Threat Intelligence Data definition

Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Threat Intelligence Data means Customer de-identified data extracted or generated by the Service from Customer Data (i.e., from the malicious emails such as the third-party bad actor’s IP address, email, and name) that do not constitute Customer Data themselves.

Examples of Threat Intelligence Data in a sentence

  • Arctic Wolf owns and has the right to license, use, and provide Threat Intelligence Data, Services , and any associated documentation.

  • As between Arctic Wolf and Customer, Customer owns all files, data, text, audio, images, video and other content in any form made accessible to Arctic Wolf by or on behalf of Customer, but excluding Threat Intelligence Data (as defined below) (the “Incident Evidence”).

  • Customer shall bear the risk of loss associated with any alteration, degradation or corruption of the Threat Intelligence Data during any transfer to Arctic Wolf.

  • Confidential Information of Arctic Wolf includes, but is not limited to, Threat Intelligence Data, nonpublic information related to the details and components of the Services and the terms of this Agreement and any SOW.

  • Customer agrees not to, directly or indirectly: (i) modify, translate, copy or create derivative works of the Services or Threat Intelligence Data; (ii) reverse engineer, decompile, disassemble, or otherwise seek to obtain the intellectual property contained within the Services or Threat Intelligence Data; or (iii) remove or obscure any proprietary or other notice, including on any reports or data printed from the Services or Threat Intelligence Data.

Related to Threat Intelligence Data

  • Natural Resource Damages or “NRD” means any damages recoverable by the United States or the State on behalf of the public for injury to, destruction of, or loss or impairment of Natural Resources at the Site as a result of a release of hazardous substances, including but not limited to: (i) the costs of assessing such injury, destruction, or loss or impairment arising from or relating to such a release; (ii) the costs of restoration, rehabilitation, or replacement of injured or lost natural resources or of acquisition of equivalent resources; (iii) the costs of planning such restoration activities; (iv) compensation for injury, destruction, loss, impairment, diminution in value, or loss of use of natural resources; and (v) each of the categories of recoverable damages described in 43 C.F.R. § 11.15 and applicable state law.

  • SRS means the scheme referred to by the Ministry of Finance as the Supplementary Retirement Scheme or such other scheme as shall replace or supersede the Supplementary Retirement Scheme from time to time.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • PRICE DATA The Contractor has furnished a price list for the new period for authorized purchasers. The State agrees to notify all authorized purchasers of the existence of this Contract and to give the specific instructions relative to the procedures to be followed in making purchases under the provisions hereof. Entities making purchases over $50,000 may consider obtaining two competitive quotes from the authorized dealers’ list on this manufacturer’s contract. If this manufacturer does not have a dealers’ list, the manufacturer should be prepared to submit a quote. PAYMENT: Payment for commodities or equipment purchased under the provisions of this Contract shall be made to the Contractor or to the authorized dealer making delivery in accordance with Miss. Code Xxx. §§ 31-7- 301, et seq. (as amended). Such payment is to be made only upon receipt, by the authorized purchaser, of properly certified invoices, which are priced strictly in accordance with the pricing provisions of this Contract.

  • Federal contract information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public Web sites) or simple transactional information, such as necessary to process payments.

  • Technology startup company means a for profit business that

  • Service Data means all electronic data, text, messages, communications or other materials submitted to and stored within a Service by Subscriber, Agents and End-Users in connection with Subscriber’s use of such Service, excluding Agent Contact Information.

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Information Technology Systems means all information technology systems, Software, computers, workstations, databases, routers, hubs, switches, networks and other information technology equipment used or held for use in, or otherwise relating to, the Business.

  • network and information system have the meaning set forth in OAR 407-014-0305, as such rule may be revised from time to time.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.