Cyber Security Services Sample Clauses

The cyber-security-services clause defines the obligations and standards related to the provision of cybersecurity services within an agreement. It typically outlines the scope of services such as threat monitoring, vulnerability assessments, incident response, and ongoing security maintenance, specifying the responsibilities of the service provider and any requirements for compliance with industry standards or regulations. This clause ensures that both parties understand the expectations for protecting digital assets and data, thereby reducing the risk of cyber incidents and clarifying accountability in the event of a security breach.
POPULAR SAMPLE Copied 4 times
Cyber Security Services. 2.1 Cyber Security Services often require active customer engagement. In addition to items or actions that may be set out in an applicable Ordering Document, Customer will assist, provide or perform items or actions as reasonably requested by Motorola in the course of performance and necessary to ensure timely and efficient performance of the Services. Customer will ensure that information Customer provides to Motorola in connection with receipt of Services is accurate and complete in all material respects. 2.2 Customer will make timely decisions and obtain any required management approvals that are reasonably necessary for Motorola to provide the products and Services and perform its other duties under any applicable ordering document and this Cyber SSA. Unless an applicable ordering document states otherwise, Motorola may rely upon and is not required to evaluate, confirm, reject, modify or provide advice concerning any assumptions or Customer information, decisions, or approvals. Cyber Security Services and Deliverables are limited by, among other things: nature of the security threats, the accuracy and completeness of information provided to Motorola; the level of effort utilized; and subjective judgments relating to relative risk and mitigation priorities which are inherent in any such services and may or may not be correct. 2.3 Customer shall take any actions necessary to mitigate risk to its operations and protect and preserve its computer systems, data environment, networks and Customer Data, including creation of operational workarounds, backups and redundancies. Customer shall inform Motorola in advance to the extent adequate backups and redundancies are not possible for certain elements of its systems or data. Customer acknowledges and agrees that Services may impact, disrupt or damage information systems, data environments, data or Customer Data. Motorola disclaims responsibility for costs in connection with any such disruptions of and/or damage to Customer’s or a third party’s information systems, equipment, voice transmissions, data and Customer Data, including, but not limited to, denial of access to a legitimate system user, automatic shut-down of information systems caused by intrusion detection software or hardware, or failure of the information system resulting from the provision or delivery of the Service
Cyber Security Services. 7.1. Any order of Cyber Security Services shall be made by the Customer to Tototheo in writing. 7.2. Tototheo shall not be held responsible for any malfunction or error or problem or interruption to any Cyber Security Product sold and/or provided to the Customer. The sole party responsible for such malfunction or error or problem or interruption to any Cyber Security Product sold to the Customer, shall be the manufacturer of the said Cyber Security Product. 7.3. Tototheo does not guarantee, represent or warrant that the use by the Customer of any purchased Cyber Security Product(s) will be uninterrupted, timely, secure or error-free.
Cyber Security Services. Where the Supplier is engaged to provide Cyber Security Services, the Supplier must comply with and meet with the cyber security requirements as set out in Schedule 3.
Cyber Security Services. Description: Multi Supplier Framework Agreement for the provision of External ICT Technical Support Services (provided by a Team of ICT Resources) Internal identifier: 4
Cyber Security Services. 1.1 Cyber Security Services will be delivered and be billed as described in the relevant Order Form and Service Description. However, by default (in the absence of more specific provisions): (a) services that involve the monitoring of assets will be Ready for Service immediately preceding the time when a USM first receives logs from a Monitored Asset. (b) Professional Services will be delivered on terms that include (without limitation) the Professional Services SST and be billable as professional services according to the relevant Order Form. 1.2 MSP Software is used by Supplier in the performance of the Cyber Security Services, and the use and provision of such MSP Software shall be governed by Section 6 of these Service Specific Terms. 1.3 Supplier reserves the right to: (a) Conduct such operational tests as it consider necessary to assess the effective operation of the Cyber Security Services (b) modify or replace (including hardware or software) any part of the Supplier's System, its network, system configurations or routing configuration; or (c) modify or replace (including hardware or software) any Supplier Equipment used to deliver any Service at any time during the Service Term provided that such changes have no material adverse impact on the core features and functionality of the Cyber Security Services. If such changes will have a material adverse effect, Supplier shall propose a change in accordance with the Change Control Procedure. 1.4 Supplier has the right to use any technical information Client provides to Supplier for any reasonable business purpose during and after the Service Term (including without limitation, for product support, improvement and development). Client acknowledges that the MSP Software includes monitoring capability that sends anonymous statistics about performance, device utilisation and network size remotely to Supplier. Save to the extent required for the effective performance of the Cyber Security Services, Supplier will not use such technical information in a form that could in any way identify Client.
Cyber Security Services. Virus, Spyware and Malware Removal – This is limited to individual desktop, not network wide infection (of more than two computers). Data may be lost if not properly backed up.
Cyber Security Services. Enterprise Security Data Protection Transaction Security Industrial Security
Cyber Security Services. With the growth in cyber-attacks and data breaches costing business and the public sector millions every year, cybersecurity is high on the strategic agenda. By putting in place proper cybersecurity assessments, the Client organisation can define the right strategy and transformation program to protect the Client sensitive data and assets. Our cybersecurity consulting services gives the client insight into the Client security management with assessments of the Client sensitive data, critical infrastructures and applications. We work with the Client to define and implement the right strategy, target operating model and GRC structure. We ensure the client security design and operations support the client strategic objectives and business continuity. By planning ahead with a cybersecurity strategy as part of the client digital transformation journey, the client will be in a more confident position to stay compliant and achieve cost savings.
Cyber Security Services within the scope of Services 2,3,4,5 design, build and operate the Solution with the cyber and data privacy controls necessary to achieve the Buyer’s defined business objectives and defined cyber risk tolerances. This includes consideration of the information security governance and data risk.