Url / link stating IBM X-series hardware warranty terms & conditions

Posted on 2012-09-18
Last Modified: 2012-10-01
I recall HP, Cisco, IBM ever state in the hardware warranty contract tt if
customers were to move / mount (or meddle with) the hardware, this will
void the warranty (or at least the maintenance support will not cover the damage.

My end-customer disputed / doubted this : anyone has any IBM site
/ url that specify such terms?
Question by:sunhux
    LVL 14

    Accepted Solution

    It really is questionable about that statement.  It really depends on what the customer actually does to the equipment.  Just moving some hardware around will not void the warranty, but opening the case and possibly breaking any seals would void the warranty, but only if an IBM technician (on-site or depot) determines that the warranty is then void due to the customers actions/abuse.

    Link to an IBM .pdf about the terms and conditions:
    LVL 62

    Assisted Solution

    by:☠ MASQ ☠
    IIRC IBM warranties specifically allow end user replacement of removabe components such as memory and HDDs provided that they use IBM supplied parts and have these supplied under the warranty.

    EDIT - this is included in Tribus' link above - see "CRUs"
    LVL 55

    Assisted Solution

    You can also put third party equipment in them although the warranty for those parts is down to the manufacturer, not IBM. Would probably break competition/antitrust laws if you couldn't.

    Featured Post

    How your wiki can always stay up-to-date

    Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
    - Increase transparency
    - Onboard new hires faster
    - Access from mobile/offline

    Join & Write a Comment

    Suggested Solutions

    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    734 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    22 Experts available now in Live!

    Get 1:1 Help Now