Orange County NC Website
92 <br /> Orange County August 8,2024 <br /> ASTRO25 Managed Detection and Response 24-177976/Cybersecurity Services <br /> 2.4 Limitations and Exclusion <br /> Managed Detection and Response does NOT include services to perform physical containment and/or <br /> remediation of confirmed security incidents, remote or onsite. The Customer may choose to purchase <br /> additional Incident Response professional services to assist in the creation of and/or execution of a <br /> Customer's Incident Response Plan. <br /> Motorola Solutions' scope of services does not include responsibilities relating to recovery of data <br /> available through the products or services, or remediation or responsibilities relating to the loss of data, <br /> ransomware, or hacking. <br /> Motorola does not represent that it will identify, fully recognize, discover or resolve all security events or threats, <br /> system vulnerabilities, malicious codes, files or malware, indicators of compromise or internal threats or concerns <br /> NOTWITHSTANDING ANY PROVISION OF THE AGREEMENT TO THE CONTRARY, MOTOROLA WILL HAVE <br /> NO LIABILITY FOR (A) INTERRUPTION OR FAILURE OF CONNECTIVITY, VULNERABILITIES, OR <br /> SECURITY EVENTS; (B) DISRUPTION OF OR DAMAGE TO CUSTOMER'S OR THIRD PARTIES' SYSTEMS, <br /> EQUIPMENT, OR DATA, INCLUDING DENIAL OF ACCESS TO USERS, OR SHUTDOWN OF SYSTEMS <br /> CAUSED BY INTRUSION DETECTION SOFTWARE OR HARDWARE; (C)AVAILABILITY OR ACCURACY OF <br /> ANY DATA AVAILABLE THROUGH THE SERVICES, OR INTERPRETATION, USE, OR MISUSE THEREOF; <br /> (D)TRACKING AND LOCATION-BASED SERVICES; OR (E) BETA SERVICES <br /> 2.4.1 Service Limitations <br /> Cybersecurity services are inherently limited and will not guarantee that the Customer's system will be <br /> error-free or immune to security breaches as a result of any or all of the services described in this <br /> SOW. Motorola Solutions does not warrant or guarantee that this service will identify all cybersecurity <br /> incidents that occur in the Customer's system. Services and deliverables are limited by, among other <br /> things, the evolving and often malicious nature of cyber threats, conduct/attacks, as well as the <br /> complexity/disparity and evolving nature of Customer computer system environments, including supply <br /> chains, integrated software, services, and devices. To the extent we do offer recommendations in <br /> connection with the services, unless otherwise stated in the statement of work, our recommendations <br /> are necessarily subjective, may or may not be correct, and may be based on our assumptions relating <br /> to the relative risks, priorities, costs and benefits that we assume apply to you. <br /> 2.4.2 Processing of Customer Data in the United States and/or other <br /> Locations <br /> Customer understands and agrees that data obtained, accessed, or utilized in the performance of the <br /> services may be transmitted to, accessed, monitored, and/or otherwise processed by Motorola <br /> Solutions in the United States (US) and/or other Motorola Solutions operations globally. Customer <br /> consents to and authorizes all such processing and agrees to provide, obtain, or post any necessary <br /> approvals, consents, or notices that may be necessary to comply with applicable law. <br /> 2.4.3 Customer and Third-Party Information <br /> Customer understands and agrees that Motorola Solutions may obtain, use and/or create and use <br /> anonymized, aggregated and/or generalized Customer data, such as data relating to actual and <br /> potential security threats and vulnerabilities, for its lawful business purposes, including improving its <br /> services and sharing and leveraging such information for the benefit of Customer, other customers, and <br /> Statement of Work ®MOTOROLASOLv71ONS <br /> Use or disclosure of this proposal is subject to the restrictions on the cover page. <br /> Motorola Solutions Confidential Restricted <br /> Page 2-8 <br />