Threat Intelligence Data definition

Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Threat Intelligence Data means Customer de-identified data extracted or generated by the Service from Customer Data (i.e., from the malicious emails such as the third-party bad actor’s IP address, email, and name) that do not constitute Customer Data themselves.

Examples of Threat Intelligence Data in a sentence

  • Elastic uses Threat Intelligence Data for threat analysis and mitigation, customer support, product management and improvement, and research and development.

  • Elastic does not share Threat Intelligence Data with third parties.

  • If Supplier has deployed Threat Intelligence, Eurofins may request resulting Threat Intelligence Data to be shared.

  • The following sections, together with any other terms necessary for the interpretation or enforcement of this Agreement, will survive termination or expiration of this Agreement: 1 (Definitions), 4.5 (Confidentiality) for five (5) years, 4.6 (Usage Data and Threat Intelligence Data), 5 (Ownership Rights), 6 (Payment; Taxes: Monitoring), 7 (Warranties; Disclaimers; Limitation of Liability), 8 (Indemnification), 9.3 (Effect of Termination), 9.5 (Customer Content upon Termination), and 11 (General).

  • If Customer has deployed endpoint security, the Product(s) may provide Threat Intelligence Data (defined below) to Elastic.

  • Eurofins uses Threat Intelligence Data for threat analysis and mitigation, customer support, Software/Articles management and improvement, and research and development.

  • Company uses and discloses Customer Data for the purpose of (x) providing the Service to Customer, and (y) generating Threat Intelligence Data; Customer grants Company a limited license during the Subscription Term to use Customer Data to do each of the foregoing (x) and (y).

  • Company owns and retains all right, title, and interest in and to the Service and Threat Intelligence Data.

  • Sophos may collect, access, use, process, transmit, or store Usage Data and Threat Intelligence Data for: (a) product improvement; (b) research and development purposes; and (c) deriving statistical data using information that is aggregated, anonymized, de-identified, or otherwise rendered not reasonably associated or linked to an identifiable individual or to Customer or Users (“Statistical Data”).

  • Fahmida Rashid, “Microsoft Testing Real-Time Botnet Threat Intelligence Data Feed,” eWeek, January 12, 2012.

Related to Threat Intelligence Data

  • Due Diligence Materials means the information to be provided by Seller to Purchaser pursuant to the provisions of Section 4.1 hereof.

  • GLO Data means any data or information owned by the GLO, including PII or SPI as defined below, that Provider creates, obtains, accesses (via records, systems, or otherwise), receives (from the GLO or on behalf of the GLO), or uses in the performance of the Contract or any documents related thereto.

  • Natural Resource Damages or “NRD” means any damages recoverable by the United States or the State on behalf of the public for injury to, destruction of, or loss or impairment of Natural Resources at the Site as a result of a release of hazardous substances, including but not limited to: (i) the costs of assessing such injury, destruction, or loss or impairment arising from or relating to such a release; (ii) the costs of restoration, rehabilitation, or replacement of injured or lost natural resources or of acquisition of equivalent resources; (iii) the costs of planning such restoration activities; (iv) compensation for injury, destruction, loss, impairment, diminution in value, or loss of use of natural resources; and (v) each of the categories of recoverable damages described in 43 C.F.R. § 11.15 and applicable state law.

  • Due Diligence Information means any information supplied to the Supplier by or on behalf of the Customer prior to the Call Off Commencement Date;

  • SRS means the scheme referred to by the Ministry of Finance as the Supplementary Retirement Scheme or such other scheme as shall replace or supersede the Supplementary Retirement Scheme from time to time.

  • Information technology services means services designed to do any of the following:

  • Nonpoint source pollution means pollution such as sediment, nitrogen, phosphorous, hydrocarbons, heavy metals, and toxics whose sources cannot be pinpointed but rather are washed from the land surface in a diffuse manner by stormwater runoff.

  • PRICE DATA The Contractor has furnished a price list for the new period for authorized purchasers. The State agrees to notify all authorized purchasers of the existence of this Contract and to give the specific instructions relative to the procedures to be followed in making purchases under the provisions hereof. Entities making purchases over $50,000 may consider obtaining two competitive quotes from the authorized dealers’ list on this manufacturer’s contract. If this manufacturer does not have a dealers’ list, the manufacturer should be prepared to submit a quote. PAYMENT: Payment for commodities or equipment purchased under the provisions of this Contract shall be made to the Contractor or to the authorized dealer making delivery in accordance with Miss. Code Xxx. §§ 31-7- 301, et seq. (as amended). Such payment is to be made only upon receipt, by the authorized purchaser, of properly certified invoices, which are priced strictly in accordance with the pricing provisions of this Contract.

  • Federal contract information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public Web sites) or simple transactional information, such as necessary to process payments.

  • Technology startup company means a for profit business that

  • Service Data means all electronic data, text, messages, communications or other materials submitted to and stored within a Service by Subscriber, Agents and End-Users in connection with Subscriber’s use of such Service, excluding Agent Contact Information.

  • Environmental Management System means an environmental management system or plan of management to address all environmental risks and to ensure compliance with all Environmental Laws and licences;

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Information Technology Resources means agency budgetary resources, personnel, equipment, facilities, or services that are primarily used in the management, operation, acquisition, disposition, and transformation, or other activity related to the lifecycle of information technology; acquisitions or interagency agreements that include information technology and the services or equipment provided by such acquisitions or interagency agreements; but does not include grants to third parties which establish or support information technology not operated directly by the Federal Government. (0MB M-15-14)

  • Computer Systems means software, computer firmware, computer hardware, electronic data processing, telecommunications networks, network equipment, interfaces, platforms, peripherals, computer systems, and information contained therein or transmitted thereby, including any outsourced systems and processes.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Billing information means any data that enables any person to access a customer’s or donor’s account, such as a credit card, checking, savings, share or similar account, utility bill, mort- gage loan account, or debit card.

  • Information Systems means all computer hardware, databases and data storage systems, computer, data, database and communications networks (other than the Internet), architecture interfaces and firewalls (whether for data, voice, video or other media access, transmission or reception) and other apparatus used to create, store, transmit, exchange or receive information in any form.