Suspicious/Unknown File Analysis Sample Clauses

Suspicious/Unknown File Analysis. While using certain CrowdStrike Offerings you may have the option to upload (by submission, configuration, and/or, in the case of Services, by CrowdStrike personnel retrieval) files and other information related to the files for security analysis and response or, when submitting crash reports, to make the product more reliable and/or improve CrowdStrike's products and services or enhance cybersecurity. These potentially suspicious or unknown files may be transmitted and analyzed to determine functionality and their potential to cause instability or damage your endpoint. In some instances, these files could contain Personal Data for which you are responsible.
AutoNDA by SimpleDocs

Related to Suspicious/Unknown File Analysis

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Time is Money Join Law Insider Premium to draft better contracts faster.