Common use of Data and Security Clause in Contracts

Data and Security. 4.1 Customer grants Tessian and its affiliates a worldwide, non-exclusive, sublicensable, non-transferable license to receive, store and process Customer Data to: (i) provide to Customer the POV Services (including threat insights and other reports); (ii) identify and analyze global threat trends, and (iii) enhance, improve and develop the POV Services; and (iv) generate Threat Intelligence and Usage Data. 4.2 Customer, (i) reserves the right to remove Tessian’s access to Customer Data at any time during the POV Period; and (ii) acknowledges that if such permissions are removed in accordance with (i) above, either prior to the delivery of a Report and/or prior to the end of the POV Period, Customer agrees and understands that Tessian will not be able to, respectively, produce Reports and/or effectively provide POV Services. 4.3 All personal data shall be processed in accordance with Tessian’s Privacy Policy and the Data Protection Exhibit. Tessian will delete its copies of Customer Data if the Customer decides not to proceed with a Tessian product. 4.4 Tessian will comply with the security standards set out in the Data Security Exhibit.

Appears in 1 contract

Sources: Terms of Use

Data and Security. 4.1 Customer grants Tessian and its affiliates a worldwide, non-exclusive, sublicensable, non-transferable license to receive, store and process Customer Data to: (i) provide to Customer the POV Services (including threat insights and other reports); (ii) identify and analyze global threat trends, and (iii) enhance, improve and develop the POV Services; and (iv) generate Threat Intelligence and Usage Data. 4.2 Customer, (i) reserves the right to remove Tessian’s access to Customer Data at any time during the POV Period; and (ii) acknowledges that if such permissions are removed in accordance with (i) above, either prior to the delivery of a Report and/or prior to the end of the POV Period, Customer agrees and understands that Tessian will not be able to, respectively, produce Reports and/or effectively provide POV Services. 4.3 All personal data shall be processed in accordance with Tessian’s Privacy Policy and and, where applicable, the Data Protection Exhibit. Tessian will delete its copies of Customer Data if the Customer decides not to proceed with a Tessian productproduct within 30 days of such decision. 4.4 Tessian will comply with the security standards set out in the Data Security Exhibit.

Appears in 1 contract

Sources: Terms of Use

Data and Security. 4.1 Customer grants Tessian and its affiliates Affiliates a worldwide, non-exclusive, sublicensable, non-transferable license to receive, store and process Customer Data to: and other data derived from Customer’s use of the POV Services, including Threat Intelligence and Usage Data, to (i) provide to Customer Customer, the POV Services (including Services, threat insights and other reports); (ii) identify and analyze global threat trends, and (iii) enhance, improve and develop the POV Services; and (iv) generate Threat Intelligence and Usage Data. 4.2 Customer, (i) reserves the right to remove Tessian’s access to Customer Data at any time during the POV Period; and (ii) acknowledges that if such permissions are removed in accordance with (i) above, either prior to the delivery of a Report and/or prior to the end of the POV Period, Customer agrees and understands that Tessian will not be able to, respectively, produce Reports and/or effectively provide POV Services. 4.3 All personal data shall be processed in accordance with Tessian’s Privacy Policy and the Data Protection Exhibit. Tessian will delete its copies of Customer Data if the Customer decides not to proceed with a Tessian product. 4.4 Tessian will comply with the security standards set out in the Data Security Exhibit.

Appears in 1 contract

Sources: Terms of Use