92
<br /> Orange County August 8,2024
<br /> ASTRO25 Managed Detection and Response 24-177976/Cybersecurity Services
<br /> 2.4 Limitations and Exclusion
<br /> Managed Detection and Response does NOT include services to perform physical containment and/or
<br /> remediation of confirmed security incidents, remote or onsite. The Customer may choose to purchase
<br /> additional Incident Response professional services to assist in the creation of and/or execution of a
<br /> Customer's Incident Response Plan.
<br /> Motorola Solutions' scope of services does not include responsibilities relating to recovery of data
<br /> available through the products or services, or remediation or responsibilities relating to the loss of data,
<br /> ransomware, or hacking.
<br /> Motorola does not represent that it will identify, fully recognize, discover or resolve all security events or threats,
<br /> system vulnerabilities, malicious codes, files or malware, indicators of compromise or internal threats or concerns
<br /> NOTWITHSTANDING ANY PROVISION OF THE AGREEMENT TO THE CONTRARY, MOTOROLA WILL HAVE
<br /> NO LIABILITY FOR (A) INTERRUPTION OR FAILURE OF CONNECTIVITY, VULNERABILITIES, OR
<br /> SECURITY EVENTS; (B) DISRUPTION OF OR DAMAGE TO CUSTOMER'S OR THIRD PARTIES' SYSTEMS,
<br /> EQUIPMENT, OR DATA, INCLUDING DENIAL OF ACCESS TO USERS, OR SHUTDOWN OF SYSTEMS
<br /> CAUSED BY INTRUSION DETECTION SOFTWARE OR HARDWARE; (C)AVAILABILITY OR ACCURACY OF
<br /> ANY DATA AVAILABLE THROUGH THE SERVICES, OR INTERPRETATION, USE, OR MISUSE THEREOF;
<br /> (D)TRACKING AND LOCATION-BASED SERVICES; OR (E) BETA SERVICES
<br /> 2.4.1 Service Limitations
<br /> Cybersecurity services are inherently limited and will not guarantee that the Customer's system will be
<br /> error-free or immune to security breaches as a result of any or all of the services described in this
<br /> SOW. Motorola Solutions does not warrant or guarantee that this service will identify all cybersecurity
<br /> incidents that occur in the Customer's system. Services and deliverables are limited by, among other
<br /> things, the evolving and often malicious nature of cyber threats, conduct/attacks, as well as the
<br /> complexity/disparity and evolving nature of Customer computer system environments, including supply
<br /> chains, integrated software, services, and devices. To the extent we do offer recommendations in
<br /> connection with the services, unless otherwise stated in the statement of work, our recommendations
<br /> are necessarily subjective, may or may not be correct, and may be based on our assumptions relating
<br /> to the relative risks, priorities, costs and benefits that we assume apply to you.
<br /> 2.4.2 Processing of Customer Data in the United States and/or other
<br /> Locations
<br /> Customer understands and agrees that data obtained, accessed, or utilized in the performance of the
<br /> services may be transmitted to, accessed, monitored, and/or otherwise processed by Motorola
<br /> Solutions in the United States (US) and/or other Motorola Solutions operations globally. Customer
<br /> consents to and authorizes all such processing and agrees to provide, obtain, or post any necessary
<br /> approvals, consents, or notices that may be necessary to comply with applicable law.
<br /> 2.4.3 Customer and Third-Party Information
<br /> Customer understands and agrees that Motorola Solutions may obtain, use and/or create and use
<br /> anonymized, aggregated and/or generalized Customer data, such as data relating to actual and
<br /> potential security threats and vulnerabilities, for its lawful business purposes, including improving its
<br /> services and sharing and leveraging such information for the benefit of Customer, other customers, and
<br /> Statement of Work ®MOTOROLASOLv71ONS
<br /> Use or disclosure of this proposal is subject to the restrictions on the cover page.
<br /> Motorola Solutions Confidential Restricted
<br /> Page 2-8
<br />
|