About data provision (Non European Union)
End User License Agreement
You agree to automatically provide the information indicated below via the software installed by you, copyrighted to AO Kaspersky Lab (hereinafter Kaspersky Lab, the Copyright Holder), to Kaspersky Lab in order to increase the level of operational protection and to facilitate the preparation of the most suitable informative and advertising offers, to obtain data about the worldwide distribution of the software, to improve the quality of the operation of the software, and to promptly identify and remedy errors connected with the mechanism for installing the product, as well as to calculate the number of users:
- Name of the wireless network (SSID) to which the computer is connected when providing the data, checksums (MD5 and SHA256) of the MAC address (BSSID) of the access point, identifier of the type of authentication when connecting to the wireless network, security settings, checksums (SHA256) obtained from the use of a unique computer identifier, unique identifier of the software installation on the computer, names of the wireless network and MAC addresses of the access point, list of the available wireless networks when providing the data, DHCP settings, domain name and checksum (SHA256) of the path from the URL address of the service providing Internet access, WPS access point (Wi-Fi Protected Setup).
- Information about the software: the installation date, full version, information about installed software updates, software identifiers, identifier of the language localization, identifier of the software settings version, KSN participation.
- Information about the installed license: the dates of activation of the license and its expiry date, identifier of the license and identifier of the type of license, period of validity of the license and number of days until the license expires when providing the data, identifier and full name of the partner selling the license, as well as the country where the partner is located, current status of the license, proprietary information about the license, identifier of the sequence of licenses used, version of the communications protocol with the Copyright Holder service center, changes in information about the use of the license for information purposes, identifier of the software operating mode, connection of the software to a web portal, identifier of the User within the services of the Copyright Holder. The following will also be provided: identifiers of offers received in the archive, information about the type of operation carried out by the User, indicating the offer, identifier and type of offer, identifier of links or buttons within the offer, identifiers of offers read by the User.
- TARGET filter of the update task, information about activation of Device Guard mode, name of the file to be scanned, path to this file and path pattern code, checksums (MD5 and SHA256) and size of the file and its package (if the file has been packed), types and checksums (MD5) of templates for statistical information about the file, version of the anti-virus databases used, result of verifying the file and additional information about the verification conditions.
- Information about installation of the software on the computer: the unique computer identifier, unique identifier of the software installation, identifier of the type of installation and identifier of the results of the installation of other applications installed together with the software, identifier of the result of completion of the software installation task on the computer.
- Type, name and model of the computer on which the software has been or is being installed.
- Information about the operating system (OS) of the computer: the type of operating system, edition and full version of the OS, and updates installed.
- Status of the user’s acceptance of the terms of the agreement, type of agreement, version of the agreement.
The transferred information does not contain personal data or other confidential information of the User and will be used to ensure the operation of the Copyright Holders' software, unless indicated otherwise.
The information received will be protected by the Copyright Holder in accordance with established legal requirements and is required to ensure the operation of the software licensed by you.
Kaspersky Lab may use the statistical data obtained, generated based on the information collected, to monitor trends in the field of computer security threats and to publish the corresponding reports.
Kaspersky Security Network Statement
In order to detect new data security threats and increase the protection of the data stored and processed by the user with a computer, the User agrees to provide the following information:
- Information about the operating system (OS) installed on the computer and installed updates.
- Information about the Copyright Holder's installed software and the anti-virus protection status: the version of the Software, the unique software identifiers on the computer, information about updates.
- Information about all scanned objects and actions: the name of the scanned object, the date and time of the scan, the URL and Referrer from which it was downloaded, the names and size of scanned files and the paths to them, a sign in the archive, the date and time of file creation, the name of the packer (if the file was packed), the file's entropy, the file's type, the file type code, identifier and format, the URL from which the object is downloaded, the object's checksum (MD5), the type and value of the object's supplementary checksum, data about the object's digital signature (certificate), number of starts of the object since the last statistics sending the task identifier of the software that performed the scan.
For executable files: sign of sending service information, reputation verification flag or file signature flag, name, type, ID, type, checksum (MD5) and the size of the application that was loaded by the object being validated, the application path and template paths, a sign of the Autorun list, date of entry, the list of attributes, name of the Packer, information about the digital signature of the application: the publisher certificate, the name of the uploaded file in the MIME format.
- Information about the running applications and their modules: checksums (MD5, SHA256) of running files, size, attributes, creation date, and PE-file header information, names of packers (if the file was packed), code of the account under which the process has been started, command line parameters used to start the process, names of files and their modules, the checksums of the files (SHA256), running of the executable file, the identifier conditions for the formation of statistics based on the information provided, an identifier of the existence and validity of the data provided in the statistics.
- Information about processes running on the system (process ID (PID), process name, information about the account the process was started from, the application and command that started the process, the full path to the process’s files, and the starting command line, an indication whether the process’s file has autorun status, a description of the product that the process belongs to ( the name of the product and information about the publisher), as well as digital certificates being used and information needed to verify their authenticity or information about the absence of a file’s digital signature), and information about the modules loaded into the processes: their names, sizes, types, creation dates, attributes, checksums (MD5, SHA2-256, SHA1), the paths to them, PE-file header information, names of packers (if the file was packed), IP-addresses (IPv4 or IPv6) of visited websites, the domain name, the method for determining the domain name, the sign indicating the domain name has entered the list, the name of the file of the process that opened the website, the size and checksums (MD5, SHA2-256) of the process’s file, the path to the process’s file and the template code of the file path, the result of the file’s certificate validation, the User Agent string, the storage duration of this information prior to being sent to KSN, the result of the file’s validation by KSN.
-
If threats or vulnerabilities are detected, in addition to information about the detected object, information is provided about the identifier, version, and type of the record in the anti-virus database, the name of the threat based on the Copyright Holder's classification, the checksum (MD5, SHA2-256, SHA1) of the application file that requested the URL where the threat was detected, the IP address (IPv4 or IPv6) of the detected threat, the identifier of the type of traffic on which the threat was detected, the vulnerability identifier and its threat level, the URL of the web page where the vulnerability was detected, the intermediate results of object analysis, and the flag for the silent detection of the object.
- Information about network attacks: the IP address of the attacking computer and the user's computer's port number at which the network attack is directed, the identifier of the protocol used to carry out the attack, and the name and type of attack.
- The URL and IP address of the web page where harmful or suspicious content was detected, the name, size, and checksum of the file that requested the URL, the identifier and weight of the rule used to reach scanning results, the objective of the attack.
- Information about changes made by the user in the list of web sites protected by the Safe Money component: the URL of the web site, a flag indicating a web site has been added, modified, or deleted, the mode in which Safe Money runs for the web site.
- Aggregated data from the results of scanning using the local and cloud KSN databases: the number of unique unknown objects, the number of unique trusted objects, the number unique untrusted objects; the total number of «unknown object», «trusted object» and «untrusted objects» statuses, the number of objects trusted based on validation of a certificate, designated as trusted based on a trusted URL, recognized as trusted based on the transfer of trust from a trusted process; the number of unknown objects for which no decision regarding trust has been made, the number of objects that the user has designated as trusted. Version of the local KSN database on the computer at the time the statistics are sent, the software's database settings identifier, information about successful/unsuccessful requests to KSN, the duration of sessions with KSN, the amount of data sent and received, the times at which the collection of information to be sent to KSN was started and stopped.
- Information about the Private Browsing component: the Referrer from the http tracking request, the name of the service or organization which provides tracking services, the category of the tracking service in accordance with the Copyright Holder’s categorization, ID and the version of the browser, which opened the URL.
- If a potentially malicious object is detected, information is provided about data in the processes’ memory, elements of the system object hierarchy (ObjectManager), data in UEFI BIOS memory, names of registry keys and their values.
- Information about events in the systems logs: the event’s timestamp, the name of the log in which the event was found, type and category of the event, name of the event’s source and the event’s description.
- Information about network connections: version and checksums (MD5, SHA2-256, SHA1) of the file from which process was started that opened the port, the path to the process’s file and its digital signature, local and remote IP-addresses, numbers of local and remote connection ports, connection state, timestamp of the port’s opening.
- Information about the wireless network connection being used by the computer: the name of the wireless network, the checksum (MD5 and SHA256) of the MAC-address of the access point, flag indicating whether the computer is running on battery power or a stationary power supply, DNS flag, the type of the computer, information about wireless network type and security; the unique identifiers, made using a unique identifier of the computer, unique identifier of the software installation, name of the wireless network and MAC-address of the access point; information about the available wireless networks: the name of the wireless network, the MAC-address of the access point, information about the wireless network’s security and signal quality; flag for use of the VPN connection, the category of the wireless network specified in the software, DHCP settings, the checksum (SHA256) of the IP-address (IPv4 and IPv6) of the computer, the domain name and the checksum (SHA256) of the path from the URL-address of the captive portal; WPS settings of the access points: the checksums of the name and serial number of the wireless device, the number and name of the wireless device model, the name of its manufacturer; local time at the start and end of the wireless connection session, the list of available wireless access points and their parameters.
The Kaspersky Security Network service may process and submit whole files, objects detected through malicious links which might be used by criminals to harm your computer and/or their parts, to Kaspersky Lab for additional examination.
Additionally, to prevent incidents and investigate those that do occur, trusted executable and non-executable files, application activity reports, portions of the computer's RAM, and the operating system's boot sector may be sent, as well as the following information about files and processes:
- The names and paths of the files that were accessed by the process.
- Names of registry keys and their values that were accessed by the process.
- URL- and IP-addresses that were accessed by the process.
- URL- and IP-addresses from which the running file was downloaded.
To improve the quality of Kaspersky Lab’s products, the User agrees to provide Kaspersky Lab with the following information:
- Information about the use of the product's user interface, information about the opening of the interface's windows (identifiers and names of windows and used control elements) and switching between windows, information that determines the reason for opening a window, the date and time the interface was started and the stages of interface's startup, the time and type of the user's interaction with the interface, information about changes to settings and product parameters (the name of the setting or parameter, and the old and new values).
- The ID of the application in interactive mode.
- Information about updates of the installed product and anti-virus databases: the IP address (IPv4 or IPv6) of the update source being used, the type of the update task, the number and total size of files downloaded during an update, the average download speed for the update files, the average speed for network operations during the update, the completion status of the update task, the type of an error that may occur during an update, the number of unsuccessful updates, the identifier of the product component that performs updates.
- Information about the versions of the operating system and installed updates, current and default OS language settings, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode.
- Information about the software installed on the computer: the name of the software and the name of its publisher, information about registry keys and their values; information about software components files: checksums (MD5, SHA2-256, SHA1), name of a file, its path on the computer, size, version and digital signature.
- Information about hardware installed on the computer: type, name, model name, firmware version, parameters of built-in and connected devices.
- Information about the last unsuccessful OS restart, the number of unsuccessful restarts.
When participating in KSN, the User agrees to provide the following information for all purposes mentioned above:
- The unique software installation identifier.
- The full version of the installed software.
- The type identifier of the installed software.
- The unique identifier of the computer with the installed software.
Kaspersky Lab protects the information received in accordance with the law and Kaspersky Lab's rules.
Kaspersky Lab uses the information received only in an anonymized form as part of aggregated statistics. These aggregated statistics are generated automatically from the original information received and do not contain personal information or any other confidential information. Initial information received is destroyed upon accumulation (once a year). General statistics are kept indefinitely.
Read Kaspersky Security Network Statement
-
In the menu bar, click the application icon and choose Preferences.
The application preferences window opens.
- On the KSN tab, in the Improved protection section, click the Show KSN Statement button.
You agree to submit the following information for the purpose of Software identification during database and module updates:
- Software ID (AppID).
- Active license ID.
- Unique Software installation ID (InstallationID).
- Unique Update task launch ID (SessionID).
- Version of Software (BuildInfo).
- Information about updating the Updater component: unsuccessful update tasks, the number of failed starts after the upgrade, the version of the component, the error code, the ID of the type of update task, the status code of the software after the update, the date and time the statistics is sent.
To check the legitimacy of the Software use, the Copyright Holder reserves the right to verify that You have a licensed copy of the Software.
The Software can transmit the following license information needed to verify the legitimacy of the Software use to the Copyright Holder:
- Identifier of regional activation center.
- Hashsum of activation code.
- Time and date of ticket creation.
- License information identifier.
- License ticket identifier.
- License ticket sequence identifier.
- Unique identifier of user's computer HDD.
- Date of from which the license ticket is valid.
- The current state of license.
- License version.
- Ticket header ID.
- Application ID of the currently used application.
- List of application IDs of applications that are compatible with the currently used application.
- Localization ID.
- Application version.
- Installation ID.
- Application build ID.
Files (or their parts) that may be exploited by intruders to harm the Computer or data may be also sent to Kaspersky Lab to be examined additionally.
Kaspersky Lab protects any information thus received in accordance with law and applicable Kaspersky Lab rules.
Kaspersky Lab uses any received information in anonymized form and as general statistics only. Aggregate statistics are automatically generated from the source information received, and do not contain any personal or other confidential data. The original information received is destroyed as new information is accumulated (once a year). Aggregate statistics are stored indefinitely.
Page top