Threat Intelligence Data definition

Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that:
Threat Intelligence Data means any malware, spyware, virus, worm, trojan, or other potentially malicious or harmful code or files, URLs, DNS data, public IP addresses, network telemetry, commands, processes or techniques, tradecraft used by threat actors, metadata, or other information or data, in each case that is potentially related to unauthorized third parties associated therewith and that: (i) Customer provides to Arctic Wolf in connection with this Agreement, or (ii) is collected or discovered during the course of Arctic Wolf providing Solutions, excluding any such information or data that identifies Customer or to the extent that it includes Personal Data (as defined below) of the data subjects of Customer (but including personal information of threat actors).
Threat Intelligence Data means any information about malware, threats, actual or attempted security events, including but not limited to their frequency, source, associated code or metadata, general identifiers, attacked sectors and geographies that: (i) Customer provides to Sophos in connection with this Agreement, or (ii) is collected or discovered by Sophos in connection with Customer’s access and use of the Product, excluding any information or data that identifies Customer or to the extent that it includes Personal Data. For the avoidance of doubt, Threat Intelligence Data is not Confidential Information of Customer.

Examples of Threat Intelligence Data in a sentence

  • Elastic uses Threat Intelligence Data for threat analysis and mitigation, customer support, product management and improvement, and research and development.

  • Elastic does not share Threat Intelligence Data with third parties.

  • Preempted States from adopting, maintaining, or enforcing any law, rule, or standard regulating an HAV or ADS regarding certain safety evaluation report subject areas.

  • If Customer has deployed endpoint security, the Product(s) may provide Threat Intelligence Data (defined below) to Elastic.

  • Abnormal acknowledges and agrees that it shall not retain, use or disclose CCPA Personal Information for a commercial purpose other than providing the Service and Support, generating Threat Intelligence Data, and performing its obligations under the Agreement.

  • Sophos may collect, access, use, process, transmit, or store Usage Data and Threat Intelligence Data for: (a) product improvement; (b) research and development purposes; and (c) deriving statistical data using information that is aggregated, anonymized, de-identified, or otherwise rendered not reasonably associated or linked to an identifiable individual or to Customer or Users (“Statistical Data”).

  • Confidential Information of Arctic Wolf includes, but is not limited to, Threat Intelligence Data, nonpublic information related to the details and components of the Services and the terms of this Agreement and any SOW.

  • Customer agrees not to, directly or indirectly: (i) modify, translate, copy or create derivative works of the Services or Threat Intelligence Data; (ii) reverse engineer, decompile, disassemble, or otherwise seek to obtain the intellectual property contained within the Services or Threat Intelligence Data; or (iii) remove or obscure any proprietary or other notice, including on any reports or data printed from the Services or Threat Intelligence Data.

  • Arctic Wolf owns and has the right to license, use, and provide Threat Intelligence Data, Services , and any associated documentation.

  • As between Arctic Wolf and Customer, Customer owns all files, data, text, audio, images, video and other content in any form made accessible to Arctic Wolf by or on behalf of Customer, but excluding Threat Intelligence Data (as defined below) (the “Incident Evidence”).


More Definitions of Threat Intelligence Data

Threat Intelligence Data means Customer de-identified data extracted or generated by the Service from Customer Data (i.e., from the malicious emails such as the third-party bad actor’s IP address, email, and name) that do not constitute Customer Data themselves.

Related to Threat Intelligence Data

  • Financial Intelligence Unit means the Financial Intelligence Unit established under section 9(1) of the Financial Intelligence and Anti-Money Laundering Act;

  • Due Diligence Materials means the information to be provided by Seller to Purchaser pursuant to the provisions of Section 4.1 hereof.

  • artificial intelligence system (AI system) means software that is developed with one or more of the techniques and approaches listed in Annex I and can, for a given set of human-defined objectives, generate outputs such as content, predictions, recommendations, or decisions influencing the environments they interact with;

  • GLO Data means any data or information owned by the GLO, including PII or SPI as defined below, that Provider creates, obtains, accesses (via records, systems, or otherwise), receives (from the GLO or on behalf of the GLO), or uses in the performance of the Contract or any documents related thereto.

  • Authority Software means software which is owned by or licensed to the Authority, including software which is, or will be used by the Contractor for the purpose of providing the Services but excluding the Contractor Software.

  • Natural Resource Damages or “NRD” means any damages recoverable by the United States or the State on behalf of the public for injury to, destruction of, or loss or impairment of Natural Resources at the Site as a result of a release of hazardous substances, including but not limited to: (i) the costs of assessing such injury, destruction, or loss or impairment arising from or relating to such a release; (ii) the costs of restoration, rehabilitation, or replacement of injured or lost natural resources or of acquisition of equivalent resources; (iii) the costs of planning such restoration activities; (iv) compensation for injury, destruction, loss, impairment, diminution in value, or loss of use of natural resources; and (v) each of the categories of recoverable damages described in 43 C.F.R. § 11.15 and applicable state law.

  • Due Diligence Information means any information supplied to the Supplier by or on behalf of the Customer prior to the Call Off Commencement Date;

  • SRS means the scheme referred to by the Ministry of Finance as the Supplementary Retirement Scheme or such other scheme as shall replace or supersede the Supplementary Retirement Scheme from time to time.

  • Information technology services means services designed to do any of the following:

  • Cloud Materials means any materials provided or developed by SAP (independently or with Provider’s cooperation) in the course of performance under the Agreement, including in the delivery of any support or Consulting Services to Provider or its Customers. Cloud Materials do not include any Customer Data, Provider Confidential Information, or the SAP Cloud Service.

  • Contractor information system means an information system belonging to, or operated by or for, the Contractor.

  • Nonpoint source pollution means pollution such as sediment, nitrogen, phosphorous, hydrocarbons, heavy metals, and toxics whose sources cannot be pinpointed but rather are washed from the land surface in a diffuse manner by stormwater runoff.

  • Artificial intelligence or “AI” means technology that can make decisions, create predictions,

  • Federal contract information means information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the Government, but not including information provided by the Government to the public (such as on public Web sites) or simple transactional information, such as necessary to process payments.

  • Technology startup company means a for profit business that

  • Business Software means with respect to a Licensor, all Software to the extent Controlled by such Licensor or any of its Affiliates as of the Effective Date, which Software is reasonably required as of the Effective Date for the conduct of (i) the Agriculture Business if the Licensee is AgCo, including as listed on section (i) of Schedule Q, or (ii) the Materials Science Business if the Licensee is MatCo, including as listed on section (ii) of Schedule Q, in each case (in respect of the foregoing (i) and (ii)), only if and to the extent such Licensee and its Affiliates have not been granted a license or other rights to use such Software under the Separation Agreement or any other Ancillary Agreement. Notwithstanding the foregoing, Business Software expressly excludes any and all Excluded IP.

  • Stopover means a scheduled stop on your journey, at a point between the place of departure and the place of destination.

  • Environmental Management System means an environmental management system or plan of management to address all environmental risks and to ensure compliance with all Environmental Laws and licences;

  • Covered contractor information system means an information system that is owned or operated by a contractor that processes, stores, or transmits Federal contract information.

  • Information Technology Resources means agency budgetary resources, personnel, equipment, facilities, or services that are primarily used in the management, operation, acquisition, disposition, and transformation, or other activity related to the lifecycle of information technology; acquisitions or interagency agreements that include information technology and the services or equipment provided by such acquisitions or interagency agreements; but does not include grants to third parties which establish or support information technology not operated directly by the Federal Government. (0MB M-15-14)

  • Firefighter means any regular, paid or volunteer, member of a lawfully constituted fire department of a municipal corporation, township, fire district, or village.

  • Buyer Data means all data, records, files, information or content, including text, sound, video, images and software, that is (a) input or uploaded by Buyer or its Users to or collected, received, transmitted, processed, or stored by Buyer or its Users using the Software or SaaS Service in connection with this Agreement, or (b) derived from (a). Buyer Data is Confidential Information of Buyer.

  • Comprehensive resource analysis means an analysis including,

  • Computer Systems means all computer hardware, peripheral equipment, software and firmware, technology infrastructure and other computer systems and services that are used by the Company to receive, store, process or transmit data.

  • Waste Materials means any Contamination-causing solid, semi-solid, or liquid material discarded, buried, or otherwise present on the Property, and may include sludge, slag, or solid waste materials such as empty containers and demolition debris or materials containing asbestos, lead-based paint, or petroleum or other contaminants.

  • Computer data means any representation of facts, information or concepts in a form suitable for processing in a computer system, including a program suitable to cause a computer system to perform a function;