Common use of Suspicious/Unknown File Analysis Clause in Contracts

Suspicious/Unknown File Analysis. While using certain CrowdStrike Offerings Customer may have the option to upload (by submission, configuration, and/or, in the case of Services, by CrowdStrike personnel retrieval) files and other information related to the files for security analysis and response or, when submitting crash reports, to make the product more reliable and/or improve CrowdStrike’s products and services or enhance cyber-security. These potentially suspicious or unknown files may be transmitted and analyzed to determine functionality and their potential to cause instability or damage to Customer’s endpoints and systems. In some instances, these files could contain Personal Data for which Customer is responsible.

Appears in 3 contracts

Samples: Terms and Conditions, Terms and Conditions, Terms and Conditions

AutoNDA by SimpleDocs

Suspicious/Unknown File Analysis. While using certain CrowdStrike Offerings Customer you may have the option to upload (by submission, configuration, and/or, in the case of Services, by CrowdStrike personnel retrieval) files and other information related to the files for security analysis and response or, when submitting crash reports, to make the product more reliable and/or improve CrowdStrike’s 's products and services or enhance cyber-securitycybersecurity. These potentially suspicious or unknown files may be transmitted and analyzed to determine functionality and their potential to cause instability or damage to Customer’s endpoints and systemsyour endpoint. In some instances, these files could contain Personal Data for which Customer is you are responsible.

Appears in 2 contracts

Samples: Crowdstrike Terms and Conditions, Crowdstrike Terms and Conditions

Suspicious/Unknown File Analysis. While using certain CrowdStrike Offerings Customer may have the option to upload (by submission, configuration, and/or, in the case of Services, by CrowdStrike personnel retrieval) files and other information related to the files for security analysis and response or, when submitting crash reports, to make the product more reliable and/or improve CrowdStrike’s products and CrowdS services or enhance cyber-security. These potentially suspicious or unknown files may be transmitted and analyzed to determine functionality and their potential to cause instability or damage to Customer’s endpoints and systems. In some instances, these files could contain Personal Data for which Customer is responsible.

Appears in 1 contract

Samples: agenda.wilco.org

AutoNDA by SimpleDocs

Suspicious/Unknown File Analysis. While using certain CrowdStrike Offerings Customer may have the option to upload (by submission, configuration, and/or, in the case of Services, by CrowdStrike personnel retrieval) files and other information related to the files for security analysis and response or, when submitting crash reports, to make the product more reliable and/or improve CrowdStrike’s products and services or enhance cyber-securitycybersecurity. These potentially suspicious or unknown files may be transmitted and analyzed to determine functionality and their potential to cause instability or damage to Customer’s endpoints and systemsendpoint. In some instances, these files could contain Personal Data for which Customer is responsible.

Appears in 1 contract

Samples: Software License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!