Threat Data. data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses. Threat Data includes data derived from the foregoing.
Appears in 3 contracts
Samples: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Threat Data. (relevant only to Defend) data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses. Threat Data includes data derived from the foregoing.
Appears in 3 contracts
Samples: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Threat Data. data identified by the Services as, without limitation: (a) malicious; (b) indicative of cyberattack or other threat; or (c) that which is, or could be, used to exploit vulnerabilities, conduct malicious activity, malware or ransomware infections, data theft or unauthorised access, cyberattacks or other activity. Threat Data may include information showing compromised or weaponised email accounts and addresses, and feedback from Users. Threat Data includes data derived from the foregoing.
Appears in 1 contract
Samples: End User License Agreement