Browse Definitions :
Definition

operational-level agreement (OLA)

What is an operational-level agreement?

An operational-level agreement (OLA) is a contract that defines how various IT groups within a company plan to deliver a service or set of services. These agreements are designed to address and solve the problem of IT silos. They set out specific criteria and define the IT services for which each department is responsible.

Departments or business functions within an organization execute OLAs. For example, IT departments might execute them for specific functions, such as networking or security services. They describe how each service is to be performed and delivered.

OLAs are different from service-level agreements (SLAs), which are contracts and agreements between vendors and their customers. OLA's are commitments within an organization. They are just as important as SLAs, however, because they define what's required to meet the internal customer's approval and what happens when those needs aren't met.

Like SLAs, OLAs are important business tools and should be executed for all major projects as well as smaller, less consequential initiatives.

Diagram of the IT service delivery process.
IT teams create, deploy, manage, monitor, maintain and retire many products and services. Operational-level agreements define how this is done in many cases.

Why are OLAs important?

The most important reason for having OLAs is to ensure that what has been agreed to -- such as the delivery schedule for a service or product -- is what happens. OLAs are also important as a way to define what happens if the product or service isn't delivered to internal customers in the agreed time frame, and what recourse the customer has. Both are key elements in IT service-level management, ensuring that superior performance is delivered.

OLAs can include some or all of the following metrics:

These criteria are used to compare performance in the context of the metrics and to determine if the OLA has been satisfied.

Who uses OLAs?

OLAs are typically used in IT environments as part of the IT service catalog. This is because many IT activities have performance components associated with them. Other departments might also execute OLAs to provide details of an internal service they perform for another part of the organization. For example, a production department might ask the finance department to prepare an analysis of the return on investment of a production system.

OLAs are often agreed upon with a handshake. Nevertheless, these agreements provide details and expectations of the activity in question. As a result, they reduce the likelihood of misunderstandings.

Preparing an OLA

IT organizations should establish a standard process and template for preparing OLAs that includes the following steps:

  1. Provide a general overview that states the OLA's purpose and scope.
  2. Define the issues the OLA is to address.
  3. Specify the product or service to be provided.
  4. Identify the stakeholders involved with their contact information.
  5. Describe the scope of work and desired results.
  6. Determine the desired time frame, any intermediate phases and goals, and the end date.
  7. Outline how and how frequently the parties involved will communicate.
  8. State any specific terms of service or other conditions required.
  9. Include additional information and relevant content such as diagrams and lists, as attachments.
  10. Have interested parties sign the agreement, authorizing the work.

What is a service-level agreement?

The term service-level agreement is used in many organizations to refer to agreements between internal groups. However, according to the Information Technology Infrastructure Library (ITIL) framework for best practices, this type of internal contract should be called an operational-level agreement. SLAs are more often executed between an organization and one or more of the vendors that the organization does business with.

An SLA describes what products or services the vendor is to provide, the criteria under which the products and services are to be provided, and what happens if the product or service provider fails to perform as stated in the SLA. These situations may include failure to meet the product or service delivery date, penalties if the service fails once it's installed and other situations that violate the SLA terms. Penalties for failing to meet a service agreement might include a credit or a refund for the product or service provided or a discount on a previously agreed to price or rate.

List of what to include in a service-level agreement
The elements included in a service-level agreement are similar to those in an operational-level agreement.

Relationship between OLAs and SLAs

OLAs can be implemented on their own. However, they are also used to delineate the specific activities and relationships needed to achieve the specifications in a related SLA. Figure 1 depicts the typical relationships between OLAs and SLAs.

SLAs interact with OLAs; typically, the OLA specifies the tasks and activities that must be delivered, such as networking and security, to meet an underpinning contract that's part of an SLA. Criteria specified in the OLA is embedded in the SLA, which is executed with a vendor.

Diagram of how operational-level agreements and service-level agreements relate
Figure 1. OLAs are used to identify the internal activities needed to meet the requirements of a related SLA.

Learn more about ITIL best practices and how they improve business processes.

This was last updated in April 2023

Continue Reading About operational-level agreement (OLA)

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

CIO
  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close