Threat Intelligence Data definition

Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Threat Intelligence Data means Customer de-identified data extracted or generated by the Service from Customer Data (i.e., from the malicious emails such as the third-party bad actor’s IP address, email, and name) that do not constitute Customer Data themselves.

Examples of Threat Intelligence Data in a sentence

  • Customer understands that Abnormal provides Threat Intelligence Data for Customer’s consideration, but that Customer is ultimately responsible for any actions taken or not taken in relation to such Threat Intelligence Data, including any configuration instructions of the Service regarding the level of auto-remediation.

  • Abnormal may provide Customer with Threat Intelligence Data regarding the possibility or likelihood of fraudulent, harmful or malicious activity occurring in Customer’s environment.

  • Abnormal owns and retains all right, title, and interest in and to the Service, Threat Intelligence Data, Technical Services, and any feedback or suggestions Customer provides to Abnormal with respect to the Service or Technical Services.

  • Customer grants Abnormal a license during each Subscription Term to use Customer Data to provide the Service, Support, and Technical Services to Customer, and to generate Threat Intelligence Data.


More Definitions of Threat Intelligence Data

Threat Intelligence Data means any information about malware, threats, actual or attempted security events, including but not limited to their frequency, source, associated code or metadata, general identifiers, attacked sectors and geographies that: (i) Customer provides to Sophos in connection with this Agreement, or (ii) is collected or discovered by Sophos in connection with Customer’s access and use of the Product, excluding any information or data that identifies Customer or to the extent that it includes Personal Data. For the avoidance of doubt, Threat Intelligence Data is not Confidential Information of Customer.
Threat Intelligence Data means information collected, generated, derived, and/or analyzed by the Service that is related to malicious activities, fraud, accidental loss, human error, threat or other harm detection and analysis identified by the Service such as a third-party malicious actor’s IP address, email address, name, and hashes of malware. This data will be used in accordance with Egress’ Privacy Policy at ▇▇▇.▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇▇-▇▇▇▇▇▇ and in accordance with Egress’ data retention policies. Egress and the Buyer are Independent Controllers of Personal Data Egress and the Buyer are Independent Controllers, not Joint Controllers, for the purposes of the Data Protection Legislation in respect of some of the Personal Data that may be contained within Account Data and Usage Data (but not of those data sets themselves). Duration of the Processing The duration of the contract. Nature and purposes of the Processing The provision of the Egress Services as initiated by the Buyer, its users and recipients under the Contract or otherwise. Type of Personal Data Buyer Data that the Buyer and its users choose to transfer, store, share or host on or through Egress’ Services which may include Personal, Special Category and confidential Personal Data as determined by the Buyer. Categories of Data Subject Any data subjects contained in the Buyer Data that the Buyer and its users choose to transfer, store, share or host on or through Egress’ Services. International transfers and legal gateway Storage of Buyer Data will be in the UK. Support and maintenance services may be provided from the UK and countries outside the UK (currently UK, US and Australia). No matter where the Buyer Data is stored, Egress does not control or limit the locations from which the Buyer, users and recipients may access it and it is the Buyer’s responsibility to ensure that neither the Buyer nor users accesses or uses the services or support in any country with data localisation laws that would require the Buyer’s environment or Buyer Data to be hosted in that country. Plan for return and destruction of the data once the Processing is complete Data transferred by Buyer and its users will be deleted in accordance with Egress’ data retention policy at ▇▇▇.▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇ from time to time. Annex 2 - Joint Controller Agreement – Not Used Schedule 8 (Corporate Resolution Planning)