Solutions Data Sample Clauses

Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
AutoNDA by SimpleDocs
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure. Customer hereby authorizes Arctic Wolf to aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device) with respect to Customer and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Notwithstanding anything to the contrary herein, such Aggregate/Anonymous Data will be deemed Arctic Wolf Technology, which Arctic Wolf may use for any business purpose during or after the term of this Agreement, including without limitation to develop and improve the Solutions and to create and distribute reports and other materials. Customer understands, and hereby consents, that Solutions Data may be accessed by Arctic Wolf and its non-US Affiliates and their non-US citizen employees.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metad ata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. Customer understands Arctic Wolf will aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device, or could be reasonably linked, directly or indirectly, with a particular consumer or household) and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Such Aggregate/Anonymous Data is Arctic Wolf Technology, which Arctic Wolf may use for its business purposes during or after the term of this Agreement.
Solutions Data. 10.1 “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure. Customer hereby authorizes Arctic Wolf to aggregate Solutions Data with other data so that results are non-personally identifiable with respect to Customer and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Notwithstanding anything to the contrary herein, such Aggregate/Anonymous Data will be deemed Arctic Wolf Technology, which Arctic Wolf may use for any business purpose during or after the term of this Agreement, including without limitation to develop and improve the Solutions and to create and distribute reports and other materials. Customer understands, and hereby consents, that Solutions Data may be accessed by Arctic Wolf and its non-US Affiliates and their non-US citizen employees.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. "Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Solutions Data 
AutoNDA by SimpleDocs

Related to Solutions Data

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.

  • Data To permit evaluation of requests under paragraph (c) of this clause based on unreasonable cost, the Contractor shall include the following information and any applicable supporting data based on the survey of suppliers: Foreign and Domestic Construction Materials Cost Comparison Construction material description Unit of measure Quantity Cost (dollars) * Item 1: Foreign construction material Domestic construction material Item 2 Foreign construction material Domestic construction material [List name, address, telephone number, and contact for suppliers surveyed. Attach copy of response; if oral, attach summary.] [Include other applicable supporting information.] (*Include all delivery costs to the construction site.]

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

Time is Money Join Law Insider Premium to draft better contracts faster.