Common use of Cyber Security Services Clause in Contracts

Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. In addition to items or actions that may be set out in an applicable Ordering Document, Customer will assist, provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any applicable ordering document and this Cyber SSA. Unless an applicable ordering document states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify or provide advice concerning any assumptions or Customer information, decisions, or approvals. Cyber Security Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service

Appears in 3 contracts

Sources: Master Customer Agreement, Cyber Security Services Addendum, Cyber Security Services Addendum

Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. In addition to This Agreement and the SOW(s) set out items or actions that may to be set out in an applicable Ordering Document, accomplished by Customer. Customer will assist, also assist or provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any applicable ordering document SOW and this Cyber SSAAgreement. Unless an the applicable ordering document SOW states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify modify, or provide advice concerning any assumptions or Customer information, decisions, or approvals. Cyber Security Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.

Appears in 2 contracts

Sources: Cyber Security Services Agreement, Cyber Security Services Agreement

Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. In addition to This Addendum and the SOW(s) set out items or actions that may to be set out in an applicable Ordering Document, accomplished by DIR Customer. DIR Customer will assist, also assist or provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. DIR Customer will ensure that information DIR Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 DIR Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any applicable ordering document SOW and this Cyber SSAAddendum. Unless an the applicable ordering document SOW states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify modify, or provide advice concerning any assumptions or DIR Customer information, decisions, or approvals. Cyber Security Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 DIR Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and DIR Customer Data, including creation of operational workarounds, backups and redundancies. DIR Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. DIR Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or DIR Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to DIR Customer’s or a third party’s information systems, equipment, voice transmissions, data and DIR Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.

Appears in 1 contract

Sources: Addendum for Cyber Security Services