Threat Intelligence Data Sample Clauses

Threat Intelligence Data. Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
AutoNDA by SimpleDocs
Threat Intelligence Data. Abnormal may provide Customer with Threat Intelligence Data regarding the possibility or likelihood of fraudulent, harmful or malicious activity occurring in Customer's environment. Customer understands that Abnormal provides Threat Intelligence Data for Customer’s consideration, but that Customer is ultimately responsible for any actions taken or not taken in relation to such Threat Intelligence Data, including any configuration instructions of the Service regarding the level of auto-remediation. Abnormal may incorporate any subsequent action or inaction taken by Customer into our models, for the purpose of identifying future potential fraud, loss, or other xxxxx to customers.
Threat Intelligence Data. Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).

Related to Threat Intelligence Data

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

Time is Money Join Law Insider Premium to draft better contracts faster.