Questions to Ask Before Signing a Managed IT Services Agreement
Most businesses sign managed IT contracts they don't fully understand — then discover what the terms actually meant when a server goes down at 11pm, a key employee leaves, or they try to switch providers. Here is what to ask before you sign.
Managed IT contracts contain 12 categories of terms that catch businesses off-guard: response time SLAs (and what they don't cover), the real scope of "unlimited support," escalation paths, data ownership, exit clauses, hardware refresh obligations, security responsibilities, compliance coverage, reporting cadence, subcontractor disclosure, price escalation terms, and references. A good contract is explicit on all of these. Red flags: SLAs with no financial consequences, vague scope language, auto-renewal with long notice windows, and no data portability guarantees. The Tech Ref reviews managed IT proposals at no cost — before you sign.
Why Most Businesses Sign IT Contracts They Don't Fully Understand
The procurement process for managed IT services has a predictable shape. A business evaluates two or three providers, gets proposals with similar-sounding tiers, and makes a decision largely based on price, the salesperson's rapport, or a referral. The contract itself — typically 15 to 30 pages of legal and technical language — gets a skim, maybe a quick look from a bookkeeper, and then a signature.
Six months later, the same business finds out that the response time SLA they were quoted applies only to "critical" outages as defined by the provider — not by the impact on the business. Or that "unlimited support" does not include on-site visits. Or that switching providers requires 90 days notice and the provider retains admin credentials until the last day of the contract. Or that all the documentation and configurations built over two years are proprietary to the MSP and not transferable.
None of this is hidden — it is in the contract they signed. The problem is that managed IT service agreements are written to protect the provider, not the customer. And most businesses lack the technical context to recognize which provisions carry real risk and which are standard boilerplate. That gap is where problems are born.
This guide covers the 12 questions that close that gap. They are the questions that surface contract terms worth negotiating before you sign — not after an incident reveals what the terms actually meant. For context on what managed IT services cost before you get to contract review, see our managed IT services pricing guide. For how to evaluate the providers themselves, see our managed IT services overview.
12 Questions to Ask Before Signing a Managed IT Services Agreement
What are the response time SLAs — and what do they actually cover?
Response time SLAs are the most cited and least understood term in managed IT contracts. Every provider has them. Few customers understand what they measure. The key distinction is between response time (when someone acknowledges the ticket) and resolution time (when the problem is fixed). A provider can technically meet a 15-minute response SLA by sending an automated acknowledgment — while your server sits down for four hours waiting for an engineer.
What to ask: What are the response and resolution time commitments by priority tier? How are priority levels defined — by the provider or by the customer? What happens after hours and on weekends — does the SLA still apply? Are there financial penalties or service credits if SLAs are missed? An SLA with no consequence for missing it is aspirational language, not a commitment.
What does "unlimited support" actually include?
"Unlimited support" is marketing language. Every contract that uses it contains limitations — the question is where they are hidden. Common restrictions include: support hours limited to business hours with after-hours coverage at additional cost; on-site visits capped or billed separately; support for covered devices only, excluding personal devices, non-standard software, or shadow IT; project work such as migrations, new deployments, or major upgrades explicitly excluded from per-seat pricing; and escalations to senior engineers or specialists billed at a premium rate.
What to ask: What is explicitly NOT included in the monthly fee? Define "project work" — at what point does a support request become a project and trigger additional billing? Is after-hours support included, and if so, does it carry the same SLAs? Get the exclusion list in writing, not just the inclusion list.
What is the escalation path when standard support fails?
Most support tickets resolve at the first-line tier. The ones that matter most — active outages, security incidents, data loss — often do not. Understanding the escalation path tells you how the provider is structured to handle the situations that actually hurt your business. A provider with no defined escalation process above the helpdesk is not equipped to handle critical incidents, regardless of what their SLA document says.
What to ask: Who handles escalations — in-house senior engineers or third-party vendors? What is the escalation trigger — time in queue, severity level, or customer request? Is there a named technical account manager or escalation contact for your account, or do escalations go into a queue? How are major incidents communicated, and who is your point of contact when something is genuinely wrong?
Who owns your data — and can you take it with you?
Data ownership provisions in managed IT contracts determine what happens to your configurations, documentation, credentials, and backups when the relationship ends. Some providers treat everything they build or document about your environment as proprietary — meaning you can have your data, but not the runbooks, configuration files, network diagrams, and institutional knowledge the MSP holds. Others use tooling and licensing structures that make migration genuinely painful, whether intentionally or not.
What to ask: Who owns the configurations, scripts, and documentation created for your environment? If the contract ends, are credentials, admin access, and configurations transferred on day one of notice — or on the last day? Is your data stored in the provider's proprietary platform, or in portable formats you can export independently? Are there any licensing agreements (RMM tools, backup platforms) that would need to be transferred, and what is the process?
What are the exit and termination terms?
Exit clauses are where managed IT contracts most commonly surprise customers. Auto-renewal provisions — where a contract renews for a full term unless canceled within a specific notice window — are standard and frequently catch businesses off-guard. Notice periods of 60 to 90 days are common, meaning you could be bound for another year even if you decide to switch. More concerning are contracts that allow the provider to terminate for convenience with minimal notice while requiring extended notice and penalties from the customer.
What to ask: What is the contract term and does it auto-renew? What is the notice window to cancel renewal — and who receives the notice? What are the termination-for-cause provisions — can you exit early if SLAs are repeatedly missed? Are there early termination fees, and how are they calculated? What happens to services, access, and support during the notice period — does quality typically decline once notice is given?
What are the hardware refresh and replacement obligations?
Managed IT agreements that include device management often contain provisions about hardware replacement cycles — and they are not always clear about who pays for what. The MSP may recommend hardware replacement at a specific interval, and the contract may make that recommendation effectively mandatory (flagging unsupported hardware as out of scope for support coverage). Understanding the hardware lifecycle expectations upfront prevents surprise conversations about a $50,000 refresh cycle two years into a contract.
What to ask: Does the agreement require hardware refresh cycles? If hardware ages out of vendor support, does the MSP continue to support it or does coverage lapse? Who purchases replacement hardware — directly from the provider, or through independent procurement? Is there a markup on hardware the provider sources, and if so, how does it compare to market pricing? Can you use hardware purchased independently, or does it need to go through the provider?
Who is responsible for security — and exactly where does that responsibility end?
Security responsibility in managed IT contracts is one of the murkiest areas in the industry. Some providers include managed detection and response (MDR), endpoint protection, and firewall management in their base tier. Others include "monitoring" but not incident response. Others treat security as an entirely separate scope requiring a separate agreement. The provider's responsibility boundary — where their obligation ends and yours begins — needs to be explicit, because in a security incident, ambiguity becomes liability.
What to ask: What security tools and controls are included in scope? Is endpoint detection and response (EDR) managed by the provider, or just deployed? If there is a security incident, what is the provider's obligation — notification only, or active containment and remediation? Are security patches and updates included, and on what cadence? What security controls does the provider apply to their own access to your environment — MFA, privileged access management, audit logging?
What compliance obligations does the provider cover — and what do they not?
If your business operates under HIPAA, PCI DSS, SOC 2, CMMC, or state privacy laws, your managed IT provider's practices directly affect your compliance posture. Some providers are compliance-ready and document their controls accordingly. Others use language like "we help you maintain compliance" without taking on any formal compliance responsibility. The distinction matters when an auditor asks who is responsible for a specific control requirement and the answer is a contract clause neither party fully read.
What to ask: Which compliance frameworks does the provider have documented experience with? Are their practices covered under a Business Associate Agreement (BAA) if your business handles PHI under HIPAA? Can they provide a SOC 2 Type II report or equivalent documentation of their own security controls? What compliance-related reporting or evidence does the provider produce, and in what format? What is explicitly outside their compliance scope?
What reporting will you receive — and how often?
Reporting is the primary mechanism by which you hold a managed IT provider accountable to the terms of the agreement. Without regular, structured reporting, you are dependent on the provider's self-assessment of how they are performing. Good reporting includes ticket volume and resolution metrics against SLAs, security event summaries, patch compliance status, backup health verification, and capacity or risk observations. Providers who resist committing to specific reporting cadence and format often do so because their performance metrics would not hold up to scrutiny.
What to ask: What reports are included in the agreement, and how frequently are they produced? Are reports automatically generated from the provider's tooling, or manually assembled — and does that affect reliability? Do the reports include SLA performance metrics with variance to target? Who presents the reports — the account manager, the technical team, or an automated email? Is there a scheduled quarterly or annual business review, and is it included in the base agreement?
Does the provider use subcontractors — and for what?
Managed IT providers commonly subcontract specific functions: after-hours support, specialized technical roles, on-site field services, security operations, or specific vendor support. This is not inherently problematic, but it affects accountability, security, and service quality in ways you need to understand before signing. If the provider's security operations center (SOC) is a third-party vendor and you have a breach at 2am, the chain of accountability and access becomes relevant fast.
What to ask: Which services are provided directly by your staff, and which are subcontracted? Who are the subcontractors, and are they disclosed? Do subcontractors have access to our systems — and under what access controls? Are subcontractors covered under the same data protection and security obligations as the primary provider? If the subcontractor relationship ends, how does that affect our service coverage?
What are the price escalation terms over the contract period?
The monthly per-seat or flat-rate pricing in a managed IT proposal is the starting price, not necessarily the price you pay in year two or three. Most contracts include provisions for annual price adjustments — typically tied to CPI, a fixed percentage, or the provider's discretion. They may also include per-seat pricing that scales as headcount grows, and separate pricing for new service categories added mid-term. Understanding the full potential cost trajectory matters when you are evaluating multi-year commitments.
What to ask: Is pricing fixed for the contract term, or subject to annual increases? If increases are built in, what is the cap or mechanism — percentage, CPI index, or provider discretion? How is per-seat pricing handled if headcount grows significantly mid-contract? Are there any services currently included that might be reclassified as add-ons at renewal? Can the provider point to examples of renewal pricing for comparable current clients?
Can the provider give you references from businesses similar to yours?
References are the most underused due diligence tool in managed IT procurement. Providers will give you references they have prepared — businesses that will speak positively. The value is not in the testimonial but in the conversation: asking directly whether the SLAs in the contract match reality, how the provider handled a significant incident, whether the contract terms looked the same at renewal, and whether the reference would sign with the same provider again knowing what they know now.
What to ask the provider: Can you provide two or three references from businesses of similar size, in a similar industry, who have been with you for more than two years? Can you provide contact information for a customer who transitioned away from your service — not as a negative reference, but to understand the offboarding process? What to ask the references: Has the provider met the SLAs in the contract? How did they handle the most significant incident you experienced? Did renewal pricing match what you expected from the original contract? Would you sign with them again?
Good Contract vs. Red Flags: A Comparison
| Contract Element | What a Good Contract Includes | Red Flag Language |
|---|---|---|
| SLAs | Tiered response AND resolution times, defined priority levels, financial penalties or credits for misses | Response time only (no resolution time), vague priority definitions, SLAs with no consequence for missing them |
| Scope of support | Explicit inclusion list AND exclusion list, definition of "project work," after-hours terms stated clearly | "Unlimited support" with no definition of exclusions; scope defined only by inclusion |
| Data ownership | Customer owns all data, configurations, and documentation; transfer on day one of notice period | Configurations or runbooks treated as provider intellectual property; credentials released only on contract end |
| Exit terms | 30–60 day notice window, no auto-renewal without affirmative consent, termination-for-cause provision if SLAs are missed | 90+ day notice window, auto-renewal default, early termination fees without cause exception, no SLA-based exit right |
| Security responsibility | Named security tools included, patch cadence defined, incident response obligations stated, provider's own access subject to MFA and logging | "Best efforts" security language, no named tools, no incident response obligation, provider access controls undisclosed |
| Reporting | Monthly SLA performance report, quarterly business review, backup health confirmation, security event summary | Reporting "available on request" only, no defined format or cadence, no SLA variance reporting |
| Subcontractors | Named or categorized subcontractors disclosed, subject to same data protection terms, customer notified of material changes | Broad right to subcontract without disclosure, no subcontractor security requirements stated |
| Pricing | Fixed or CPI-capped increases with stated maximum, per-seat add terms defined, renewal pricing framework provided | Annual increase at provider discretion, no cap, per-seat pricing for headcount growth undefined |
What Happens When You Don't Ask These Questions
The questions above are not hypothetical. The scenarios below represent the kinds of situations businesses encounter when they sign managed IT contracts without working through these terms first.
Scenario: The outage that fell outside the SLA
A professional services firm experiences a server outage on a Friday afternoon. They call the MSP's support line expecting urgent response per the "4-hour resolution SLA" in their contract. They learn the SLA applies to P1 incidents — defined by the provider as outages affecting 50% or more of users simultaneously. The server affecting a five-person team is classified P2, with a next-business-day resolution commitment. The team works the weekend manually. The SLA language was in the contract. No one had read the priority tier definitions before signing.
Scenario: The switch that cost six months of effort
A healthcare organization decides to switch managed IT providers after a quality decline. They give 30 days notice, only to find the contract requires 90 days — and auto-renewed three months earlier because the cancellation window passed without notice. They are locked in for 15 months. When the contract finally ends, the outgoing MSP takes two weeks to transfer admin credentials and provides no documentation of configurations built over three years, citing proprietary methodology. The new provider essentially inherits an undocumented environment and rebuilds from scratch.
Scenario: Compliance exposure at audit time
A financial services company undergoes a vendor security review from a major client. The reviewer asks for documentation of the managed IT provider's security controls over the client's environment. The MSP has never produced a SOC 2 report, does not log privileged access to the client's systems, and cannot demonstrate MFA enforcement on their own admin accounts. The client relationship is at risk. The contract said "compliant with industry standards." It did not name any specific standards or require the MSP to document how it meets them.
Scenario: The hardware refresh no one budgeted
A retail business is informed by their MSP midway through a three-year contract that their server infrastructure has reached end-of-life and is no longer covered under the support agreement. The contract included language that "unsupported hardware is excluded from managed support." Replacing the hardware — sourced through the MSP at a significant markup — was not in the budget. The business had not been told at signing that hardware replacement cycles were a foreseeable cost within the contract term. The conversation became adversarial. The hardware eventually got replaced at market pricing, but the relationship did not recover.
How The Tech Ref Helps With Managed IT Contract Review
Evaluating managed IT proposals requires two kinds of expertise that most businesses do not have in-house: technical fluency to understand what contract provisions mean operationally, and market knowledge to recognize which terms are standard and which are outliers worth negotiating.
The Tech Ref provides vendor-neutral managed IT evaluation as part of our IT procurement service. Here is what that looks like in practice when a business is evaluating managed IT providers:
- Proposal comparison: We evaluate proposals from multiple providers side-by-side — comparing SLA terms, scope definitions, pricing structures, and contract flexibility — so differences that are obscured by similar-sounding language become visible.
- Contract language review: Before you sign, we review the MSA (master services agreement) for the terms covered in this guide — flagging provisions that carry risk, language that is unusually provider-favorable, and items worth negotiating.
- Reference framing: We help you ask the right questions of provider references — beyond the testimonial-level conversation providers prepare them for — so you get genuinely useful signal about how the provider performs under real conditions.
- Compliance fit: If your business has HIPAA, PCI DSS, or other compliance obligations, we evaluate whether the provider's contract and practices align with your requirements before you sign a BAA or a compliance representation into the agreement.
- Ongoing accountability: After you engage an MSP, we remain the contact for contract disputes, renewal negotiations, and situations where the service does not match the agreement.
This service costs your business nothing. The Tech Ref is compensated by the providers we place — which means our incentive is to find the right fit for your requirements, not to push the highest-margin engagement. The same model applies across every IT category we work with, including IT vendor management more broadly.
If you are evaluating managed IT providers and want a second set of eyes on a proposal or contract you have received — or if you are starting fresh and want help structuring the evaluation — email hello@thetechref.com. Tell us your business size, industry, and what is driving the evaluation. We will help you figure out the right next step.
Frequently Asked Questions
What should be included in a managed IT services agreement?
A well-structured managed IT services agreement should include clearly defined scope (what is and isn't covered), response time SLAs with distinction between critical and non-critical issues, escalation procedures, data ownership and portability terms, exit and termination clauses, hardware refresh obligations, security responsibilities, compliance coverage, reporting cadence, subcontractor disclosure, and price escalation terms. Any agreement that lacks written SLAs, defined scope, or exit terms carries significant risk — verbal assurances do not hold up when relationships break down.
What is a typical response time SLA for managed IT services?
Reasonable benchmarks for most small and mid-sized businesses are: critical outages (P1) — response within 15–30 minutes, resolution effort within 1–4 hours; significant degradation (P2) — response within 1–2 hours, resolution within 4–8 hours; non-critical issues (P3/P4) — response within 4–8 hours, resolution within 1–3 business days. The critical distinction is between response time (acknowledgment) and resolution time (problem fixed). Also verify what happens after hours — some providers drop to next-business-day response for P2/P3 outside core hours.
What does "unlimited support" mean in a managed IT contract?
"Unlimited support" almost always has limits — they are just buried in the agreement. Common restrictions include: support hours limited to business hours with after-hours at additional cost; on-site visits capped or billed separately; support scoped to covered devices only; project work such as migrations or major upgrades explicitly excluded; and escalations to senior engineers billed at premium rates. Always ask what is specifically NOT included in writing — the exclusion list is more informative than the inclusion list.
How long should a managed IT services contract be?
Most managed IT providers offer 1–3 year terms. For businesses evaluating a new provider, a 1-year initial term with renewal options is a reasonable starting position — it gives both sides time to prove the relationship without locking in for years before you know how the provider performs. More important than term length is the exit clause: what notice is required, whether you can exit for cause if SLAs are repeatedly missed, and what happens to your data and configurations on termination.
How does The Tech Ref help with managed IT contract review?
The Tech Ref reviews managed IT services proposals and contracts on your behalf — flagging scope gaps, vague SLA language, unfavorable exit terms, and pricing structures that create cost exposure later. We compare proposals across multiple providers and translate contract language into plain terms so you understand what you are agreeing to. This service costs your business nothing. We are compensated by the providers we place, with our incentive aligned to finding a provider that actually delivers — not just the one with the best sales pitch.
The Tech Ref is a free, vendor-neutral IT procurement service for small and mid-sized businesses. We handle every vendor, every quote, and every evaluation — at zero cost to your business.
Related Reading
Get a Free Managed IT Contract Review
Tell us your business size, industry, and what you are evaluating. We will review any proposal or contract you have received and tell you what to negotiate — before you sign.
Email hello@thetechref.com