Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. This Agreement and the SOW(s) set out items or actions to be accomplished by Customer. Customer will also assist or provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any SOW and this Agreement. Unless the applicable SOW states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify, or provide advice concerning any assumptions or Customer information, decisions, or approvals. Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.
Appears in 2 contracts
Samples: Cyber Security Services Agreement, Cyber Security Services Agreement
Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. This Agreement and the SOW(s) set out In addition to items or actions to that may be accomplished by Customer. set out in an applicable Ordering Document, Customer will also assist or assist, provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects.
2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any SOW applicable ordering document and this AgreementCyber SSA. Unless the an applicable SOW ordering document states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify, modify or provide advice concerning any assumptions or Customer information, decisions, or approvals. Cyber Security Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct.
2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.
Appears in 2 contracts
Samples: Cyber Security Services Addendum, Cyber Security Services Addendum
Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. This Agreement Addendum and the SOW(s) set out items or actions to be accomplished by DIR Customer. DIR Customer will also assist or provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. DIR Customer will ensure that information DIR Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects.
2.2 DIR Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any SOW and this AgreementAddendum. Unless the applicable SOW states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify, or provide advice concerning any assumptions or DIR Customer information, decisions, or approvals. Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct.
2.3 DIR Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and DIR Customer Data, including creation of operational workarounds, backups and redundancies. DIR Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. DIR Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or DIR Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to DIR Customer’s or a third party’s information systems, equipment, voice transmissions, data and DIR Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service.
Appears in 1 contract
Samples: Addendum for Cyber Security Services