Common use of Threat Data Clause in Contracts

Threat Data. Notwithstanding anything to the contrary set forth herein, we will have the right to collect and analyze “Threat Data”, which includes without limitation indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Silverline Shape Defense Service and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.

Appears in 1 contract

Sources: End User Services Agreement

Threat Data. Notwithstanding anything to the contrary set forth hereinin the Agreement, we will have the right to collect and analyze “Threat Data”, which includes without limitation indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Silverline Shape Defense Service SaaS Offerings and any Software and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.

Appears in 1 contract

Sources: End User Services Agreement