Threat Data Sample Clauses

Threat Data. If a Customer has purchased a Subscription that includes endpoint security, Elastic may collect and use Threat Data (defined below) for threat analysis and mitigation, customer support, product management and improvement, and research and development. “Threat Data” is data derived from, or communicated to, the Product that is related to malicious or potentially malicious code, attacks or activity. Threat Data will not be shared with third parties in a manner attributable to an individual or End User.
AutoNDA by SimpleDocs
Threat Data. As part of the Services, Mimecast processes certain data reasonably identified to be malicious, including, without limitation, data which may perpetuate data breaches, malware infections, cyberattacks or other threat activity (collectively, “Threat Data”). Mimecast processes Threat Data primarily through automated processes and may share limited Threat Data with third parties within the cybersecurity ecosystem for the purpose of improving threat detection, analysis and awareness. Threat Data is not Customer Data but may include Personal Data.
Threat Data data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses. Threat Data includes data derived from the foregoing.
Threat Data. If MSP has purchased a Subscription that includes endpoint security, Elastic may collect and use Threat Data (defined below) for threat analysis and mitigation, customer support, product management and improvement, and research and development. “Threat Data” is data derived from, or communicated to, the Software Component that is related to malicious or potentially malicious code, attacks or activity. Threat Data will not be shared with third parties in a manner attributable to an individual, an MSP Customer or MSP.
Threat Data. Notwithstanding anything to the contrary set forth in the Agreement, we will have the right to collect and analyze “Threat Data”, which includes without limitation indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Distributed Cloud Bot Defense (Self Service) Service and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.
Threat Data. Notwithstanding anything to the contrary set forth in the Agreement, we will have the right to collect, generate and analyze Threat Data, and we own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data does not include Customer Data.
Threat Data. (i) Notwithstanding anything to the contrary set forth herein, SHAPE will have the right to collect and analyze threat data, indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Shape Security Software and related services, systems and technologies (including, without limitation, information concerning CUSTOMER data and data derived therefrom), and SHAPE will be free (during and after the Subscription Term of any Order or termination of this Agreement) to:
AutoNDA by SimpleDocs
Threat Data. As part of the Services, Sub-Processor Processes certain data reasonably identified to be malicious, including, without limitation, data which may perpetuate data breaches, malware infections, cyberattacks or other threat activity (collectively, “Threat Data”). Sub-Processor Processes Threat Data primarily through automated processes and may share limited Threat Data with Third Parties within the cybersecurity ecosystem for the purpose of improving threat detection, analysis, awareness and prevention. In certain instances, Threat Data may include Personal Data.
Threat Data. Notwithstanding anything to the contrary set forth herein, we will have the right to collect and analyze ͞dŚƌĞĂƚ ĂƚĂ͕͟ ǁŚŝĐŚ ŝŶĐůƵĚĞƐ ǁŝƚŚŽƵƚ ůŝŵŝƚĂƚŝŽ behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Silverline Shape Defense Service and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.
Threat Data. Notwithstanding anything to the contrary set forth herein, SHAPE will have the right to collect and analyze threat data, indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Product and related services, systems and technologies (including, without limitation, information concerning Customer data and data derived therefrom), and SHAPE will be free (during and after the Term or termination of this Agreement) to: (i) use such information and data to improve and enhance the Product and related services and for other development, diagnostic and corrective purposes in connection with the Product, related services and other SHAPE offerings; and
Time is Money Join Law Insider Premium to draft better contracts faster.