Threat Intelligence Data Sample Clauses

Threat Intelligence Data. Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
AutoNDA by SimpleDocs
Threat Intelligence Data. Abnormal may provide Customer with Threat Intelligence Data regarding the possibility or likelihood of fraudulent, harmful or malicious activity occurring in Customer's environment. Customer understands that Abnormal provides Threat Intelligence Data for Customer’s consideration, but that Customer is ultimately responsible for any actions taken or not taken in relation to such Threat Intelligence Data, including any configuration instructions of the Service regarding the level of auto-remediation. Abnormal may incorporate any subsequent action or inaction taken by Customer into our models, for the purpose of identifying future potential fraud, loss, or other xxxxx to customers.
Threat Intelligence Data. Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).

Related to Threat Intelligence Data

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!