supplier. Discrepancy descriptions and supporting information need to provide sufficient details for analysis or reproduction of the situation
 
P
2.3.120
Prior to submitting discrepancy reports:
• Confirm that test set-up and input data is correct
• Identify the first job step or screen image from which the results begin to differ in the particular test case
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.121
During UAT and prior to submitting discrepancy reports:
• Confirm that test set-up and input data is correct
• Identify the first job step or screen image from which the results begin to differ in the particular test case
 
P
2.3.122
Implement job scheduler transformation, ACF / 2 security profile transformation to Supplier *** Secure, and source code transformation to selected distributed source code management solution
P
 
2.3.123
Provide unloaded Mainframe electronic copy of the batch schedule to be migrated in a Supplier-specified format
 
P
2.3.124
After the assessment, provide the required format for CoreLogic batch schedule
P
 
2.3.125
Transform schedule so that migrated schedule uses features provided in the Control-M on Target Platform, conforms to an input format required by Control-M on Target Platform load utility or command line interface (in script format), and provides the required information that supports integration with the *** batch processing environment
P
 
2.3.126
Use the Control-M load utility or command line interface (in script format) to load the transformed schedule into the Control-M repository for *** (***) *** – *** before the retrofit process and *** the retrofit process. Additional features not required for the transformation are out of Supplier scope
P
 
2.3.127
Integrate batch scheduler with *** batch processing environment
P
 
2.3.128
Perform Mainframe Control-M batch schedule transformation for any schedule beyond that which was initially provided to Supplier for transformation.
 
P
2.3.129
Perform Target Platform Control-M schedule upload for any schedule which was initially provided to Supplier for transformation
 
P
2.3.130
Load the migrated schedule in to Control-M for all operating System instances except *** (***) operating System *** (if required)
 
P
2.3.131
Manage the synchronization of the Mainframe Control-M batch schedule and the Target Platform-based Control-M batch schedule after the batch schedule transformation following the retrofit. Activate the relevant parts of the Target Platform Control-M schedule and deactivate the relevant parts of the Mainframe Control-M schedule when necessary (e.g., production cutover)
 
P
2.3.132
Provide a Mainframe ACF2 dump file whose data will be adapted to be compatible for import in to *** Secure repository for the initial project start and as part of the final retrofit process
 
P
2.3.133
Provide criteria for Application-specific security configuration filtering for online CICS related security configuration and will generate an ACF2 dump file (as specified by Supplier) that can be processed electronically
 
P
2.3.134
Transform the filtered CoreLogic security information to map to *** Secure features and to conform to an input format required by *** Secure load command.
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.135
Identify / configure parameters to implement global security policies (e.g., password expiration, min/max password length) and any additional user id-specific policy options to the transformed security information
P
A
2.3.136
Use the *** Secure load command to load the transformed security information into the *** Secure repository for up to one time - following the retrofit process in the production operating System instance
P
 
2.3.137
Use the *** Secure load command to load the transformed security information into the *** Secure repository for all other operating System instances (if required)
 
P
2.3.138
Perform any additional administrative / configuration required in the environment following the initial load (e.g., changing passwords)
 
P
2.3.139
Execute *** Secure load command to populate security configuration input being loaded in to the *** Secure repository for all operating System instances except one (1) production operating System instance
 
P
2.3.140
Manage any required synchronization of ACF2 and *** Secure security definitions after the security definition transformation
 
P
2.3.141
Perform simple *** TPE / *** BPE print output integration with the print distribution Software. This integration will consider print output insertion into the print distribution Software
P
 
2.3.142
Customize and integrate uni-SPF Extended for *** panels with the change control System to be able to:
• Check out an existing Application branch or source component from the agreed upon source code change management facility
• Check in an Application source component from the agreed upon source code change management facility.
o New Application source component – An error notification will be received by the user if the agreed upon source code change management facility does not accept the new Application source component.
o Updated Application source component – An error notification will be received by the user if the agreed upon source code change management facility does not accept the updated Application source component
• Request promotion / demotion of Application source component
P
 
2.3.143
Populate the source code change management repository *** (***) ***
P
 
2.3.144
Perform and have full backups of data prior to beginning of each transformation.
 
P
2.3.145
Complete Application data transformation
P
 
2.3.146
Conduct testing (, baseline test preparation, regression testing and stress testing, and testing program management). Supplier to assist CoreLogic in acceptance testing specific to resolving testing issues.
P
 
2.3.147
Conduct end to end User Acceptance Testing; provide existing functional, performance and regression test scripts
 
P
2.3.148
Sign off on test results within three (3) business days
 
P



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.149
Provide all existing test scripts to Supplier for consideration in testing the migrated environment.
 
P
2.3.150
Develop test cases (System/Integration/Performance/Security/)
P
 
2.3.151
Perform System integration testing
• Local integration testing (covers sub-system testing)
• End-to-end integration testing (covers full System, and applicable interfaces) using end-to-end test cases

P
A
2.3.152
Perform data transformation testing for ADABAS to SQL/Oracle environments and VSAM, sequential and GDGs file types.
• Reports BI, Check DDL
• Data Validation
• PK Validation
• FK Validation
• Anomalies Validation
• SK Validation
• IUD Validation
P
A
2.3.153
Perform regression testing
• Functional testing of the Applications
• System testing of the Applications
• Regression testing during defect fix or any enhancement or scope change

.
P
A
2.3.154
Perform performance testing against baseline benchmarks
• Performance test requirement analysis
• Test planning, defining workload scenarios
• Test scripts review and customization
• Test execution, monitoring and analysis
• Report delivery and sign off
P
A
2.3.155
Perform security testing (i.e. access rights)
• Security testing of Java based web Applications.
• Security standards to be tested: OWASP
P
A
2.3.156
Complete User Acceptance Test cases preparation and execution
 
P
2.3.157
Provide test data (functional & performance)
• Core Logic to provide test data for all types of test activities.
• Supplier to validate test data provided by CoreLogic
A
P
2.3.158
Provide test cases sign off
 
P
2.3.159
Provide testing Tool procurement for performance testing
A
P
2.3.160
Provide SME support for all testing phases as required and agreed to in the Project plan
 
P
2.3.161
Review test scenarios and results and provide sign off. Testing result validation & testing sign off for all phases
 
P
2.3.162
Configure test environment setup for in-scope types and phases of testing
P
A
2.3.163
Configure a hardware/Software test environment similar to the production environment that is (or will be) implemented for the converted Application at CoreLogic site
P
 
2.3.164
Set up regression and client acceptance test environments
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
2.3.165
Provide Supplier with remote access to the target environments where the new Applications and databases will be delivered and tested using the unrestricted data
 
P
2.3.166
Define and manage procedures for controlling instances of the ANSI standard (e.g., Oracle, SQL Server) data (from Adabas database files) used for testing.
P
 
2.3.167
Perform test preparation phases including the transformation of VSAM, sequential, GDG, and Adabas data to their replacement file / database on Target Platform.
P
 
2.3.168
Conduct CoreLogic acceptance testing of the migrated Application on the target environment. Validate the functional capability and performance of the migrated asset prior to moving the Applications into a production environment
• Implement staffing for testing to begin the testing and apply testing resources to complete this testing in the scheduled time period
• Provide exported VSAM, sequential, GDG file data
• Provide exported Adabas database file data
• Execute the test plan, perform initial analysis of Application discrepancies and work with Supplier to resolve the discrepancies
• End users will participate to validate ability for end user access
• CoreLogic or Third Party support Application developers will interact with end users during the testing as part of learning how to support end users on this platform. Supplier support interaction with end users during this Activity will be done jointly with CoreLogic Application development staff and will be specific to problem clarification if CoreLogic Application developers have difficulties in gathering the information themselves

 
P
2.3.169
Locate or create a full set of SOURCE data that can be used in its entirety in testing by Supplier and CoreLogic

 
P
2.3.170
Develop production readiness and cutover plan and review plan with CoreLogic
P
A
2.3.171
For the final transformation of Adabas data to production RDBMS:
• Work with CoreLogic to define the data and time for the final deployment of the database and online Natural objects to the production environment on Windows
• Provide up to two resources for onsite support during the cutover window
• Provide additional remote offsite support
• Work with CoreLogic to manage the cutover process including the final extract and load of the data
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

No.
Description
Supplier
CoreLogic
 
For the final transformation of Adabas data to production RDBMS:
• Work with Supplier to define the data and time for the final deployment of the database to the production environment
• Work with Supplier to manage the cutover process including the staging of the source code and the final extract and load of the data
• Provide end user training
• Communicate with the end-user community throughout the cutover period
• Monitor the Applications in the new environment
 
P
2.3.172
Complete Systems architecture document and review in concert with existing distributed CoreLogic Applications.
P
A
2.3.173
Implement/ develop any Application functionality changes including functional changes to any Application or programs, design changes to the original SOURCE file definitions, the addition or elimination of any SOURCE records and changes to any SOURCE field definition
 
P
2.3.174
Complete Systems architecture document and review in concert with existing distributed CoreLogic Applications.
P
A
2.4
UNIX TO LINUX TRANSFORMATION
This Section details the obligations and responsibilities of the Parties regarding the U2L Services. Supplier will assess the UNIX environment to develop an inventory of the Applications and dependencies in the environment.  ***Supplier will develop a detailed plan to migrate ***, *** and *** from Unix to Linux.  The target environment from Weblogic could be different for each Application (*** or ***) depending on the Application architecture determined by CoreLogic. ***The third business Application that Supplier will migrate from Unix to Linux is ***. The *** version to be migrated from Unix to Linux will be Oracle 11.5.10 or Oracle Release 12. Supplier will not perform any Application Upgrade or apply any maintenance packs or patches (unless required to complete the migration) and will only migrate Oracle *** from a Unix to Linux platform.
Specifically for Oracle database running on ***, Supplier will migrate *** or higher Oracle DB version databases in production, test, development, QA, or Staging environments running on not more than *** Servers to a Linux based x86 architecture and Oracle 11g database environment. If more *** of the databases are larger than *** TB, the Parties will execute a Change Order under the Change Management Procedures to compensate Supplier for the additional effort required of Supplier. The entire database with all of its objects of any type should be migrated without exception or limitation
Except where a responsibility is identified as a “P” CoreLogic responsibility in the matrices below, Supplier shall be responsible for the following activities:
No.
Description
Supplier
CoreLogic
2.4.1
Complete analysis of Application transformation complexity factors for three in scope Java based Applications, *** databases, C, C++ Applications and scripts
P
 
2.4.2
Size Applications Infrastructures, identify physical and virtual targets for target Infrastructure
P
A
2.4.3
Collaborate with CoreLogic to determine UNIX Baseline load testing methodology
P
 
2.4.4
Collaborate with Supplier to determine UNIX Baseline load testing methodology
 
P
2.4.5
Provide UNIX Baseline load testing Tools
 
P
2.4.6
Collaborate with CoreLogic to perform UNIX Baseline load testing and present findings
P

 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4.7
Collaborate with Supplier to perform UNIX Baseline load testing and present findings
 
P
2.4.8
Provide UNIX Baseline load test windows
A
P
2.4.9
Conduct transformation planning activities
P

A
2.4.10
Coordinate with CoreLogic for project planning
P
 
2.4.11
For the Java based business Applications the *** database Servers, C, C++ Applications and scripts in scope, develop a strategy for each Application and data source currently residing on the UNIX platform identifying a cost effective transformation plan that minimizes impact to the business
P
A
2.4.12
Develop and present a hardware mapping plan for the transformation based on existing hardware up to a week prior to migration and the hardware capabilities at that time just prior to migration and Application requirements in place up to a week prior to migration
P
A
2.4.13
If available, provide existing Application and Infrastructure test scripts to be utilized by Supplier
A
P
2.4.14
If test scripts are not available, Supplier to create them as part of scope
P
A
2.4.15
Provide System inventories showing IP level communications of UNIX Systems with other Systems
P
 
2.4.16
Map identifiable business Applications across the Server the environment
P
A
2.4.17
For business Applications as defined in the scope section of Section 2.4, review architecture, source code, databases, documentation, test scripts and other relevant elements of Systems to develop a transformation plan for each business Application.
P
 
2.4.18
Present the plan prepared after review of architecture, source code, databases, documentation, test scripts, shell scripts and other relevant elements of System
P
A
2.4.19
Identify Application dependencies that will be impacted in the transformation
P
A
2.4.20
Conduct workshops, surveys and interviews during planning and implementation phases
P
 
2.4.21
Assist Supplier in conducting workshops, surveys and interviews during planning and implementation phases
 
P
2.4.22
Provide environment for load testing (benchmarking, testing and validation)work including agreed upon test windows
A
P
2.4.23
Determine the approach and plan to migrate the UNIX environment
P

A
2.4.24
Install and configure re-hosting hardware and storage environment to which the UNIX Applications and storage will migrate
P
A
2.4.25
Install and configure re-hosting Software to ensure successful Application transition
P
A
2.4.26
Provide management and monitoring Tools that will be used in the transformation effort
P
A
2.4.27
Complete code conversion and data conversion in the test environment
P

 
2.4.28
Complete code conversion and data conversion in the production environment
P
 



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4.29
Provide user acceptance testing (UAT) including unit testing, Application testing, data loading testing and end to end System integration testing of the Applications in the new environment
 
P
2.4.30
Assist CoreLogic in conducting customer acceptance testing specific to resolving issues found in the course of UAT
P
 
2.4.31
Correct defects identified through UAT; ( excluding pre-existing defects which can be duplicated in the existing Solaris / Weblogic environment are not in scope)
P
 
2.4.32
Perform Application, System and data processing related load testing on the new environment and present findings compared to the baseline load testing
P
A
2.4.33
Assist in Application, System and data processing related load testing on the new environment and present findings compared to the baseline load testing
 
P
2.4.34
Validate Applications and complete testing
P
 
2.4.35
Migrate Applications into production environment and refresh production with current data and complete final “go live” testing and cutover
P
A
2.4.36
Provide continued support until all defects and Incidents identified in the *** are remediated as provided in ***.
P
A
2.4.37
Review Application Java code to ensure that it has no dependencies on Weblogic, deployment descriptors, security, JNDI, EJB transformation and third-party libraries for conversion to new Java container
P
A
2.4.38
Collaborate on *** vs. *** and agree on optimal approach
P
P
2.4.39
Build and deploy environment necessary for the new Java container Application and transformation as identified in planning phase
P
 
2.4.40
Conduct functional testing of the business Application and provide dependent Applications an environment to test other Application dependencies. Application dependencies and roles and responsibilities will be identified during the assessment / planning phase
P
A
2.4.41
Assist in functional testing of the business Application and provide dependent Applications an environment to test other Application dependencies. Application dependencies and roles and responsibilities will be identified during the assessment / planning phase
 
P
2.4.42
Conduct tests of dependent Applications for Applications being migrated
 
P
2.4.43
Identify potential transformation risks and mitigation activities
P
 
2.4.44
Develop the testing strategy and production rollout strategy
P
A
2.4.45
Complete entire transformation in accordance with the Transformation Plan
P
 
2.4.46
Conduct detailed interviews or workshops on Oracle Database architecture with CoreLogic personnel to capture operational procedures, key business requirements, and Service Level requirements
P
 
2.4.47
Testing to be done for relevant databases after Oracle database services is available.
Validate data objects have been moved
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4.48
Validate that non migrated Applications & databases are communicating properly with the migrated Applications & databases
 
P
2.4.49
Provide Tools to conduct the database transformation
 
P
2.4.50
Provide downtime windows for the production transformation / cutover
 
P
2.4.51
Provide Linux and hardware environment for testing & validation and target environment
P
 
2.4.52
Provide database and Application layer for testing on the target environment
 
P
2.4.53
Perform performance testing on production target environment and present findings
P
A
2.4.54
Provide plan and mechanism to freeze and branch code and data for migration.
P
A
2.4.55
Provide plan and mechanism to merge code and data changes that occur during freeze window to back target System
P
A
2.4.56
Review existing Oracle database architecture requirements including disaster recovery, storage, availability, and Application dependencies
P
 
2.4.57
Conduct transformation planning sessions to capture and document identified candidate databases for transformation and prioritize transformation order to include following
Oracle database current version and desired version
    Identify potential data conversion issues
    New Oracle 11 G feature usage will be identified but not implemented as part of the transformation.)
    Number of databases and associated schemas that will be analyzed
    Timeframe for transformation (transformation windows)
    Transformation Tools and techniques
    Required patches
    Customizations

P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4.58
Configure the Infrastructure as follows:
    Validate accessibility to external storage from each node
    Configure Operating System parameters for Oracle, as needed
    Configure and create partitions needed for each environment
    Configure the IP addresses for each node, as needed
    Install and configure an Oracle ASM instances, if required
    Configure high-availability options, if required
    Install the latest supported Oracle database binaries on each database node
    Create Oracle seed database instance using DBCA to test functionality
    Install and configure default Oracle Listeners using NETCA where relevant
    Install OEM agent, and verify registration with the repository
    Perform post-deployment patches and fixes for Oracle database binaries, as needed, taking into account any Oracle recommendations
P
A
2.4.59
Verify transformation plan developed in previous phase for targeted databases to include:
    Confirm change control approved
    Recommend source database backup process
    Preparation steps for transformation to target environment
    Tools to be used
    Recommended System cutover and roll-back procedures
    Review transformation plan with CoreLogic for approval
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2.4.60
For database scope as referenced in Section 2.4, perform initial transformations and validate initial transformations. Transformation processes will be modified as necessary:
    Perform iterative transformations perform second transformation. This transformation will include detailed timings that will be used for final cutover transformation
    Validate second transformation and modify transformation process. The transformation process is iterative. Problems uncovered during the second transformation will be documented and fixed for subsequent transformations
    Perform third transformation (if needed). This is the “benchmark” transformation that will be used to determine the final timings and used to plan the final transformation
    Validate third transformation and modify transformation process. Some minor changes may require retesting if significant modifications are done
P
 
2.4.61
Provide *** access to Application and database environment to CoreLogic staff for Application UAT
P
 
2.4.62
Implement mechanism to bring current data to Supplier environment to maintain currency of data from CoreLogic environment
P
 
2.4.63
Determine any changes needed in advanced queues and Oracle streams, modify processes and migrate
P
 
2.4.64
Receive CoreLogic approval for final transformation and cutover
P
 
2.4.65
Perform final transformations and production cutovers during approved downtime periods
P
A
2.4.66
Provide scheduled downtime windows for conversions / transformation that will be defined during the planning phase
 
P
2.4.67
For the Unix to Linux scope defined in Section 2.4, perform and have full backups of data prior to beginning of each transformation.
P
A
2.4.68
Complete Infrastructure, new Java container and database Systems architecture document and review in concert with existing in scope distributed CoreLogic Applications.
P
A
2.4.69
Knowledge transfer – Unix to Linux includes:

•    *** for each of the *** and an *** for the Oracle database. These sessions may include but would not be limited to:
•    Overview of changes or modifications, a list of modified files, and a Q/A session with CoreLogic SMEs
•    Application change (C++/Java): This will include a formal handoff of any source code, modified files, and SME Q/A
•    New OS and container configurations
P
A
2.4.70
As part of acceptance criteria, all source code migrated during the project including unmodified or newly written shall be checked into and managed in the CoreLogic source control management
P
A



CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS

2
As part of acceptance criteria, all migrated Applications shall be able to compiled, deployed and released with the same level of automation and repeatability as before the migration. CoreLogic existing Tools and processes should be used with only necessary modifications
P
A




CONFIDENTIAL MATERIAL APPEARING IN THIS DOCUMENT HAS BEEN OMITTED AND FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION IN ACCORDANCE WITH THE SECURITIES ACT OF 1933, AS AMENDED, AND RULE 24B-2 PROMULGATED THEREUNDER. OMITTED INFORMATION HAS BEEN REPLACED WITH ASTERISKS


2.5    TRANSFORMATION MILESTONES

2.5.1    *** System Transformation
Schedule A-4.5 and Schedule A-13.2 sets forth the Transformation Milestones applicable to Supplier’s performance of the *** Transformation Services, the required completion date and the Acceptance criteria applicable to each milestone. The Deliverable Credits and other credits applicable to the *** Transformation Services are set forth in Schedule A-4.5. If the Transformation Plan is changed by the Parties in accordance with the processes described in this Schedule, the associated completion date shall be appropriately adjusted based upon the change and without the necessity of amending this Schedule.

2.5.2    Unix to Linux Transformation
Schedule A-4.5 and Schedule A-13.2 sets forth the Transformation Milestones applicable to Supplier’s performance of the U2L Services, the required completion date and the Acceptance criteria applicable to each milestone. The Deliverable Credits and other credits applicable to the U2L Services are set forth in Schedule A-4.5. If the Transformation Plan is changed by the Parties in accordance with the processes described in this Schedule, the associated completion date shall be appropriately adjusted based upon the change and without the necessity of amending this Schedule.
 
2.6    CHANGE MANAGEMENT PROCEDURES
Any Change to this Schedule or the Transformation Services requested by a Party shall only be made in accordance with Schedule 6.1 to the MSA (Change Management Procedures). Any Dispute between the Parties regarding such matters shall be subject to the dispute resolution procedures in Schedule 6.


2.7    TRANSFORMATION CHARGES
CoreLogic shall pay Supplier *** for the *** Transformation and U2L Services in the amount specified in Schedule A-4.5.2. These *** shall be invoiced in the installments on the dates and in the amounts set forth in Schedule A-4-5.2. The amounts set forth in Schedule A-4.5 are inclusive of travel and living expenses incurred by Supplier Personnel in providing *** Transformation Services and U2L Services.