Laserfiche WebLink
A TRUE COPY <br />CERTIFICATION ON LAST PAGE <br />RYAN L. BUTLER, CLERK <br />OTM CYBER Optimized Threat Management Cybersecurity Services Terms and Conditions <br />This Service Agreement (SA) addresses the Services, standards, and responsibilities of OTM CYBER <br />and the Customer. OTM CYBER offers professional cybersecurity services to Indian River County FL <br />(hereinafter "Customer"). This agreement is entered partially pursuant to the General Services <br />Administration Contract 47QTCA23D0095, which takes priority in any disputes. <br />The term of this agreement is for OTM Cyber to provide the duties and services contained herein to the <br />Customer for a period of 3 Years from the time of installation. <br />The Customer agrees to the following: <br />1. Representations and Warranties. OTM CYBER represents and warrants to the Customer that: (i) <br />there are no contracts and/or restrictive covenants preventing the full performance of its duties <br />and obligations under this Agreement; and (ii) it has the requisite qualifications, knowledge, and <br />experience to perform the obligations under this Agreement. <br />2. The Engagement. OTM CYBER will provide the Customer with the services and equipment as <br />outlined in the "Quote" section of this document. The nature and scope of the Services may be <br />updated and adjusted from time to time upon mutual written consent by the parties. <br />3. Independent Contractor; Taxes. The parties understand and agree that OTM CYBER is an <br />independent contractor and there are and will not be employer-employee or partnership <br />relationship between the parties. OTM CYBER recognizes that it will have sole responsibility to <br />pay any taxes or to any other compensation it will receive from the Customer in consideration for <br />the Services. <br />4. Access. The customer acknowledges that OTM CYBER will have access to sensitive information <br />and may, at times perform network scans, vulnerability assessments, and other methods of <br />system and network access in order to facilitate accurate security investigations and appropriate <br />security responses. <br />5. Duties of OTM CYBER. OTM CYBER hereby affirms and undertakes that, in the process of <br />providing the Services to the Customer, it will: <br />