Data provision under the Supplemental Agreement

February 5, 2024

ID 227613

View the Statement on Data Processing

By accepting the terms of the Statement on Data Processing, you agree to automatically submit the information to Kaspersky via the installed application. The following data is processed:

  • battery level and battery discharge rate;
  • event date and time;
  • additional information about OS features;
  • information on network bandwidth and its usage;
  • number of processor cores;
  • logical processors count;
  • current and maximum processor frequency;
  • CPU usage information;
  • information on disk usage (IOPS);
  • disk operations count;
  • device ID;
  • information about system memory usage by the Software;
  • operating system family;
  • OS version, OS build number, OS update number, OS edition, extended information about the OS edition;
  • OS Service Pack version;
  • type of hardware platform;
  • physical RAM size;
  • data about a third-party application that had caused an error: the application image file name and path, the application image file size and checksum (MD5, SHA256, SHA-1), the application process identifier (PID), date and time of the application process image file compiling and creation, application process memory stack and application process memory address where an error had occurred, application uptime before the error had occurred, names, versions and checksums (MD5, SHA256, SHA-1) of the application components' files;
  • Software language ID;
  • date and time of creating an executable file being processed;
  • application image size;
  • checksum (MD5) of the object being processed;
  • name of the object being processed;
  • Software name;
  • version of the object being processed;
  • path to the object being processed;
  • directory code;
  • process system ID (PID);
  • version of the Software's component;
  • full version of the Software;
  • Software update ID;
  • Software ID;
  • Software localization;
  • Software rebranding ID;
  • type of installed Software;
  • the memory stack of the Software process failure;
  • flag indicating whether the user has accepted the terms of the legal agreement while using the Software;
  • type of legal agreement accepted by the user while using the Software;
  • date and time when the user accepted the Agreement terms while using the Software;
  • version of the legal agreement accepted by the user while using the Software;
  • type of the hard drive;
  • calculated size of the hard drive;
  • name of the module in which the failure probably occurred;
  • name of the process that caused software failure;
  • duration of software operation until the failure;
  • Software ID;
  • Software installation/uninstallation status;
  • installation error code;
  • device type (laptop, desktop, tablet);
  • OS type (server, workstation, domain controller);
  • ID of the Software rebranding;
  • installation type (new installation, update);
  • ID of the marketing campaign;
  • volume of inbound traffic;
  • volume of outbound traffic;
  • statistics message type;
  • duration of third-party software operation until the failure;
  • memory address with an offset, in which the third-party software failure occurred;
  • information about failure in third-party software;
  • name from the system log for the error occurred in third-party software.
  • TFU ID of a company;
  • step ID of the update process;
  • step of the update process;
  • number of update attempts;
  • update error code;
  • error message containing additional information about the current state of the application;
  • start time of the fist update attempt;
  • duration of the last update attempt;
  • targeting status;
  • registration form type;
  • message indicating whether the operation was completed successfully;
  • flag indicating whether the registration is complete;
  • display frequency of the registration form;
  • result of the event;
  • flag indicating whether the internet connection is active;
  • scan startup type;
  • date and time of starting the scan operation;
  • duration of the scan session;
  • number of detected applications;
  • number of vulnerable applications;
  • number of new vulnerable applications since the previous scan;
  • number of deleted vulnerable applications since the previous scan;
  • number of updated applications that previously had vulnerabilities;
  • number of vulnerabilities;
  • result of the scan operation;
  • number of attempts to enter the activation code;
  • incorrect activation code error;
  • product activation status.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.