Threat Data. If a Customer has purchased a Subscription that includes endpoint security, Elastic may collect and use Threat Data (defined below) for threat analysis and mitigation, customer support, product management and improvement, and research and development. “Threat Data” is data derived from, or communicated to, the Product that is related to malicious or potentially malicious code, attacks or activity. Threat Data will not be shared with third parties in a manner attributable to an individual or End User.
Threat Data. As part of the Services, Mimecast processes certain data reasonably identified to be malicious, including, without limitation, data which may perpetuate data breaches, malware infections, cyberattacks or other threat activity (collectively, “Threat Data”). Mimecast processes Threat Data primarily through automated processes and may share limited Threat Data with third parties within the cybersecurity ecosystem for the purpose of improving threat detection, analysis and awareness. Threat Data is not Customer Data but may include Personal Data.
Threat Data. (relevant only to Defend) data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data includes data derived from the foregoing.
Threat Data. If MSP has purchased a Subscription that includes endpoint security, Elastic may collect and use Threat Data (defined below) for threat analysis and mitigation, customer support, product management and improvement, and research and development. “Threat Data” is data derived from, or communicated to, the Software Component that is related to malicious or potentially malicious code, attacks or activity. Threat Data will not be shared with third parties in a manner attributable to an individual, an MSP Customer or MSP.
Threat Data. Notwithstanding anything to the contrary set forth in the Agreement, we will have the right to collect, generate and analyze Threat Data, and we own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data does not include Customer Data.
Threat Data. (i) Notwithstanding anything to the contrary set forth herein, SHAPE will have the right to collect and analyze threat data, indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Shape Security Software and related services, systems and technologies (including, without limitation, information concerning CUSTOMER data and data derived therefrom), and SHAPE will be free (during and after the Subscription Term of any Order or termination of this Agreement) to:
(i) use such information and data to improve and enhance the Shape Security Software and related services and for other development, diagnostic and corrective purposes in connection with the Shape Security Software, related services and other SHAPE offerings; and (ii) disclose such data solely in aggregate or other de-identified form in connection with its business.
(ii) SHAPE will have a right to use the Evidence of Compromise to populate its Attack Credential Knowledgebase, improve Shape Security Software, including its Blackfish Solution and related services and other product offerings, and use the Evidence of Compromise in the Blackfish Solution, related services and other product offerings, for other SHAPE customers participating in the Collective Defense. CUSTOMER agrees to contribute Evidence of Compromise into the Attack Credential Knowledgebase. CUSTOMER likewise represents and warrants that it has, or has obtained, all rights, licenses, consents, permissions, power and/or authority necessary to grant the rights granted herein for any material that CUSTOMER submits to, or requests from, the Shape Security Software. CUSTOMER agrees that CUSTOMER has the necessary permission or is otherwise legally entitled to submit or request the material and to grant SHAPE the license described above. CUSTOMER understands that SHAPE may modify or adapt submitted material as it is distributed by SHAPE and SHAPE’s partners and/or make changes to the material in order to adapt the material to or through the Shape Security Software.
(iii) The access to and use of the Shape Security Software granted hereunder do not replace the need for CUSTOMER to maintain regular data backups or redundant data archives. SHAPE HAS NO OBLIGATION OR LIABILITY FOR ANY LOSS, ALTERATION, DESTRUCTION, DAMAGE, CORRUPTION OR RECOVERY OF CUSTOMER DATA.
Threat Data. Notwithstanding anything to the contrary set forth herein, we will have the right to collect and analyze “Threat Data”, which includes without limitation indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Silverline Shape Defense Service and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.
Threat Data. If a Customer has purchased a Subscription that includes endpoint security, Elastic may collect and use Threat Data
Threat Data. Notwithstanding anything to the contrary set forth herein, we will have the right to collect and analyze ͞dŚƌĞĂƚ ĂƚĂ͕͟ ǁŚŝĐŚ ŝŶĐůƵĚĞƐ ǁŝƚŚŽƵƚ ůŝŵŝƚĂƚŝŽ behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Silverline Shape Defense Service and related services, systems and technologies. Threat Data does not include information that identifies a natural person. We own and retain all right, title and interest worldwide in and to the Threat Data, and all intellectual property rights therein or related thereto. Threat Data is our Confidential Information.
Threat Data. Notwithstanding anything to the contrary set forth herein, SHAPE will have the right to collect and analyze threat data, indications of compromise, telemetry and behavioral information, data relating to attacks and attack tools, attack credentials and other information relating to the provision, use and performance of various aspects of the Product and related services, systems and technologies (including, without limitation, information concerning Customer data and data derived therefrom), and SHAPE will be free (during and after the Term or termination of this Agreement) to: (i) use such information and data to improve and enhance the Product and related services and for other development, diagnostic and corrective purposes in connection with the Product, related services and other SHAPE offerings; and