Orange County NC Website
Orange County August 8, 2024 <br />ASTRO 25 Managed Detection and Response 24-177976 / Cybersecurity Services <br />Statement of Work <br /> <br />Use or disclosure of this proposal is subject to the restrictions on the cover page. <br />Motorola Solutions Confidential Restricted <br /> <br />Page 2-8 <br />2.4 Limitations and Exclusion <br />Managed Detection and Response does NOT include services to perform physical containment and/or <br />remediation of confirmed security incidents, remote or onsite. The Customer may choose to purchase <br />additional Incident Response professional services to assist in the creation of and/or execution of a <br />Customer’s Incident Response Plan. <br />Motorola Solutions’ scope of services does not include responsibilities relating to recovery of data <br />available through the products or services, or remediation or responsibilities relating to the lo ss of data, <br />ransomware, or hacking. <br />Motorola does not represent that it will identify, fully recognize, discover or resolve all security events or threats, <br />system vulnerabilities, malicious codes, files or malware, indicators of compromise or internal threats or concerns <br />NOTWITHSTANDING ANY PROVISION OF THE AGREEMENT TO THE CONTRARY, MOTOROLA WILL HAVE <br />NO LIABILITY FOR (A) INTERRUPTION OR FAILURE OF CONNECTIVITY, VULNERABILITIES, OR <br />SECURITY EVENTS; (B) DISRUPTION OF OR DAMAGE TO CUSTOMER’S OR THIRD PARTIES’ SYSTEMS, <br />EQUIPMENT, OR DATA, INCLUDING DENIAL OF ACCESS TO USERS, OR SHUTDOWN OF SYSTEMS <br />CAUSED BY INTRUSION DETECTION SOFTWARE OR HARDWARE; (C) AVAILABILITY OR ACCURACY OF <br />ANY DATA AVAILABLE THROUGH THE SERVICES, OR INTERPRETATION, USE, OR MISUSE THEREOF; <br />(D) TRACKING AND LOCATION-BASED SERVICES; OR (E) BETA SERVICES <br />2.4.1 Service Limitations <br />Cybersecurity services are inherently limited and will not guarantee that the Customer's system will be <br />error-free or immune to security breaches as a result of any or all of the services described in this <br />SOW. Motorola Solutions does not warrant or guarantee that this service will identify all cybersecurity <br />incidents that occur in the Customer’s system. Services and deliverables are limited by, among other <br />things, the evolving and often malicious nature of cyber threats, conduct/attacks, as well as the <br />complexity/disparity and evolving nature of Customer computer system environments, including supply <br />chains, integrated software, services, and devices. To the extent we do offer recommendations in <br />connection with the services, unless otherwise stated in the statement of work, our recommendations <br />are necessarily subjective, may or may not be correct, and may be based on our assumptions relating <br />to the relative risks, priorities, costs and benefits that we assume apply to you. <br />2.4.2 Processing of Customer Data in the United States and/or other <br />Locations <br />Customer understands and agrees that data obtained, accessed, or utilized in the performance of the <br />services may be transmitted to, accessed, monitored, and/or otherwise processed by Motorola <br />Solutions in the United States (US) and/or other Motorola Solutions operations globally. Customer <br />consents to and authorizes all such processing and agrees to provide, obtain, or post any necessary <br />approvals, consents, or notices that may be necessary to comply with applicable law. <br />2.4.3 Customer and Third-Party Information <br />Customer understands and agrees that Motorola Solutions may obtain, use and/or create and use <br />anonymized, aggregated and/or generalized Customer data, such as data relating to actual and <br />potential security threats and vulnerabilities, for its lawful business purposes, including improving its <br />services and sharing and leveraging such information for the benefit of Customer, other customers, and <br />Docusign Envelope ID: AD07CE02-1F94-4496-ABD0-D61F9CBE562C