Cyber Security Services Sample Clauses

Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. This Agreement and the SOW(s) set out items or actions to be accomplished by Customer. Customer will also assist or provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any SOW and this Agreement. Unless the applicable SOW states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify, or provide advice concerning any assumptions or Customer information, decisions, or approvals. Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.
Cyber Security Services. Where the Supplier is engaged to provide Cyber Security Services, the Supplier must comply with and meet with the cyber security requirements as set out in Schedule 3.
Cyber Security Services. 7.1. Any order of Cyber Security Services shall be made by the Customer to Tototheo in writing. 7.2. Tototheo shall not be held responsible for any malfunction or error or problem or interruption to any Cyber Security Product sold and/or provided to the Customer. The sole party responsible for such malfunction or error or problem or interruption to any Cyber Security Product sold to the Customer, shall be the manufacturer of the said Cyber Security Product. 7.3. Tototheo does not guarantee, represent or warrant that the use by the Customer of any purchased Cyber Security Product(s) will be uninterrupted, timely, secure or error-free.
Cyber Security Services. Description: Multi Supplier Framework Agreement for the provision of External ICT Technical Support Services (provided by a Team of ICT Resources) Internal identifier: 4
Cyber Security Services. Virus, Spyware and Malware Removal – This is limited to individual desktop, not network wide infection (of more than two computers). Data may be lost if not properly backed up.
Cyber Security Services. With the growth in cyber-attacks and data breaches costing business and the public sector millions every year, cybersecurity is high on the strategic agenda. By putting in place proper cybersecurity assessments, the Client organisation can define the right strategy and transformation program to protect the Client sensitive data and assets. Our cybersecurity consulting services gives the client insight into the Client security management with assessments of the Client sensitive data, critical infrastructures and applications. We work with the Client to define and implement the right strategy, target operating model and GRC structure. We ensure the client security design and operations support the client strategic objectives and business continuity. By planning ahead with a cybersecurity strategy as part of the client digital transformation journey, the client will be in a more confident position to stay compliant and achieve cost savings.
Cyber Security Services. 1.1 Cyber Security Services will be delivered and be billed as described in the relevant Order Form and Service Description. However, by default (in the absence of more specific provisions): (a) services that involve the monitoring of assets will be Ready for Service immediately preceding the time when a USM first receives logs from a Monitored Asset. (b) Professional Services will be delivered on terms that include (without limitation) the Professional Services SST and be billable as professional services according to the relevant Order Form. 1.2 MSP Software is used by Supplier in the performance of the Cyber Security Services, and the use and provision of such MSP Software shall be governed by Section 6 of these Service Specific Terms. 1.3 Supplier reserves the right to: (a) Conduct such operational tests as it consider necessary to assess the effective operation of the Cyber Security Services (b) modify or replace (including hardware or software) any part of the Supplier's System, its network, system configurations or routing configuration; or (c) modify or replace (including hardware or software) any Supplier Equipment used to deliver any Service at any time during the Service Term provided that such changes have no material adverse impact on the core features and functionality of the Cyber Security Services. If such changes will have a material adverse effect, Supplier shall propose a change in accordance with the Change Control Procedure. 1.4 Supplier has the right to use any technical information Client provides to Supplier for any reasonable business purpose during and after the Service Term (including without limitation, for product support, improvement and development). Client acknowledges that the MSP Software includes monitoring capability that sends anonymous statistics about performance, device utilisation and network size remotely to Supplier. Save to the extent required for the effective performance of the Cyber Security Services, Supplier will not use such technical information in a form that could in any way identify Client.
Cyber Security Services. Enterprise Security Data Protection Transaction Security Industrial Security

Related to Cyber Security Services

  • Security Services In performing the Services, the Agent shall properly comply at all times with, and perform all of, the Security Procedures.

  • Security Service Tenant acknowledges and agrees that, while Landlord may patrol the Project, Landlord is not providing any security services with respect to the Premises and that Landlord shall not be liable to Tenant for, and Tenant waives any claim against Landlord with respect to, any loss by theft or any other damage suffered or incurred by Tenant in connection with any unauthorized entry into the Premises or any other breach of security with respect to the Premises.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Mastectomy Services Inpatient

  • Party Services The Application may display, include or make available third-party content (including data, information, applications and other products services) or provide links to third-party websites or services. You acknowledge and agree that the Company shall not be responsible for any Third-party Services, including their accuracy, completeness, timeliness, validity, copyright compliance, legality, decency, quality or any other aspect thereof. The Company does not assume and shall not have any liability or responsibility to You or any other person or entity for any Third-party Services. You must comply with applicable Third parties' Terms of agreement when using the Application. Third-party Services and links thereto are provided solely as a convenience to You and You access and use them entirely at your own risk and subject to such third parties' Terms and conditions.

  • Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.

  • Education services 1.1 Catholic education is intrinsic to the mission of the Church. It is one means by which the Church fulfils its role in assisting people to discover and embrace the fullness of life in Xxxxxx. Catholic schools offer a broad, comprehensive curriculum imbued with an authentic Catholic understanding of Xxxxxx and his teaching, as well as a lived appreciation of membership of the Catholic Church. Melbourne Archdiocese Catholic Schools Ltd (MACS) governs the operation of MACS schools and owns, governs and operates the School. 1.2 Parents and guardians, as the first educators of their children, enter into a partnership with the Catholic school to promote and support their child’s education. Parents and guardians must assume a responsibility for maintaining this partnership by supporting the school in the provision of education to their children within the scope of School's registration and furthering the spiritual and academic life of their children.

  • Surgery Services This plan covers surgery services to treat a disease or injury when: • the operation is not experimental or investigational, or cosmetic in nature; • the operation is being performed at the appropriate place of service; and • the physician is licensed to perform the surgery. This plan covers reconstructive surgery and procedures when the services are performed to relieve pain, or to correct or improve bodily function that is impaired as a result of: • a birth defect; • an accidental injury; • a disease; or • a previous covered surgical procedure. Functional indications for surgical correction do not include psychological, psychiatric or emotional reasons. This plan covers the procedures listed below to treat functional impairments. • abdominal wall surgery including panniculectomy (other than an abdominoplasty); • blepharoplasty and ptosis repair; • gastric bypass or gastric banding; • nasal reconstruction and septorhinoplasty; • orthognathic surgery including mandibular and maxillary osteotomy; • reduction mammoplasty; • removal of breast implants; • removal or treatment of proliferative vascular lesions and hemangiomas; • treatment of varicose veins; or • gynecomastia.

  • Other Services At the request of the Fund, the Adviser in its discretion may make available to the Fund office facilities, equipment, personnel and other services. Such office facilities, equipment, personnel and services shall be provided for or rendered by the Adviser and billed to the Fund at the Adviser's cost.