Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 4 contracts
Samples: Cylance End User, Cylance End User License Agreement, Cylance End User License Agreement
Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze non,personally identifiable data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 2 contracts
Samples: Cylance End User License Agreement, Cylance End User License Agreement
Anonymous Data. We may reduce Potentially Malicious Code to a cryptographic unique hash, and we may deconstruct, analyze and catalogue Potentially Malicious Code to determine functionality and potential to cause instability or damage to your systems or networks. We may also use the cryptographic unique file hash to identify files on other systems as Potentially Malicious Code, and use and distribute the unique file hash to promote awareness, detection and prevention of internet security risks, in which case the unique file hash will be without attribution to you, your operations, or your systems or networks (“Anonymous Data”). We may also extract, compile, synthesize, and analyze non-personally identifiable data transmitted by the Software from your systems or networks, or information resulting from your use of the Software, in each case to the extent such data or information does not identify you, your operations, or your systems or networks or any person, which is also “Anonymous Data”. You agree that we may use, copy, modify, distribute and display Files, Anonymous Data and Potentially Malicious Code for our business purposes, including without limitation for developing, enhancing, and supporting products and services. Without limiting the foregoing, we will not identify you as the source of any Files or Potentially Malicious Code.
Appears in 1 contract
Samples: Cylance End User License Agreement