Solutions Data Sample Clauses

Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
AutoNDA by SimpleDocs
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure. Customer hereby authorizes Arctic Wolf to aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device) with respect to Customer and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Notwithstanding anything to the contrary herein, such Aggregate/Anonymous Data will be deemed Arctic Wolf Technology, which Arctic Wolf may use for any business purpose during or after the term of this Agreement, including without limitation to develop and improve the Solutions and to create and distribute reports and other materials. Customer understands, and hereby consents, that Solutions Data may be accessed by Arctic Wolf and its non-US Affiliates and their non-US citizen employees.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. "Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Solutions Data. 10.1 “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure. Customer hereby authorizes Arctic Wolf to aggregate Solutions Data with other data so that results are non-personally identifiable with respect to Customer and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Notwithstanding anything to the contrary herein, such Aggregate/Anonymous Data will be deemed Arctic Wolf Technology, which Arctic Wolf may use for any business purpose during or after the term of this Agreement, including without limitation to develop and improve the Solutions and to create and distribute reports and other materials. Customer understands, and hereby consents, that Solutions Data may be accessed by Arctic Wolf and its non-US Affiliates and their non-US citizen employees.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metad ata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technol ogy used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
Solutions Data. “Solutions Data” means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to
Solutions Data 
AutoNDA by SimpleDocs

Related to Solutions Data

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Billing Information 6.1 NLT and the RL shall provide each other with information within their possession that is necessary to allow them to provide accurate and timely billing to each other and to any other relevant third parties.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Data To permit evaluation of requests under paragraph (c) of this clause based on unreasonable cost, the Contractor shall include the following information and any applicable supporting data based on the survey of suppliers: Foreign (Nondesignated Country) and Domestic Construction Materials Cost Comparison Construction material description Unit of measure Quantity Cost (dollars) * Item 1: Foreign construction material Domestic construction material Item 2 Foreign construction material Domestic construction material [List name, address, telephone number, and contact for suppliers surveyed. Attach copy of response; if oral, attach summary.][Include other applicable supporting information.] [* Include all delivery costs to the construction site.]

  • Data Services In lieu of any other rates or discounts, the Customer will receive a discount equal to 20% for the following Data Services: Access: Standard VBS3Guide local loop charges for DS-0, DS-1 and DS-3 Access Service.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Technical Data For the purpose of this Agreement, "TECHNICAL DATA" shall mean all information of the Company in written, graphic or tangible form relating to any and all products which are developed, formulated and/or manufactured by the Company, as such information exists as of the Effective Date or is developed by the Company during the term hereof.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment. 5.2 If a D&E Customer is served by resold Verizon Telecommunications Service or a Verizon Local Switching UNE, subject to any call blocking feature used by D&E, to the extent reasonably feasible, Verizon will route Voice Information Services Traffic originating from such Service or UNE to the Voice Information Service platform. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. D&E shall pay Verizon such charges in full regardless of whether or not it collects such charges from its own Customers. 5.3 D&E shall have the option to route Voice Information Services Traffic that originates on its own network to the appropriate Voice Information Services platform(s) connected to Verizon’s network. In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Voice Information Service serving switch. This trunk group will be utilized to allow D&E to route Voice Information Services Traffic originated on its network to Verizon. For such Voice Information Services Traffic, unless D&E has entered into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers, D&E shall pay to Verizon without discount the Voice Information Services provider charges. 5.4 D&E shall pay Verizon such charges in full regardless of whether or not it collects charges for such calls from its own Customers. 5.5 For variable rated Voice Information Services Traffic (e.g., NXX 550, 540, 976, 970, 940, as applicable) from D&E Customers served by resold Verizon Telecommunications Services or a Verizon Local Switching Network Element, D&E shall either (a) pay to Verizon without discount the Voice Information Services provider charges, or (b) enter into an arrangement with Verizon to xxxx and collect Voice Information Services provider charges from D&E’s Customers. 5.6 Either Party may request the other Party provide the requesting Party with non discriminatory access to the other party’s information services platform, where such platform exists. If either Party makes such a request, the Parties shall enter into a mutually acceptable written agreement for such access. 5.7 In the event D&E exercises such option, D&E will establish, at its own expense, a dedicated trunk group to the Verizon Information Service serving switch. This trunk group will be utilized to allow D&E to route information services traffic originated on its network to Verizon.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!