Laserfiche WebLink
rr~~~? MOTOl40LA <br />Essential Plus Services <br />• Repair Verification Preference and procedure <br />• Database and escalation procedure forms. <br />• Submit changes in any information supplied to Motorola and included in the CSP to the CSM. <br />1.6.4 Provide the following information when initiating a service request: <br />• Assigned system ID number <br />• Problem description and site location <br />• Other pertinent information requested by Motorola to open a Case. <br />1.6.5 Notify the SSC when customer performs any activity that impacts the system. (Activity that impacts <br />the system may include, but is not limited to, installing software or hardware upgrades, performing <br />upgrades to the network, renaming elements or devices within the network, or taking down part of <br />the system to perform maintenance.) <br />1.6.6 Allow Servicers access to equipment (including any connectivity or monitoring equipment) if remote <br />service is not possible. <br />1.6.7 Allow Servicers access to remove Motorola owned monitoring equipment upon cancellation of <br />service. <br />1.6.8 Provide all customer managed passwords required to access the customer's system to Motorola <br />upon request or when opening a case to request service support or enable response to a technical <br />issue. <br />1.6.9 Pay additional support charges above and beyond the contracted service agreements that may apply <br />if it is determined that system faults were caused by the customer making changes to critical system <br />parameters <br />1.6.10 Obtain at Customer's cost all third party consents or licenses required to enable Motorola to provide <br />the monitoring service. <br />1.6.11 Cooperate with Motorola and perform all acts that are reasonable or necessary to enable Motorola <br />to provide the services described in this SOW. <br />1.6.12 Contact Motorola to coordinate transition of monitoring when monitoring responsibility is to be <br />transferred to or from Motorola. (I.e. normal business hours to after-hours monitoring) as set forth in <br />pre-defined information provided by customer CSP. <br />1.6.12.1 Upon contact, customer must provide customer name, site id, status on any open <br />cases, severity level, and brief description of case and action plan to Motorola. <br />1.6.13 Acknowledge that cases will be handled in accordance with the times and priorities as defined in the <br />Engagement Matrix. <br />1.6.14 Cooperate with Motorola and perform all acts that are reasonable or necessary to enable Motorola <br />to provide the Network Event Monitoring. <br />Appendix G: Security Monitoring Service Overview <br />Motorola's Security Monitoring Services includes anti-malware monitoring and authentication log monitoring. <br />There are also options for firewall monitoring, intrusion detection system (IDS) monitoring, and ASTRO 25 system <br />log monitoring. <br />Motorola's ASTRO 25 Security Monitoring is a complete solution that provides peace of mind and reduces the <br />risk that your network availability will be impacted by a security threat. The solution includes 24x7x365 <br />monitoring of the radio network security elements by experienced, specialized security technologists with years <br />of experience working with ASTRO 25mission-critical networks. For highly complex or unusual security events, <br />our technologists have direct and immediate access to Motorola engineers for rapid resolution. <br />Error! Unknown document Motorola Confidential Proprietary ©Motorola 2017 <br />property name. 40-56 <br />