Information provision (European Union)
You can view information about the data provided to Kaspersky using previous versions of the application:
When distributed in the European Union, Kaspersky Security Cloud complies with the terms of the General Data Protection Regulation (GDPR).
During the Kaspersky Security Cloud installation, you will be asked to read and accept the terms and conditions of the End User License Agreement and the Privacy Policy. When you accept the End User License Agreement, you confirm that you are of the required age to install Kaspersky Security Cloud within the European Union.
You will also be asked to accept the KSN Statement and the Marketing Statement, which allow Kaspersky to offer you additional benefits. If you choose to accept these statements, you can still revoke your acceptance in the application preferences at any time.
End User License Agreement
For the Rightholder and/or its Partners to fulfill their obligations under this License Agreement, the Rightholder needs to receive and process information described in Section B Clause 1 for the declared purposes. Such information may be considered personal according to applicable laws of certain countries.
Software activation and verification of the legality of Software use.
The Rightholder has to verify that the license You will use is legal during activation and use of the Software. To do so the Rightholder has to process and receive the following information about the Software, the license You have acquired, and the Computer where You will install the Software, specifically: the type, version and localization of the installed Software, versions of the installed updates, the identifier of the Computer and the identifier of the Software installation on the Computer, the activation code and the unique identifier of activation of the current license, the type, version and word size of the operating system, the name of the virtual environment if the Software is installed in the virtual environment, and identifiers of the Software components that are active at the time the information is provided.
Management of Computer protection and acquired licenses via the My Kaspersky website.
The My Kaspersky website helps You remotely manage Your acquired licenses and the protection of your Computer. This functionality requires that the Rightholder receive from Your Computer and process information about the Software, the acquired license, information about the Computer, specifically:
- Product activation code, status and type of the activated license, information about license activation error, expiration date of effective license validity period, information about additional installed licenses.
- Device type, information about the version of the operating system installed on the device and installed service packs, device type image.
- Name of the Computer on the network (domain names).
- Regional parameters of the operating system (information about the time zone, default keyboard layout, language of the interface), information about installed Software of the Rightholder, Software operating mode and the status of the antivirus Computer protection: Software version, unique ID of installation of the Software on the Computer, the unique ID of the Computer, ID of the My Kaspersky account.
- Versions of used antivirus databases and the time of their last update.
- Status of the protection components, the list of detected and ignored security problems.
- One-time password for registering the device on My Kaspersky, the reason for disconnecting from My Kaspersky.
- Partner’s rebranding code.
- Page identifier, country and region of My Kaspersky.
- Version of the used protocol.
Providing You with the core functionality of the acquired Software.
The core functionality of the Software as described in the User Manual is to protect the User from known threats to information security. To provide this core functionality, while You are using the Software the Rightholder has to receive from Your device and process information about the installed Software, the acquired license, the scanned objects, detected threats and infections on the Computer, information about the Computer and devices connected thereto, the Computer’s activity on the internet, specifically:
- Data to obtain the authorization session token.
- Connecting Software to My Kaspersky.
- Information about sites visited: the sites’ web addresses, the initial domain parts of web addresses that the User entered in the browser address bar or accessed from a search engine.
- Taking or not taking part in the KSN.
- The row with information about linking the activation code with the User: the unique User identifier on My Kaspersky, the Software activation code, the license ownership type (owner/not owner), the KPC Infra signature.
- Country and region of the Kaspersky Lab site from which the trial version of the Software was downloaded.
- User email address that is used to connect to My Kaspersky.
- The page on My Kaspersky to which the link from the Software directs.
- Information indicating the interface element from which the User decided to purchase the Software.
- Information about licensing: software activation code, purchased activation codes, date and time of Software activation, activation error, expiration date and time of the active license during Software installation, number of days that have elapsed since Software activation, number of days left before license expiration, number of days that have elapsed since license expiration, total number of days of license activity, type of installed license, license activation date, license expiration date, license key serial number, license ID, ticket sequence ID, current license status, current subscription status, validity period of the installed license, title of the license ticket, subscription type, subscription state, subscription state reason, subscription expiration date, ID of the subscription provider’s data schema, additional information about the subscription provider, general information about the licenses in the Software, information about the activated license: identifier and validity period, information about the trial version of the Software, order number under which the license was purchased, ID of the price-list position for which the license was issued, identifier of the Software for which the license is intended, reason for the current subscription status/modification, subscription expiration date, license term, trial period reset flag, order number, price-list position ID, additional license info, customer name.
- Information about the partner: identifier of the partner who sold the license, country in which the partner who sold the license is located, partner’s order number under which the license was sold, full name of the partner for whom the order for the license was issued.
- Data about the license for identifying a group of Users by additional properties of the subscription license.
- Data about the license for identifying a group of Users of the company that purchased the license by the information comment in the license properties.
- Information about the Software: version of the installed Software, build number of the Software without autopatches, ISO 15924 code for the Software’s locale, software version patch, software installation date and time, the Software’s ISO 639-1 language code, unique software installation identifier, type of installed Software, the ISO 3166-1 Alpha-2 country code, software locale, software region, software rebranding identifier, software ID, customization ID, rebranding code, trial version reset state, My Kaspersky connection state, My Kaspersky User ID, timestamp of current updates index, timestamp of uploaded updates index, software component ID, timestamp of current component updates, timestamp of uploaded component updates, error category code, update target used, ID of the component that initiated the reputation request, ID of the component that initiated the sending of a package, ID of the package or reputation request sending scenario.
- Information about User’s device: User device ID, hash of the identifier of the User's Computer, date and time on the User's Computer, device type, device vendor, device OS, obfuscated device name (XOR with sha256(device MAC-address)), Identifier of the installed product, data identifying technology.
- Information about operating system: bitness of the operating system (for example, 32-bit or 64-bit), operating system family (for example, Windows or Mac), operating system type, operating system version, operating system service pack, operating system edition, operating system platform ID, operating system properties, operating system processor type.
- Status of the User’s acceptance of the terms of the agreement, type of the agreement, version of the agreement, agreement acceptance state.
- Network name of the device, device platform, operating system type (for example, Windows, macOS).
- Identifier that is issued by the service upon successful registration of the Software (service) and is used to authenticate and register services on this device thereafter.
- Type of the token, device type, unique identifier of the device on My Kaspersky. The activation service uses this parameter to get the following information: User account ID, ID of the device on which the Software was installed, service identifier (it can contain several identifiers if several products are installed on the device).
- Service parameter indicating that the purchase will occur within the Software window.
- Information for registering the Software on My Kaspersky: User ID, device ID and Software information.
- The time of acceptance of the agreement.
- Previous ID of the Software on My Kaspersky.
- One-time password for automatic connection of the Software downloaded from the My Kaspersky account.
- Information about the reasons for disconnecting the Software from My Kaspersky.
- Protocol over which the statistical data was received (for example, HTTPS or TCP).
- Identifier of the information pattern that is used when granting the license.
- Identifier of the service of the Software that transferred the license activation request.
- Identifier of launching of the Software update.
- Set of identifiers of the applications that can be activated on the User's Computer.
- Date and time of sending of statistics.
- Identifier of the User’s action type.
- Web address used for the information request, protocol type, parent web address (from which the web address was received), port number.
- Information about checked files: file certificate thumbprint, hash of the certificate public key, hashes of the checked objects or parts of the objects.
- Information about web site certificate: domain, IP address of the checked site, connection port, certificate hash, certificate type, certificate content.
- Information about detect: detect name, record ID, record revision, record type.
- Information on the Computer's connection to the wireless network: the name of the wireless network (SSID), the wireless network authentication type, the wireless network encoding type, the checksum (MD5 and SHA256) and name of the access point MAC-address; the unique identifiers compiled using a unique Computer identifier, the unique Computer installation identifier; the security level of the wireless network, the wireless network category, the attribute for the DNS name; the DHCP data of connection settings to the network: the checksum (SHA256) of the IP-address (IPv4 and IPv6) of the DNS-servers, the checksum (SHA256) of the local IP-address (IPv4 and IPv6), the checksum (SHA256) of the local IP-address (IPv4 and IPv6) of the gate, the checksum (SHA256) of the subnet mask and network prefix length, list of available networks.
- Information about the mode of monitoring of devices in the Wi-Fi network, MAC address of the device, detected in the User’s network.
- Status of the connected device: unknown device, untrusted device, trusted device.
- Information about the number of launches of installed products: hash of the launched products (MD5), format of the launched files.
- Page in the Knowledge Base to which the link from the Software directs.
- Time of getting the information about the event.
- Information about detecting the operating system's weak security settings, the User’s choice regarding weak security settings, the mode of launching the task for searching for weak security settings, the result of the task for searching for weak security settings, the number of weak security settings detected, the possibility to remotely fix the weak security settings detected, and the processed weak security settings detected, bunching the security settings' importance level, identifier of use of the Computer by a child.
- Hash of the User’s login.
- Information about Wi-Fi network: Wi-Fi network ID (router MAC-address hash), Wi-Fi network type, device ID (device MAC-address hash + User identifier on My Kaspersky (hash(MAC+User identifier on My Kaspersky)), device status.
- Unique ID of the content delivered by the Product and read by the User, protocol version.
Kaspersky Security Network Statement
Certain data which is processed under this KSN Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this KSN Statement:
- Information about the operating system (OS) installed on the Computer and installed updates, current and default OS language settings, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode, the last unsuccessful OS restart, the number of unsuccessful restarts.
- Information about the Rightholder's installed Software and the anti-virus protection status: the full version of the Software, the unique Software identifiers on the Computer, the type identifier of the installed Software, information about updates.
- Information about all detected objects (including silent detect) and actions: the name of the detected object, the date and time of the detection, the URL and Referrer from which it was downloaded, the names and size of the detected files and their paths, the date and time of file creation, the file's entropy, the file's type, the file type code, identifier and format, the URL from which the object was downloaded, the object's checksum (MD5), the type and value of the object's supplementary checksum, data about the object's digital signature (certificate), number of starts of the object since statistics were last sent, ID of the Software scanning task. If the file was packed: name of the packer, size of the packer, size of the archived object, technical parameters of the applicable detection technologies.
For executable files: sign of sending service information, reputation verification flag or file signature flag, name, type, ID, type, checksum (MD5) and the size of the application that was loaded by the object being validated, the application path and template paths, a sign of the Autorun list, date of entry, the list of attributes, name of the Packer, information about the digital signature of the application: the publisher certificate, the name of the uploaded file in the MIME format.
- If threats or vulnerabilities are detected, in addition to information about the detected object, information is provided about the identifier, version, and type of the record in the anti-virus database, the name of the threat based on the Rightholder's classification, the checksum (MD5, SHA2-256, SHA1) of the application file that requested the URL where the threat was detected, the IP address (IPv4 or IPv6) of the detected threat, the identifier of the type of traffic on which the threat was detected, the vulnerability identifier and its threat level, the URL of the web page where the vulnerability was detected, the intermediate results of object analysis, and the flag for the silent detection of the object.
- Information about scanned objects: file type, file checksums (MD5, SHA256, Sha2), file size, file image size, PE-file header subsystem, PE-file header characteristics, number of sections, bit mask from DataDirectory, overlay size, number of found strings, number of found nonrandom strings, vector of DataDirectory objects sorted by RVA, vector of DataDirectory objects sorted by section numbers, cosine hash of the received data, minwise hash of the received data, identifier indicating whether the data sent in force mode, scan type, emulation depth, emulation version, compiler version, object hash, file entropy, frequency of 0s, frequency of numbers, 4-byte DWT vector, virtual section size, real section size.
- Information about the running applications and their modules: checksums (MD5, SHA256) of running files, size, attributes, creation date, and PE-file header information, names of packers (if the file was packed), code of the account under which the process has been started, command line parameters used to start the process, names of files and their modules, the checksums of the files (SHA256), running of the executable file, the identifier conditions for the formation of statistics based on the information provided, an identifier of the existence and validity of the data provided in the statistics.
- Information about application and command that started the process running on the system: process ID (PID), process name, information about the account the process was started from, the full path to the process’s files, and the starting command line, an indication whether the process’s file has autorun status, a description of the product that the process belongs to (the name of the product and information about the publisher), as well as digital certificates being used and information needed to verify their authenticity or information about the absence of a file’s digital signature), and information about the modules loaded into the processes: their names, sizes, types, creation dates, attributes, checksums (MD5, SHA2-256, SHA1), the paths to them, PE-file header information, names of packers (if the file was packed), IP-addresses (IPv4 or IPv6) of visited websites, the domain name, the method for determining the domain name, the sign indicating the domain name has entered the list, the name of the file of the process that opened the website, the size and checksums (MD5, SHA2-256) of the process’s file, the path to the process’s file and the template code of the file path, the result of the file’s certificate validation, the User Agent string, the storage duration of this information prior to being sent to KSN, the result of the file’s validation by KSN.
- Information about network attacks: the IP address of the attacking computer and the port number at which the network attack is directed on the User's Computer, the identifier of the protocol used to carry out the attack, the name and type of attack, and information about the record in the anti-virus database.
- The URL and IP address of the web page where harmful or suspicious content was detected, the name, size, and checksum of the file that requested the URL, the identifier and weight of the rule used to reach scanning results, the objective of the attack.
- Information about changes made by the User in the list of websites protected by the Safe Money component: the URL of the website, a flag indicating that a website has been added, modified or deleted, information about whether the website was added in the Software window or via a browser, URL from which the User opened the website (if the website was added from a browser), information about whether the User chose to remember the change for the website (if the website was added from the browser), information about the mode in which Safe Money runs for the website.
- Information about the use of Kaspersky Security Network (KSN): KSN identifier, software identifier, full version of the application, depersonalized IP address of the user’s device, indicators of the quality of fulfillment of KSN requests, indicators of the quality of the processing of KSN packets, indicators of the number of KSN requests and information about the types of KSN requests, date and time when statistics started being sent, date and time when statistics stopped being sent, KSN protocol version.
- Information about the Website tracking blocking component: the Referrer from the http tracking request, the name of the service or organization which provides tracking services, the category of the tracking service in accordance with the Rightholder’s categorization, ID and the version of the browser, which opened the URL.
- If a potentially malicious object is detected, information is provided about data in the processes’ memory, data in EFI memory.
- Information about events in the systems logs: the event’s timestamp, the name of the log in which the event was found, type and category of the event, name of the event’s source and the event’s description.
- Information about network connections: version and checksums (MD5, SHA2-256, SHA1) of the file from which process was started that opened the port, the path to the process’s file and its digital signature, local and remote IP-addresses, numbers of local and remote connection ports, connection state, timestamp of the port’s opening.
- Information about the wireless network connection being used by the Computer: the checksum (MD5 and SHA256) of the MAC-address of the access point, information about the wireless network’s security and signal quality, flag indicating whether the Computer is running on battery power or a stationary power supply, DNS flag, the type of the Computer, information about wireless network type and security; the unique identifiers, made using a unique identifier of the Computer, unique identifier of the Software installation, name of the wireless network and MAC-address of the access point; flag for use of the VPN connection, the category of the wireless network specified in the Software, DHCP settings, the checksum (SHA256) of the IP-address (IPv4 and IPv6) of the Computer, the domain name and the checksum (SHA256) of the path from the URL-address of the captive portal; WPS settings of the access points: the checksums of the name and serial number of the wireless device, the number and name of the wireless device model, the name of its manufacturer; local time at the start and end of the wireless connection session, the list of available wireless access points and their parameters, the monitoring mode of devices connection to the home wireless network; hash(MachineID+PCID+BSSID), hash(MachineID+PCID+SSID), hash(MachineID+PCID+SSID+BSSID).
- Information about updates of the installed Software and anti-virus databases: the type of the update task, the completion status of the update task, the type of error that may occur during an update, the number of unsuccessful updates, the identifier of the Software component that performs updates, and the database version and date of creation.
- Information about the software installed on the Computer: the name of the software and the name of its publisher, information about registry keys and their values, information about software components files: checksums (MD5, SHA2-256, SHA1), name of a file, its path on the Computer, size, version and digital signature.
- Information about hardware installed on the Computer: type, name, model name, firmware version, parameters of built-in and connected devices.
- Information about devices connected to the wireless network: the MAC-address of the device, the type, the number of characters in the title, the type of installed OS, the manufacturer name, and data from the DHCP packet received from the device.
- Information about files and processes: names and paths of the files that were accessed by the process, URL- and IP-addresses that were accessed by the process, URL- and IP-addresses from which the running file was downloaded.
- Information about device usage by child: hash of the User unique ID, Software type ID, Software full version ID, the time of the verdict generation, current verdict of the child detection engine, the start of time period for which statistics are received, the end of time period for which statistics are received, name of the user in operating system, CRC64 of user SID, default user keyboard layout, this user visited URLs, event time, web-site category, the title of visited web page, the URL of visited page with stripped down user-sensitive info, this user search queries, query category, raw search query of the user, this user software activities, the type of software activity event, the software running time, locally unique process identifier, application name, application category, file MD5, PEGI or ESRB categories of application, minimum required age, location information, country identifier, city identifier, OS language identifier, child detection engine version, hash of the Computer ID, the user time zone difference in minutes.
The Kaspersky Security Network service may process and submit whole files (for example, objects detected through malicious links which might be used by criminals to harm your Computer) and/or their parts to Kaspersky Lab for additional examination.
Also, in order to achieve the declared purpose of increasing the effectiveness of protection provided by the Software, the Rightholder may receive objects that could be exploited by intruders to harm the Computer and create information security threats. Such objects are:
- Executable or non-executable files or parts thereof
- Computer's RAM areas
- Sectors involved in the OS boot process
- Network traffic data packages
- Web pages and emails containing suspicious or malicious objects
- Description of classes and class instances for the WMI storage
- Application activity reports
Such application activity reports contain the following information about the files and processes:
- Name, size, and version of the file being sent, it's description and checksums (MD5, SHA2-256, SHA1), format ID, its manufacturer's name, the name of the product the file belongs to, the fully qualified path to the file on the Computer and the path template code, date and time of file creation and update
- Certificate validity start and end dates and times if the file being sent has a digital signature, date and time when the certificate was signed, name of the certificate issuer, information about the certificate holder, impression and public key of the certificate and algorithms used to calculate them, certificate serial number
- Name of the account that had run the process
- Checksums (MD5, SHA2-256, SHA1) for the name of the Computer that is running the process
- Process’ windows headers
- ID for the anti-virus databases, name of the identified threat according to the Rightholder’s classification
- Information about the license used for the Software, license ID, it's type and expiry date
- Computer's local time at the moment the information was provided
- The names and paths of the files that were accessed by the process
- URL- and IP-addresses that were accessed by the process
- URL- and IP-addresses from which the running file was downloaded
Read the Kaspersky Security Network Statement
- In the menu bar, click the application icon and choose Preferences.
The application preferences window opens.
- On the KSN tab, in the Improved protection section, click Show KSN Statement.
Statement regarding data processing for marketing purposes (Marketing Statement)
The Rightholder processes data for marketing purposes in accordance with this Marketing Statement in order:
- To improve the quality, appearance, and performance of the Rightholder’s Software, products, services, and infrastructure by analyzing users' experience, interactions, and level of satisfaction with the Software.
- To offer You security solutions that best match Your needs.
- To provide You with the relevant content and advertisement.
- To create categories of groups of users based on certain parameters in order to provide relevant information to these groups about maintaining security level, marketing offers, and promotional materials.
Certain data which is processed under this Marketing Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Marketing Statement:
- Information about the application: full version and ID of the full version of the application, type and type ID of the application, ID of the seller of the license key, application hotfix, application locale ID, locale script ID, region ID, rebranding code, flag indicating whether the User participates in Kaspersky Security Network, application ID, build ID, ID of the license agreement, version of the license agreement, flag indicating whether the license agreement was accepted, time of the change of the license agreement acceptance status, installation date, rebranding code, installation type, installation error, customization id, trial period reset state, state of connection to My Kaspersky, My Kaspersky User ID.
- Information about User’s device: User device ID, hash of the identifier of the User's Computer, date and time on the User's Computer.
- Information about the license: license type, license, license term, number of days before license expiration, license ticket sequence ID, license status, license ID, activation date, expiration date, order number, ID of the price-list position, partner name, partner order number, partner country, additional license information, customer name, subscription state, subscription state reason, subscription type, subscription expiration date, ID of the subscription provider’s schema, additional information about the subscription provider.
- Information about the operating system: type of the OS, full version of the OS, version of the OS Service Pack, edition of the OS, product type of the OS, architecture (bit version) of the OS, installed updates, current and default OS language settings, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode, the last unsuccessful OS restart, the number of unsuccessful restarts.
- Information about the use of the Software user interface: information about the opening of the interface's windows (identifiers and names of windows and used control elements) and switching between windows, information that determines the reason for opening a window, the date and time the interface was started and the stages of interface's startup, the time and type of the User's interaction with the interface, information about changes to settings and product parameters (the name of the setting or parameter, and the old and new values), the ID of the application in interactive mode.
- Information about User opinion about the Software: software rating value, Software localization, Software region, day of survey, User comment.
- Information about use of the Adaptive Security scenarios: the User action type when the password entry is detected; the identifier of the OS setting, which reduces the level of computer protection, the identifier of the Software or User action upon discovery of such a setting, the type of the user, that changed the OS setting, the type of scan operation during which the OS setting was detected, the result of the scan.
- Information about the content delivered by the product: content ID, list of content IDs, ID of the pressed button, action from the pressed button, event area type, protocol version.
- Information about agreements accepted by User: agreement ID, agreement version, agreement acceptance state.
- ID of the website user that uploaded the Software executable from the website.
Read the Marketing Statement
- In the menu bar, click the application icon and choose Preferences.
The application preferences window opens.
- On the KSN tab, in the Improved experience section, click Show Marketing Statement.
Information provision
You agree to submit the following information for the purpose of application identification during database and module updates:
- Application ID (AppID)
- Active license ID
- Unique application installation ID (InstallationID)
- Unique Update task launch ID (SessionID)
- Version of application (BuildInfo)
- Information about updating the Updater component: unsuccessful update tasks, the number of failed starts after the upgrade, the version of the component, the error code, the ID of the type of update task, the status code of the software after the update, the date and time the statistics is sent
To check the legitimacy of the application use, Kaspersky reserves the right to use means to verify that you have a licensed copy of the application.
The application can transmit to Kaspersky the following license information needed to verify the legitimacy of the application use:
- Identifier of regional activation center
- Hashsum of activation code
- Time and date of ticket creation
- License information identifier
- License ticket identifier
- License ticket sequence identifier
- Unique identifier of user's computer HDD
- Date of from which the license ticket is valid
- The current state of license
- License version
- Ticket header ID
- Application ID of the currently used application
- List of application IDs of applications that are compatible with the currently used application
- Localization ID
- Application version
- Installation ID
- Application build ID
The application also processes and stores the following personal data displayed in the application interface:
- Email address used to connect to My Kaspersky
- Website addresses that were added to the exclusions (displayed in the Web Anti-Virus, Website tracking, Safe Money preferences, and in the Reports window)
- License data
- Hashes of passwords
- Hashes of e-mail addresses
This data is stored locally in a non-modified form and can be viewed under any user account on the computer.
Kaspersky protects any information thus received in accordance with law and applicable Kaspersky rules.
Kaspersky uses any received information in anonymized form and as general statistics only. Aggregate statistics are automatically generated from the source information received, and do not contain any personal or other confidential data. The original information received is destroyed as new information is accumulated (once a year). Aggregate statistics are stored indefinitely.
Page top