Common use of Threat Data Clause in Contracts

Threat Data. data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses. Threat Data includes data derived from the foregoing.

Appears in 3 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement

AutoNDA by SimpleDocs

Threat Data. (relevant only to Defend) data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses. Threat Data includes data derived from the foregoing.

Appears in 3 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement

AutoNDA by SimpleDocs

Threat Data. data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses, and feedback from Users. Threat Data includes data derived from the foregoing.

Appears in 1 contract

Samples: End User License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!