Professional Documents
Culture Documents
January, 2021
ABOUT THIS DOCUMENT
In case of any conflict between this document and local laws, regulations or
contracts, the local laws, regulations or contracts shall prevail.
Report to the customer after arriving at the site, and communicate acceptance criteria and Acceptance Conditions
arrangements with them.
Cargo Issue Handling
DOA Status Query
Action Complete goods acceptance with the customer. License Distribution
6 Appendix
TERMS
Term Definition
Cargo issues include DOA, damage of goods, shortage of goods,
Cargo issues
issues in delivery, and more goods delivered than ordered.
1 Goods Acceptance
The following situations are regarded as damage of cargo when Huawei
is responsible for the transportation and goods arrival signing: Acceptance Conditions
Damage of cargo The goods and/or the outer packages are deformed and/or damaged. Cargo Issue Handling
The goods quantity is inconsistent with the POD.
DOA Status Query
The goods are found damaged during unpacking inspection.
License Distribution
The type and quantity of goods actually delivered by the supply chain
2 Installation and Implementation
are inconsistent with those specified according to the contract quotation,
Wrong delivery
site survey, and configuration manual, including insufficient, excessive, 3 Technical Support
and incorrect goods.
4 Cyber Security
The equipment whose package is not damaged cannot work normally
DOA when powered on for the first time or breaks down within 48 hours after 5 Security Vulnerability Management
it is powered on and put into operation.
6 Appendix
TAC Technical Assistant Center
POD Proof of Delivery
1.1 ACCEPTANCE CONDITIONS
DAMAGE OF CARGO
Huawei accepts only the cargo issue applications submitted by partners who directly
conduct transactions (distributors and VAPs) with Huawei. Other partners should contact
Huawei's distributors for their cargo issues. 1 Goods Acceptance
Cargo issues should be applied for based on signed PODs, technical review, and facts found Acceptance Conditions
in investigation. If the outer package is damaged, report it on the POD, take photos for
Cargo Issue Handling
archiving, and submit an application to Huawei. The personnel in charge of damage
information feedback must maintain the scene and original package. DOA Status Query
License Distribution
Attention Damage of cargo can only be claimed within 14 days after a distributor/VAP 2 Installation and Implementation
signs a POD.
3 Technical Support
Required Information
No. Information 4 Cyber Security
4 BOM
5 Photos of the SN and certificate of the damaged goods
6 Quantity
7 Photos of the damaged goods, and close-up of cargo damage
No. Information
Clear photos of the six sides of the inner and outer packages
8
(all characters on the package labels are clear)
Huawei will analyze the liability for goods damage based on the above information: 2 Installation and Implementation
a. When the damage is caused by a partner and covered by the insurance purchased
3 Technical Support
by the partner, the partner shall claim from the insurance company and repurchase
goods from Huawei.
4 Cyber Security
b. When the damage is caused by Huawei and covered by the insurance purchased
by Huawei, report the damage to the insurance contact personnel of the Logistics 5 Security Vulnerability Management
Dept for handling in compliance with the claim.
c. When the damage is not covered by the insurance, the involved amount is lower 6 Appendix
than the deductible, or the insurance claim period has expired, but it is confirmed
that the damage is caused by Huawei's logistics, Huawei will arrange for a
replacement.
Cargo issues do not include the following:
Attention Wrong delivery can only be claimed within 30 days after a distributor/VAP 3 Technical Support
signs a POD.
4 Cyber Security
Required Information
5 Security Vulnerability Management
No. Information
1 Huawei sales contract number 6 Appendix
2 Quotation
3 P/L No./Box No. of wrong goods
4 SN
No. Information
5 BOM
6 Site
Clear photos of the six sides of the inner and outer packages(all characters on
7
the package labels are clear)
1 Goods Acceptance
8 Clear photos of the original package label
Acceptance Conditions
Cargo Issue Handling
The application form and photos of the equipment involved in the wrong delivery must be DOA Status Query
provided. The transfer of freight risks complies with the general rules of international trade
License Distribution
terms.
For goods picked by channel partners, the buyer has the right to assign personnel to 2 Installation and Implementation
Huawei's factory at its own expense to check the quality of the equipment, P/L, and packed
items as well as the packing quality before each batch of contracted equipment is packed. If 3 Technical Support
the personnel of the buyer find that the equipment is defective, does not comply with the
specifications stipulated in the contract, or the P/L is inconsistent with the actual goods, they 4 Cyber Security
have the right to report this to relevant personnel.
Huawei takes all feedback seriously and takes the necessary measures to meet the 5 Security Vulnerability Management
requirements specified in the contract within a reasonable period of time. If the buyer does
not assign personnel to perform factory inspection, it is deemed that the buyer accepts 6 Appendix
Huawei's management procedures for manufacturing and packaging before delivery.
Huawei will pack and ship goods according to its own management regulations and
procedures. The delivery records in the corresponding system of Huawei can be used as the
basis for handling subsequent disputes if any.
DOA
Huawei accepts only the cargo issue applications submitted by partners who directly
conduct transactions (distributors and VAPs) with Huawei. Other partners should contact
Huawei's distributors for their cargo issues.
Attention DOA can only be claimed within 30 days after the warranty starts. 1 Goods Acceptance
Acceptance Conditions
A warranty period starts ninety (90) days after the date of Huawei's shipment or the first time
Cargo Issue Handling
application of the warranty service, whichever is earlier. The start date of a warranty period
shall not be later than ninety (90) days after the date of shipment by Huawei. DOA Status Query
Test products and sample devices are not included in the claim scope. License Distribution
Ensure that the original package is not damaged. If the whole device needs to be replaced, a 2 Installation and Implementation
complete delivery list must be provided.
Ensure that all seals on the host machine are intact, all labels on the machine are complete, 3 Technical Support
and the hardware, pre-installed software (operating system) and drives are the original ones.
4 Cyber Security
Required Information
No. Information 5 Security Vulnerability Management
1 TAC entitlement SR No.
6 Appendix
2 Equipment SN and/or board barcode
4 Date of fault
Fault symptom description (avoid only using the word "fault" and use specific
5
terms)
6 Huawei sales contract number
7 Site
1.2 CARGO ISSUE HANDLING
HANDLING PROCEDURES
A distributor or VAP reports a cargo issue to a Huawei TAC by referring to Create Service
Request.
1 Goods Acceptance
If the TAC determines that the issue is DOA, the TAC will transfer the issue to the DOA
contact person of the rep office. Acceptance Conditions
If the TAC determines that the issue is not DOA, the distributor or VAP should directly Cargo Issue Handling
contact the DOA contact person of the rep office.
DOA Status Query
After confirming relevant information with the distributor or VAP, the DOA contact person of
License Distribution
the rep office will submit the application in the system, and the supply chain will arrange the
replacement and delivery. 2 Installation and Implementation
After receiving the new equipment, the distributor or VAP will verify the goods, sign the POD,
and deliver the new equipment to the contracted channel partners. The contracted channel 3 Technical Support
partner will send the equipment to the end customer.
4 Cyber Security
RETURN PROCEDURES
5 Security Vulnerability Management
Properly pack defective parts, confirm the issue with the local DOA contact of Huawei, and
send the parts to a Huawei-designated warehouse. 6 Appendix
According to contract terms and conditions, defective parts shall be returned within 15
working days. If they are not returned before the due date for partner reasons, Huawei will
regard the situation as a violation according to relevant channel policies and agreements.
Return: Defective parts shall be returned to Huawei within 10 working days after the
replenished products are received.
1.3 DOA STATUS QUERY
Log in to ePartner and query the DOA status on the Service tab.
3 Technical Support
4 Cyber Security
6 Appendix
Click here to obtain Channel Partner Online Manage Software License Instruction (Tier-1 partner
and Tier-2 partner).
2 INSTALLATION AND IMPLEMENTATION
Service Preparation
Solution Implementation
Handover and Closure
3 Technical Support
4 Cyber Security
6 Appendix
Huawei eISDP is a project management tool for improving delivery quality and CSAT.
Through eISDP, you can:
• Obtain BOQs, delivery status, and packing lists (P/Ls) of partner POs.
• Obtain technical support from a Huawei TAC for installation and implementation.
• Manage projects in a visualized way.
1 Goods Acceptance
• Obtain the CSAT survey results about partners' installation and implementation
services. 2 Installation and Implementation
Service Preparation
6 Appendix
2.1 SERVICE PREPARATION
2.1.1 SERVICE PLAN COMMUNICATION
Action Confirm the project plan and acceptance criteria with the customer.
1 Goods Acceptance
Reach consensus with the customer on the project plan and arrangements through methods 2 Installation and Implementation
such as keeping meeting minutes. The consensus may include:
Service Preparation
• Estimated delivery time.
Solution Implementation
• Installation and implementation plan, as well as technical resource arrangements.
Handover and Closure
• Delivery items and scope of work (SOW).
• Acceptance criteria. 3 Technical Support
4 Cyber Security
6 Appendix
2.1.2 SOLUTION CONFIRMATION
Communicate with the customer's technical personnel to become familiar with the customer's 1 Goods Acceptance
technical environment (such as network topology), integrated commissioning requirements
(such as the application environment and client environment), as well as cyber security 2 Installation and Implementation
requirements (such as the penetration test and network management system (NMS) access).
Service Preparation
Reach consensus with the customer's technical personnel on the design solution,
Solution Implementation
implementation plan, and quality criteria.
Handover and Closure
3 Technical Support
Action Mitigate high risks in operations.
4 Cyber Security
Check if the installation and implementation plan involves high-risk operations (see
Appendix II High-Risk Operation Scenarios), apply for technical support from a Huawei TAC 5 Security Vulnerability Management
through Service Request on the eISDP homepage, and develop mitigation measures.
6 Appendix
Confirm high-risk operations with the customer in advance, and reach an agreement with the
customer on installation and implementation along with mitigation measures, including:
• Possible impacts on business
• Service time and duration
• Operational risks and rollback plan
Action Confirm the customer's requirement for a penetration test.
Confirm the penetration test requirement with the customer and incorporate them into the
project plan.
Apply for technical support from a Huawei TAC through Service Request on the eISDP 1 Goods Acceptance
homepage to obtain the remediation solution.
2 Installation and Implementation
Service Preparation
Action Prepare all necessary materials and tools for the service.
Solution Implementation
Handover and Closure
Prepare the following before visiting the customer's site.
3 Technical Support
Confirm high-risk operations with the customer in advance, and reach an agreement with the
customer on installation and implementation along with mitigation measures, including:
4 Cyber Security
General materials: personal identification (ID) document, laptop, certificate to enter and
exit the customer's production environment (if involved), as well as technical 5 Security Vulnerability Management
document(s) and operation manual(s) related to onsite services.
Hardware service tools: tools needed for hardware installation, such as a screwdriver, 6 Appendix
an ESD wrist strap, as well as serial and network cables required for device operation.
Software packages, software licenses, and utility tools: upgrade software packages,
software licenses, and utility tools downloaded from Huawei's official website.
Onsite service report: pre-printed onsite service report.
Prior to visiting the customer's site, confirm the arrival time in advance. In case of late arrival,
inform the customer in a timely manner.
2.1.3 AUTHORIZATION
Action Obtain authorization for the installation and implementation service.
Obtain the customer's permission or authorization (by writing or email) before using your
1 Goods Acceptance
laptop to access the customer network. You may need permission or authorization for
customer data center (DC) access, device access, data collection, and device operation
2 Installation and Implementation
(see Appendix III Customer Network Access and Data Processing Authorization Form).
Service Preparation
Before accessing the customer network, scan your laptop for viruses (using the antivirus
Solution Implementation
software required by the customer if any) to ensure customer network security.
Handover and Closure
Comply with the customer's DC management requirements and device installation
specifications, and perform operations according to the implementation solution and product 3 Technical Support
operation guide.
4 Cyber Security
6 Appendix
2.2 SOLUTION IMPLEMENTATION
2.2.1 ONSITE NOTICE
Ensure that you carry necessary tools, certificates, and spare parts for onsite reporting. 2 Installation and Implementation
Arrive at the designated place at the agreed time. In case of late arrivals due to special Service Preparation
reasons, notify the customer in time.
Solution Implementation
After arriving at the site, report to the customer and communicate with the customer about Handover and Closure
the acceptance criteria and arrangements.
3 Technical Support
Confirm the onsite environment, such as the place where goods are received, transportation 1 Goods Acceptance
channel, equipment room space, and auxiliary power supply.
Accept the goods together with the customer. The equipment signed by the customer should 2 Installation and Implementation
match with Service Preparation
• The P/L; and Solution Implementation
• The BOQ in the contract Handover and Closure
In the case of DOA, refer to the DOA process in Section 5.1.3 .
3 Technical Support
4 Cyber Security
6 Appendix
2.2.3 QUALITY CHECK
Refer to the Huawei Software and Hardware Installation Quality Criteria and Check Template. 1 Goods Acceptance
Make improvement for items that do not meet requirements.
2 Installation and Implementation
Service Preparation
Solution Implementation
Handover and Closure
3 Technical Support
4 Cyber Security
6 Appendix
2.3 HANDOVER AND CLOSURE
2.3.1 KNOWLEDGE TRANSFER
Action Complete project summary, knowledge transfer, and deliverable handover.
Provide technical support contacts. 1 Goods Acceptance
Invite the customer's project director and stakeholders to hold a summary meeting to 2 Installation and Implementation
both introduce the project results and listen to the customer's comments. Service Preparation
Solution Implementation
TRANSFER PRODUCT AND MAINTENANCE KNOWLEDGE
Handover and Closure
Basic device functions: modules, features, warnings, and more.
Precautions for routine maintenance: basic configuration, log collection, view and 3 Technical Support
transfer modes, precautions for hardware replacement, and more.
4 Cyber Security
HAND OVER PROJECT MATERIALS
Product and technology materials 5 Security Vulnerability Management
Service Preparation
Action Invite the customer to sign the project acceptance report.
Solution Implementation
Handover and Closure
After project handover and closure, invite the customer to sign the project acceptance report.
3 Technical Support
4 Cyber Security
6 Appendix
2.3.2 CSAT SURVEY
Action Conduct the CSAT survey.
Enter customer information of the project, and begin the CSAT survey. 1 Goods Acceptance
View the CSAT survey result, for low-scores, work with Huawei's channel service manager to
2 Installation and Implementation
develop measures for service quality improvement.
Service Preparation
If the customer does not agree to enter their personal information in Huawei's eISDP system, Solution Implementation
the partner can ask the customer to provide feedback on the satisfaction survey form (see
Handover and Closure
Attachment VIII Huawei Enterprise Customer Satisfaction Survey Form) and send the form to
Huawei's channel service manager for registration in eISDP. 3 Technical Support
4 Cyber Security
6 Appendix
3 TECHNICAL SUPPORT
Technical support services of a partner refer to the partner-branded technical support
services sold and delivered by the partner to customers. Meanwhile, the partner purchases
Co-Care services from Huawei to obtain Huawei's technical support and spare parts.
Generally, to receive technical support, customers will contact the partner by hotline or email. 1 Goods Acceptance
When a partner engineer encounters a major or severe incident that impacts the normal
operation of the customer's services or the fault cannot be located, the engineer must 2 Installation and Implementation
immediately apply for technical support from a Huawei TAC.
3 Technical Support
TACs: Global Service Hotline and Email Handle Customer Service Requests
Technical support website: Huawei Enterprise Technical Support Obtain Huawei's Technical Support
6 Appendix
3.1 HANDLE CUSTOMER SERVICE REQUESTS
A successful technical support process normally includes the following activities: gathering
customer SRs, matching SRs against entitlements, responding quickly, and following up on
resolutions.
1 Goods Acceptance
3.1.1 ACCEPT A CUSTOMER SR
2 Installation and Implementation
You can use the following template when confirming the customer SR via email: 5 Security Vulnerability Management
This is Engineer Name from Partner Company Name. I received your service
request and will handle your technical issue. Please provide the following
information to assist troubleshooting.
Customer Name:
Problem Summary Product model and serial number:
Technical issue summary:
Symptom:
Business impact:
Information Symptom: 1 Goods Acceptance
collection OS and firmware version:
Key event/operation before the problem occurs: 2 Installation and Implementation
Attached logs
Expected resolution 3 Technical Support
Please fill your expecting resolution time to me
time Handle Customer Service Requests
Obtain Huawei's Technical Support
On-site Services
Action Record the customer SR.
Handle Severe Incidents
High-Risk Operations
Effective customer service request management across all delivery channels is
fundamental to support effective delivery. The partner service organization has well-defined 4 Cyber Security
processes that are applied consistently.
Create customer SRs on the partner's customer SR management platform, and ensure 5 Security Vulnerability Management
that all appropriate information is gathered, including:
6 Appendix
Customer identification: Confirm the customer identity and contact information.
Entitlement verification: Check if the customer is entitled to receive support.
Problem description: Record details of the customer’s problem (each SR captures
exactly one issue).
Customer contact closure: Inform the customer of the next step and estimated time.
Severity: Categorize the severity of the issue, and inform the customer.
Equipment or software profile: Identify the model number or software version, any variations
in the configuration, and the service history of this equipment or software installation.
If a customer SR management platform is not available, record the customer SR in a data
table.
1 Goods Acceptance
3.1.2 SLA
2 Installation and Implementation
Response time refers to the duration from when a partner engineer accepts a customer SR
to when the partner engineer contacts the customer for the first time and starts providing 3 Technical Support
technical support services.
Handle Customer Service Requests
The following are response suggestions for customer SRs:
Obtain Huawei's Technical Support
When the technical service contract signed by and between the partner and the On-site Services
customer includes the SLA: Comply with the SLA. Handle Severe Incidents
When the technical service contract signed by and between the partner and the High-Risk Operations
customer does not include the SLA, or the partner and the customer do not sign a
technical support contract: Refer to the SLA requirements of Hi-Care service products. 4 Cyber Security
Upon receiving a customer SR, quickly provide a solution for the customer based on logs, 2 Installation and Implementation
alarms, and configurations, for example.
3 Technical Support
Handle Customer Service Requests
Action Check if resolution involves any high-risk operations. Obtain Huawei's Technical Support
On-site Services
Check if the resolution involves any high-risk operations (see Appendix II High-Risk
Operation Scenarios). If high-risk operations are involved, apply for technical support from a Handle Severe Incidents
Huawei TAC. High-Risk Operations
4 Cyber Security
You can use the following template when providing solutions to the customer via email: 6 Appendix
Dear Customer Company Name,
Here is the problem analysis and resolution.
Problem Description
Problem Analysis
1 Goods Acceptance
Root Cause
2 Installation and Implementation
Resolution Description
When applying the steps, if you encounter any problems or need technical assistance 3 Technical Support
during operations, please contact me. Handle Customer Service Requests
Email: xxx Obtain Huawei's Technical Support
Phone: xxx
On-site Services
Kind regards, Handle Severe Incidents
Name
High-Risk Operations
Update the customer SR on the customer SR management platform in a timely manner, 5 Security Vulnerability Management
addressing:
6 Appendix
• Problem analysis
• Root cause
• resolution
If a customer SR management platform is not available, record the customer SR in a data
table.
Attention Obtain technical support from a Huawei TAC.
Contact a Huawei TAC for technical support if you cannot resolve the customer SR.
If the customer does not reply within 30 days, you can use the following email template to
notify the customer to close the SR.
I provided a resolution on MM/DD/YYYY, however; I have not received your reply for more 2 Installation and Implementation
than 30 days. Please confirm if the technical issue has been resolved, if not, I will close the
SR within x working days.
3 Technical Support
You can contact me at any time to restart your SR. Handle Customer Service Requests
Thank you for your support. Obtain Huawei's Technical Support
Kind regards, On-site Services
Name
Handle Severe Incidents
High-Risk Operations
Close the customer SR on the customer SR management platform in a timely manner, 5 Security Vulnerability Management
including:
6 Appendix
• Resolution implementation result
• Record if the problem has been resolved
• Record if there any pending issues
If a customer SR management platform is not available, record the customer SR in a data
table.
3.1.5 BACKLOG MANAGEMENT
A partner may build a process to keep customer service requests backlog to a minimum,
targeting service requests that are not progressing properly rather than attempting to close
service requests prematurely.
1 Goods Acceptance
3.1.6 ESCALATION MANAGEMENT
2 Installation and Implementation
At times, partner engineers cannot meet customer demands and service requests fail to
reach a resolution. Partner engineers have to escalate to partner's service management 3 Technical Support
team.
Handle Customer Service Requests
The escalation needs to state whether it was requested by the customer or initiated
Obtain Huawei's Technical Support
proactively by the partner engineer, and must include corresponding stakeholders.
On-site Services
Handle Severe Incidents
3.1.7 QUALITY MONITORING
High-Risk Operations
Partners are suggested to regularly monitor service quality and use the outcome to train
partner engineers. 4 Cyber Security
To ensure consistency, partners may use a standard scorecard to rate the quality of the
monitoring session. It includes processes, customer handling skills, as well as technical 5 Security Vulnerability Management
skills and satisfaction.
6 Appendix
The quality monitors give feedback to the partner engineers with the goal of improving future
performance, and they are regularly compared to ensure consistency.
3.2 OBTAIN HUAWEI'S TECHNICAL SUPPORT
At times, partners cannot meet customer requirements and service requests fail to reach a
resolution. Partner engineers are suggested to obtain technical support from Huawei TAC,
due to the following reasons:
• Insufficient technical capabilities of partner engineers 1 Goods Acceptance
• The troubleshooting progress cannot meet customer expectations
2 Installation and Implementation
• Product hardware and software problems
• Lack of technical documents 3 Technical Support
Handle Customer Service Requests
3.2.1 CREATE A PARTNER SR
Obtain Huawei's Technical Support
EMAIL
On-site Services
Handle Severe Incidents
Action Create an SR via email.
High-Risk Operations
Send an email to a Huawei TAC to create an SR by using the following template: 4 Cyber Security
This is Engineer Name from Partner Company Name. I received one service request from
6 Appendix
my customer, and we need Huawei to be involved and investigate it.
This is the problem detail information, please refer to the following table and help me create
one ticket.
Thank you very much!
Dear Customer Company Name,
Here is the problem analysis and resolution.
Problem Description
Serial Number 1 Goods Acceptance
Organization
2 Installation and Implementation
Name
Phone Number 3 Technical Support
I understand that Huawei reserves the right to survey customers on partner's service 5 Security Vulnerability Management
delivery. I hereby agree and provide my customer business contact below:
6 Appendix
Email: xxx
Phone: xxx
Kind regards,
Name
Attention Provide the customer's email address for a CSAT survey.
Huawei thanks the partner for providing the customer's email address. This information will
be used only by the Huawei TAC to survey CSAT with the partner's technical support
services.
1 Goods Acceptance
The following table lists the regions and public email addresses supported by Huawei TAC.
2 Installation and Implementation
Huawei TAC Email Covered Region and Country
3 Technical Support
CEE & Nordic European
West European Handle Customer Service Requests
Romania TAC EUsupport@huawei.com
Australia/New Zealand Obtain Huawei's Technical Support
Japan/Korea On-site Services
Southern Pacific (Except Australia Handle Severe Incidents
and New Zealand)
Malaysia TAC APsupport@huawei.com High-Risk Operations
Southern-East Asia (Except Japan
and Korea) 4 Cyber Security
Mexico TAC Lasupport@huawei.com Latin America
5 Security Vulnerability Management
Middle East
Egypt TAC MEAsupport@huawei.com Southern Africa
6 Appendix
Northern Africa
Russia TAC CISsupport@huawei.com Eurasia
HOTLINE
Fully understand the resolution provided by the Huawei TAC, check that it is effective and
provide it to the customer as a partner-branded resolution (see Section 2.1.3).
1 Goods Acceptance
Notify Huawei of the implementation results using the following email template:
3 Technical Support
Handle Customer Service Requests
Dear Huawei TAC,
Obtain Huawei's Technical Support
I have received confirmation from the customer on Huawei's SR xxxxxx (the resolution has
been implemented, and technical issues have been resolved. No new problem has been On-site Services
identified, and related business has been recovered). Handle Severe Incidents
Please close my SR. High-Risk Operations
Thank you for your support.
4 Cyber Security
Kind regards,
Name 5 Security Vulnerability Management
6 Appendix
3.2.3 SPARE PARTS SERVICES
SERVICE SCOPE
A spare part is a minimum field replaceable unit (FRU) for maintenance when the equipment
sold by Huawei and running on the network is damaged. It provides replacement and repair
services for such equipment. 1 Goods Acceptance
Huawei provides spare parts services based on the warranty contents and clauses of the
equipment or the service contract. 2 Installation and Implementation
If a partner purchases Huawei's Co-Care services, the partner is the entity that applies for
3 Technical Support
spare parts services and returns defective parts. If a customer purchases Huawei's Hi-Care
services, the customer is the entity that applies for spare parts services and returns spare Handle Customer Service Requests
parts. Obtain Huawei's Technical Support
On-site Services
APPLY FOR SPARE PARTS
Handle Severe Incidents
Partner engineers may create an SR through a Huawei TAC to obtain spare parts services.
High-Risk Operations
Provide the following information based on the Huawei RMA Application Form:
• Equipment SN 4 Cyber Security
• Barcode of the Defective Part (if involved)
• Delivery Address 5 Security Vulnerability Management
• Spare Parts Receiving Contact
The Huawei TAC will deliver spare parts according to the warranty terms or SLA in the 6 Appendix
service contract if the following two conditions are met:
• The Huawei TAC confirms that hardware replacement is necessary.
• The equipment warranty or service contract has not expired and includes spare parts
services.
RECEIVE SPARE PARTS
The spare parts status may be queried based on the ticket number.
Link: https://support.huawei.com/rmaweb/en/rma
The recipient needs to sign the POD when receiving spare parts. If the recipient cannot
receive the spare parts in person due to objective reasons, the person who receives them on
1 Goods Acceptance
behalf of the recipient must show his/her identity to the courier.
2 Installation and Implementation
RETURN DEFECTIVE PARTS
Defective parts must be returned promptly. Properly pack the defective parts and mark the 3 Technical Support
ticket number in a prominent position on the outer package. Handle Customer Service Requests
Hi-Care Repair Services: Huawei will arrange spare parts delivery after receiving defective Obtain Huawei's Technical Support
parts.
On-site Services
Advance Replacement Option: Huawei will deliver spare parts first. A partner engineer is
Handle Severe Incidents
required to return the defective parts to a Huawei-designated warehouse within 15 working
days after receiving the new parts. If defective parts are not returned before the due date for High-Risk Operations
partner reasons, Huawei will regard the situation as a violation according to relevant channel
policies and agreements. 4 Cyber Security
• If the service contract clauses include defective parts pick-up, Huawei will arrange the
5 Security Vulnerability Management
pick-up. If pick-up is not included, the partner engineer should arrange the return of
the defective parts.
6 Appendix
• If the equipment includes a defective part retention service, the customer or partner
can retain the defective parts.
3.3 ON-SITE SERVICES
• The technical support service contract signed by and between the partner and the 1 Goods Acceptance
customer includes on-site services (check if the service contract includes the SLA).
2 Installation and Implementation
• The technical support service contract signed by the partner and the customer does
not include on-site services, however; the customer requires on-site services and the 3 Technical Support
partner agrees to provide such services.
Handle Customer Service Requests
The content for negotiation should include the purpose and content of on-site services.
Obtain Huawei's Technical Support
Negotiate with the customer to determine the on-site service implementation time (avoid On-site Services
service peak hours and sensitive times), and suggest a possible arrival time. Allow time to
communicate with the customer regarding the implementation plan. Handle Severe Incidents
High-Risk Operations
4 Cyber Security
Action Confirm on-site service arrangements with the customer.
5 Security Vulnerability Management
You can use the following template when confirming on-site service arrangements with the
customer via email:
6 Appendix
Dear Customer Company Name,
This is Engineer Name from Partner Company Name. For the on-site service request you
submitted on MM/DD/YYYY, as communicated, I will arrive at the site at HH:MM on
MM/DD/YYYY and provide the following technical services:
Product model xxxx
SN 1234567890 1 Goods Acceptance
Scopes xxxx
2 Installation and Implementation
Please reserve the service window and provide any necessary assistance. If you have any
other requests, feel free to contact me.
3 Technical Support
My contacts:
Handle Customer Service Requests
Email:
Phone: Obtain Huawei's Technical Support
On-site Services
Kind regards,
Name Handle Severe Incidents
High-Risk Operations
If the customer does not reply in time, contact the customer by phone to confirm the on-site
service arrangements. 4 Cyber Security
Update the customer SR management platform progress in a timely manner, covering: 6 Appendix
Arrive at the designated place on time. In case of delay, inform the customer in a timely
5 Security Vulnerability Management
manner.
6 Appendix
Action Upon arrival, report to the customer.
After arriving at the site, report to the customer, communicate with the customer about the
service plan again, obtain the customer's permission, and have the customer sign the on-site
service application (see Appendix V On-site Technical Service Report).
On-site Technical Service Application
Dear Customer,
We will provide the technical support service to promptly resolve technical issues and/or mitigate risks
of the above product. Please approve the application and provide assist properly.
We suggest that the customer should make a backup of relevant system data, business data prior
making any operation on product. Please check whether you have completed the backup.
□ Yes □ No 1 Goods Acceptance
Service Content:
2 Installation and Implementation
3 Technical Support
I (Customer) have fully understood the above precautions and the service content, impacts and risks, Handle Customer Service Requests
and have arranged relevant operation to be performed in non-peak hours as much as I can. For
operations requiring power-off, I (Customer) have applied for the down time and completed relevant
Obtain Huawei's Technical Support
preparations. I (Customer) agree to start the above services.
On-site Services
Customer (Signature) ______________________ Date _____________ Handle Severe Incidents
4 Cyber Security
If the customer signs the on-site service application, it means that the partner engineer has 5 Security Vulnerability Management
obtained the customer's permission for device or software operation and the authorized
service account. 6 Appendix
Note that the on-site service application is part of the on-site service report.
Assist the customer in data backup.
Before accessing the customer network, scan your laptop for viruses (using the antivirus
software required by the customer if any) to ensure customer network security.
Comply with the customer's equipment room management requirements.
Deploy the resolution by strictly following the solution and product operation manual. 2 Installation and Implementation
3 Technical Support
Handle Customer Service Requests
Action Confirm that the technical issue has been resolved.
Obtain Huawei's Technical Support
On-site Services
Check if the technical issue has been resolved based on the solution content, and product
and solution knowledge. Handle Severe Incidents
Invite the customer to jointly verify if the technical issue has been resolved and if related High-Risk Operations
business has been recovered.
4 Cyber Security
6 Appendix
Dear Customer,
We have completed the technical support service as required. Please assess result. We value your
feedback and suggestions. Thank you!
Comments:
1 Goods Acceptance
3.4.1 DEFINITION
Incidents are events relating to Huawei products that severely affect the operations of
customers' services and cause significant losses to customers' benefits or reputation. 1 Goods Acceptance
Resources need to be immediately utilized for handling (recovery and customer care) of
these incidents. 2 Installation and Implementation
For incidents in which the service request severity is at P1 or P2, contact a Huawei TAC
immediately for troubleshooting and recovery. 3 Technical Support
For the complete definition of service request severity, see Appendix I Service Request Handle Customer Service Requests
Severity Definition. Obtain Huawei's Technical Support
Contact Huawei TAC Hotlines On-site Services
Handle Service Incidents
3.4.1 RECOVERY
High-Risk Operations
Arrive at the customer's site in a timely manner.
4 Cyber Security
WHEN HUAWEI REMOTELY ACCESSES THE CUSTOMER NETWORK
• Obtain the customer's authorization for Huawei's remote access. (For details, see 5 Security Vulnerability Management
Appendix III Customer Network Access and Data Processing Authorization Letter and
Appendix IV Customer Network Data Processing Authorization Letter.) 6 Appendix
• Assist Huawei to remotely resolve issues.
• Confirm the result of the implementation with the customer.
• After issue recovery, assist the customer to continuously observe the running status
of the device. In case of any issues, promptly contact Huawei.
WHEN HUAWEI CANNOT REMOTELY ACCESS THE CUSTOMER NETWORK
• Collect fault location information as required by a Huawei TAC.
• Implement the resolution under the guidance of the Huawei TAC.
• Confirm the result of the implementation with the customer.
• Assist the customer in continuously observing the running status of the device. In 1 Goods Acceptance
case of any issues, promptly notify Huawei.
2 Installation and Implementation
WHEN HARDWARE NEEDS TO BE REPLACED
3 Technical Support
• Replace the hardware.
Handle Customer Service Requests
• Confirm details of the replacement with the customer.
Obtain Huawei's Technical Support
• Help the customer continuously observe the running status of the device. In case of
any issues, promptly contact Huawei. On-site Services
Handle Severe Incidents
3.5 HIGH-RISK OPERATIONS High-Risk Operations
Check if the resolution to be implemented is a high-risk operation in advance. High-risk
4 Cyber Security
operations are identified by matching the following two items (see Appendix II High-Risk
Operation Scenarios).
5 Security Vulnerability Management
• Customer product type
• Technical support service content 6 Appendix
If the customer's product model does not match the content in Appendix II, or you need to
know the operational risk of the resolution, promptly contact a Huawei TAC for confirmation.
If a partner needs Huawei to review the resolution and provide on-site support, the partner
can purchase the network change support service from Huawei in advance.
4 Security Advisories and Notices
It is advised that employees who do not pass the exam or receive the enablement training Access to Customer Networks
should not deliver technical services to customers. Customer Data Processing
Account Management
6 Appendix
4.3 CUSTOMER SECURITY REGULATIONS
You must comply with customers' regulations, requests, and contract terms when
conducting service activities, including network access operations, personal data processing,
and data transfer. 1 Goods Acceptance
Ensure you are authorized by customers before entering or leaving customer equipment
2 Installation and Implementation
rooms, network management centers, office areas, and high security areas (such as
government agencies and military), and comply with relevant management regulations.
3 Technical Support
Do not use tools for data collection and performance analysis in customer networks without 6 Appendix
the customers' written authorization.
4.5 ACCESS TO CUSTOMER NETWORKS
Identify customers who prohibit remote access to their networks. Do not remotely access the 2 Installation and Implementation
networks of these customers.
3 Technical Support
Before accessing customer networks, obtain written authorization from customers and
specify the purpose, scope, and time limit of services. Do not perform any operations that
4 Cyber Security
are not approved by the customer.
Laws and Regulations
Do not leak or disseminate data and information in the customer's networks. Do not use the
information and data of the customer's systems for personal gain or for other illegal Capability Development and
purposes. Management
Before connecting computers, terminals, and storage media to customer networks, scan for 1 Goods Acceptance
and remove viruses to ensure that no malicious software or virus exists.
2 Installation and Implementation
4 Cyber Security
The remote access environment must be manageable, monitorable, and traceable. When
remote services are complete, notify the customer to end the remote service on the device Laws and Regulations
side and remind the customer to promptly update the login account, login password, login Capability Development and
address, and dial-in number used during the remote service. Management
6 Appendix
4.6 CUSTOMER DATA PROCESSING
Before processing customer network data (including personal data), obtain written 2 Installation and Implementation
authorization from the customer and determine the processing scope. Without the
customer's written authorization, do not access customer systems (remotely or on site) or 3 Technical Support
collect, transfer, modify, store, hold, process, or use any data or information in the customer
network. 4 Cyber Security
Do not access or process communication content or personal data that violates user privacy, Laws and Regulations
such as voice files, short messages, precise location information, and keystroke logs. Capability Development and
Personal data should be anonymized before being exported. Do not use information and Management
data on a customer's system for personal gains or other unlawful purposes.
Customer Security Regulations
Without the customer's written authorization, do not take equipment or storage media that Software
contain data (including personal data) about the customer network out of the customer's
Access to Customer Networks
premises.
Customer Data Processing
When the customer's authorization expires or the task is complete, delete and destroy the
Account Management
customer network data.
5 Security Vulnerability Management
6 Appendix
Action Obtain customer data processing authorization for Huawei.
When a partner engineer seeks service support from Huawei and needs Huawei services to
1 Goods Acceptance
process customer data, they must obtain the customer's official authorization. Without prior
authorization, Huawei cannot process customer data. The authorization documents must
2 Installation and Implementation
clearly show the customer's consent, such as an email reply or scanned copy of the
signature (see Appendix IV Customer Network Data Processing Authorization Letter).
3 Technical Support
4 Cyber Security
Action Delete data before returning parts.
Laws and Regulations
Capability Development and
If spare parts are returned or DOA is involved in onsite services, notify the customer of data Management
deletion, remind the customer to delete data, and confirm the deletion of customer data
stored in the parts. Before returning products or parts to Huawei, delete customer data Customer Security Regulations
stored in the products or parts, including end user data. Software
Access to Customer Networks
Customer Data Processing
Account Management
6 Appendix
4.7 ACCOUNT MANAGEMENT
Only use the account authorized by the customer to log in to the customer's devices. 2 Installation and Implementation
Without the customer's authorization, do not set any shared account or password, and do
3 Technical Support
not retain or use an administrator account or other unauthorized accounts.
Account permissions should be applied for based on the principle of least privilege. Confirm 4 Cyber Security
with the customer about appropriate permissions, and avoid applying for account
Laws and Regulations
permissions beyond the SOW.
Capability Development and
Do not share account and password information. Do not use customer accounts or Management
passwords to create or handle trouble tickets on Huawei's IT systems.
Customer Security Regulations
Software
Action Return the service account. Access to Customer Networks
Customer Data Processing
When a service is completed, return the account and password (including the administrator
Account Management
account) to the customer, and remind the customer to change the password or delete the
account.
5 Security Vulnerability Management
In case of changes in personnel, the access to the customer's systems and sites should be
canceled, and the held customer network data should be handed over to the customer or 6 Appendix
deleted.
5 SECURITY VULNERABILITY MANAGEMENT
5.1 OBLIGATIONS
Once discovering any security vulnerabilities related to Huawei products or services, make
best efforts to mitigate the security risks identified. Send an email to Huawei Product
1 Goods Acceptance
Security Incident Response Team (PSIRT) (PSIRT@huawei.com) as soon as possible and
cooperate with Huawei to investigate and handle the security vulnerabilities.
2 Installation and Implementation
Before the official release of Huawei Security Advisories (SAs), do not disclose, divulge to
any third party or otherwise make public the security vulnerabilities. 3 Technical Support
Provide end customers with Security Notices (SNs) and/or SAs on security vulnerabilities. 4 Cyber Security
In the case of a security incident, sincerely cooperate with Huawei to handle the incident
5 Security Vulnerability Management
and take necessary remedial measures
Obligations
High Profile Vulnerability
5.2 HIGH PROFILE VULNERABILITY Subscribe to Security Advisory
Huawei will proactively manage High Profile vulnerabilities. Security Vulnerability Handling
Huawei channel service managers will work with service partners to communicate with Partners' RFC
customers for identified the high profile vulnerabilities which the service contract for potential
affected equipment is Co-Care. 6 Appendix
Huawei will jointly develop the remediation with service partners and determine the
implementation responsibility together with customer.
5.3 SUBSCRIBE TO SECURITY ADVISORY
Subscribe to Security Advisory on the Huawei Support website. After subscription, you can
view SAs in My Subscriptions.
1 Goods Acceptance
Click My Subscription and Favorites to learn more.
2 Installation and Implementation
Learn about product SNs in relevant technical domains, stay up-to-date on security
vulnerability information, and support communication and handling of customer issues.
3 Technical Support
4 Cyber Security
5.4 SECURITY VULNERABILITY HANDLING
PROJECT DELIVERY 5 Security Vulnerability Management
At the early stage of project delivery, check whether the device models and versions to be Obligations
delivered have security vulnerabilities. High Profile Vulnerability
Once any security vulnerabilities are identified: Subscribe to Security Advisory
• If Huawei has released a relevant SA, implement the remediation proposed in the SA Security Vulnerability Handling
and check the outcome before the device goes online (if Huawei has released the
check tool). Partners' RFC
• If Huawei has not released a relevant SA, submit a service request indicating that it is
6 Appendix
related to cyber security to obtain technical support and advice from a Huawei TAC.
TECHNICAL SUPPORT
To obtain technical support and advice on security vulnerabilities and patch installation from
a Huawei TAC, submit a service request indicating that it is related to cyber security.
1 Goods Acceptance
If customer equipment managed by service partners (under Co-Care service contracts) has
security vulnerabilities with a handling priority of 1 or 2:
2 Installation and Implementation
• Huawei service partners should promptly communicate with customers to explain
security risks and remediation, reach an agreement with customers on the 3 Technical Support
arrangement of remediation, and produce the minutes.
• If service partners are responsible for implementing the remediation, they should 4 Cyber Security
submit a Request for Change (RFC) (indicating that it is related to cyber security) on
Huawei eCare platform, and apply for approval and change authorization from the 5 Security Vulnerability Management
customers after the RFC is reviewed and authorized by the rep office.
Obligations
5.5 PARTNERS' RFC High Profile Vulnerability
If service partners are responsible for implementing the remediation, they should submit an Security Vulnerability Handling
RFC to Huawei for approval: Partners' RFC
• Technical review
• Technical and management authorization 6 Appendix
• Customer authorization
Implement the remediation in strict compliance with the requirements. After the
implementation, upload the service report and close the RFC.
1 Goods Acceptance
3 Technical Support
4 Cyber Security
Obligations
High Profile Vulnerability
Subscribe to Security Advisory
Security Vulnerability Handling
Partners' RFC
6 Appendix
6 APPENDIX