|
Orange County August 8, 2024
<br />ASTRO 25 Managed Detection and Response 24-177976 / Cybersecurity Services
<br />Statement of Work
<br />
<br />Use or disclosure of this proposal is subject to the restrictions on the cover page.
<br />Motorola Solutions Confidential Restricted
<br />
<br />Page 2-8
<br />2.4 Limitations and Exclusion
<br />Managed Detection and Response does NOT include services to perform physical containment and/or
<br />remediation of confirmed security incidents, remote or onsite. The Customer may choose to purchase
<br />additional Incident Response professional services to assist in the creation of and/or execution of a
<br />Customer’s Incident Response Plan.
<br />Motorola Solutions’ scope of services does not include responsibilities relating to recovery of data
<br />available through the products or services, or remediation or responsibilities relating to the lo ss of data,
<br />ransomware, or hacking.
<br />Motorola does not represent that it will identify, fully recognize, discover or resolve all security events or threats,
<br />system vulnerabilities, malicious codes, files or malware, indicators of compromise or internal threats or concerns
<br />NOTWITHSTANDING ANY PROVISION OF THE AGREEMENT TO THE CONTRARY, MOTOROLA WILL HAVE
<br />NO LIABILITY FOR (A) INTERRUPTION OR FAILURE OF CONNECTIVITY, VULNERABILITIES, OR
<br />SECURITY EVENTS; (B) DISRUPTION OF OR DAMAGE TO CUSTOMER’S OR THIRD PARTIES’ SYSTEMS,
<br />EQUIPMENT, OR DATA, INCLUDING DENIAL OF ACCESS TO USERS, OR SHUTDOWN OF SYSTEMS
<br />CAUSED BY INTRUSION DETECTION SOFTWARE OR HARDWARE; (C) AVAILABILITY OR ACCURACY OF
<br />ANY DATA AVAILABLE THROUGH THE SERVICES, OR INTERPRETATION, USE, OR MISUSE THEREOF;
<br />(D) TRACKING AND LOCATION-BASED SERVICES; OR (E) BETA SERVICES
<br />2.4.1 Service Limitations
<br />Cybersecurity services are inherently limited and will not guarantee that the Customer's system will be
<br />error-free or immune to security breaches as a result of any or all of the services described in this
<br />SOW. Motorola Solutions does not warrant or guarantee that this service will identify all cybersecurity
<br />incidents that occur in the Customer’s system. Services and deliverables are limited by, among other
<br />things, the evolving and often malicious nature of cyber threats, conduct/attacks, as well as the
<br />complexity/disparity and evolving nature of Customer computer system environments, including supply
<br />chains, integrated software, services, and devices. To the extent we do offer recommendations in
<br />connection with the services, unless otherwise stated in the statement of work, our recommendations
<br />are necessarily subjective, may or may not be correct, and may be based on our assumptions relating
<br />to the relative risks, priorities, costs and benefits that we assume apply to you.
<br />2.4.2 Processing of Customer Data in the United States and/or other
<br />Locations
<br />Customer understands and agrees that data obtained, accessed, or utilized in the performance of the
<br />services may be transmitted to, accessed, monitored, and/or otherwise processed by Motorola
<br />Solutions in the United States (US) and/or other Motorola Solutions operations globally. Customer
<br />consents to and authorizes all such processing and agrees to provide, obtain, or post any necessary
<br />approvals, consents, or notices that may be necessary to comply with applicable law.
<br />2.4.3 Customer and Third-Party Information
<br />Customer understands and agrees that Motorola Solutions may obtain, use and/or create and use
<br />anonymized, aggregated and/or generalized Customer data, such as data relating to actual and
<br />potential security threats and vulnerabilities, for its lawful business purposes, including improving its
<br />services and sharing and leveraging such information for the benefit of Customer, other customers, and
<br />Docusign Envelope ID: AD07CE02-1F94-4496-ABD0-D61F9CBE562C
|