Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 4 contracts
Sources: End User License Agreement, End User License Agreement, End User License Agreement
Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze non,personally identifiable data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 2 contracts
Sources: End User License Agreement, End User License Agreement
Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic unique hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic unique file hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze non-personally identifiable data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 1 contract
Sources: End User License Agreement
Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze non-personally identifiable data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree, and agree on behalf of your end users, that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you you, or any end user, as the source of any Files or Potentially Malicious Code.
Appears in 1 contract
Sources: End User License Agreement