Solutions Data definition

Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metad ata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title, and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technol ogy used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify, and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third-party service providersdata centers will be as set forth in the Solutions Terms.
Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure. Customer understands Arctic Wolf will aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device, or could be reasonably linked, directly or indirectly, with a particular consumer or household) and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Such Aggregate/Anonymous Data is Arctic Wolf Technology, which Arctic Wolf may use for its business purposes during or after the term of this Agreement.

Examples of Solutions Data in a sentence

  • If Arctic Wolf is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer's cost, if Customer wishes to contest the disclosure.

  • Solutions Data, as defined in Section 10.1 herein, will be retained for the retention period as described in the Solutions Terms.

  • Customer understands Arctic Wolf will aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device, or could be reasonably linked, directly or indirectly, with a particular consumer or household) and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”).

  • Arctic Wolf will implement and maintain industry-standard technical and organizational security measures designed to preserve the security, confidentiality, and integrity of Solutions Data possessed or maintained by Arctic Wolf in connection with the Solutions provided under this Agreement (the “Security Measures”).

  • Arctic Wolf will employ appropriate controls as set forth in its SOC2 Report and ISO 27001 certifications to restrict its personnel from processing Solutions Data without authorization (unless required to do so by applicable law) and will ensure that any person authorized by Arctic Wolf to view or process Solutions Data is subject to an obligation of confidentiality and a criminal background check.

  • To the extent any of Arctic Wolf’s subcontractors process, possess, maintain, or otherwise view Solutions Data, Arctic Wolf will enter into an agreement with each subcontractor that obligates the subcontractor to protect the Solutions Data in a manner substantially similar to the standards set forth in this Section 10.6.

  • Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer.

  • Except as otherwise required by law, Arctic Wolf will remove, delete, or otherwise destroy all copies of Solutions Data and Confidential Information in its possession upon the earlier of (i) the return of the Equipment, if applicable, to Arctic Wolf, or (ii) one hundred-twenty (120) days following termination.

  • As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data).

  • Customer acknowledges and agrees that Administrators will be able to view all Solutions Data and other traffic and activities that occur on Customer’s network and that Customer is responsible for all activities that occur under Administrator accounts.


More Definitions of Solutions Data

Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. "Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. Customer understands Arctic Wolf will aggregate Solutions Data with Arctic Wolf’s other data so that results are non-personally identifiable (individual identities have been removed and are not linked or reasonably linked to any individual, including via a device, or could be reasonably linked, directly or indirectly, with a particular consumer or household) and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Such Aggregate/Anonymous Data is Arctic Wolf Technology, which Arctic Wolf may use for its business purposes during or after the term of this Agreement.
Solutions Data means, depending on the Solution deployed, the operational system log data and any other information which Customer may elect to submit to SharkStriker through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data. As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any SharkStriker Technology used with the Solutions Data). Customer hereby grants SharkStriker, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. If SharkStriker is compelled by law to disclose Solutions Data or its summary reports related thereto, it shall provide prior notice of such compelled disclosure (to the extent legally permitted) and reasonable assistance, at Customer’s cost, if Customer wishes to contest the disclosure. Customer hereby authorizes SharkStriker to aggregate Solutions Data with other data so that results are non-personally identifiable with respect to Customer and collect anonymous technical logs and data regarding Customer’s use of the Solutions (“Aggregate/Anonymous Data”). Notwithstanding anything to the contrary herein, such Aggregate/Anonymous Data will be deemed SharkStriker Technology, which SharkStriker may use for any business purpose during or after the term of this Agreement, including without limitation to develop and improve the Solutions and to create and distribute reports and other materials. Customer understands, and hereby consents, that Solutions Data may be accessed by SharkStriker and its non- US Affiliates and their non-US citizen employees.
Solutions Data shall have the meaning set forth in the Agreement.
Solutions Data means, depending on the Solution deployed, the operational system log data and any other information provided by Customer in furtherance of its use of the Solutions and which Customer may elect to submit to Arctic Wolf through the Solutions, including, but not limited to operational values, event logs, and network data such as flow, HTTPS, TLS, DNS metadata, cursory inventory data, operating systems and versions, users and groups from Active Directory, system level inventory, event data, and network vulnerability data, but excluding Threat Intelligence Data (as defined below). As between the parties, Customer shall retain all right, title and interest (including any and all intellectual property rights) in and to the Solutions Data (excluding any Arctic Wolf Technology used with the Solutions Data). Customer hereby grants Arctic Wolf, during the term of the Agreement, a non-exclusive, worldwide, royalty-free right to collect, use, copy, store, transmit, modify and create derivative works of the Solutions Data solely to the extent necessary to provide the Solutions to Customer. The location of the storage of raw Solutions Data within Arctic Wolf’s third party service providersdata centers will be as set forth in the Solutions Terms. "Threat Intelligence Data" means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).

Related to Solutions Data

  • Information technology services means services designed to do any of the following:

  • UNICEF Data means any and all information or data in digital form or processed or held in digital form that

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Information Technology (IT) System means the combination of hardware components, software, and other equipment to make a system whose core purpose is to accomplish a data processing need such as the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission or reception of data. IT systems include ground systems in support of flight hardware. IT systems do not include—

  • Study Data shall have the meaning set forth in Section 8.1.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Information Technology (IT means data processing, telecommunications, and office systems technologies and services:

  • Information processing system means an electronic system for creating, generating, sending, receiving, storing, displaying, or processing information.

  • User Data means any Personal Data or other data or information collected by or on behalf of the Company or any of its Subsidiaries from users of any Company Product or website of the Company or any of its Subsidiaries.

  • Data means recorded information, regardless of form, the media on which it is recorded, or the method of recording.

  • Pseudonymous data means information that cannot be attributed to a specific individual without the use of additional information provided that it is kept separately and subject to appropriate technical and organizational measures to ensure that it is not attributed to the individual.

  • Data Services The Customer will receive a discount equal to 25% for the following Data Services: Access: Standard VBS2 Guide local loop charges for DS-1 Access and DS-3 Access Service.

  • Research Data means documents in a digital form, other than scientific publications, which are collected or produced in the course of scientific research activities and are used as evidence in the research process, or are commonly accepted in the research community as necessary to validate research findings and results;

  • Technical data means recorded information, regardless of the form or method of the recording, of a scientific or technical nature (including computer software documentation). The term does not include computer software or data incidental to contract administration, such as financial and/or management information.

  • Clinical Data means the information concerning the safety or performance that is generated from the use of a device and that are sourced from the following:

  • End User Data means any information or data of any kind that personally identifies (or that can be used, together with other information or data, to personally identify) an End User.

  • Customer Usage Data means the Telecommunications Services usage data of a CLEC End User measured in minutes, sub-minute increments, message units, or otherwise, that is recorded by SBC-13STATE and forwarded to CLEC.

  • Confidential System Information means any communication or record (whether oral, written, electronically stored or transmitted, or in any other form) provided to or made available to Grantee; or that Grantee may create, receive, maintain, use, disclose or have access to on behalf of HHSC or through performance of the Project, which is not designated as Confidential Information in a Data Use Agreement.

  • input data means data provided to or directly acquired by an AI system on the basis of which the system produces an output;

  • System Data means data and data elements collected by the SaaS Software, SaaS Service or Licensor’s computer systems regarding configuration, environment, usage, performance, vulnerabilities and security of the SaaS Software or SaaS Service that may be used to generate logs, statistics and reports regarding performance, availability, integrity and security of the SaaS Software.

  • Sensitive Data means a category of personal data that includes: