Kaspersky Security Network Statement for Kaspersky Endpoint Security 10 for Windows SP2, SP2 MR1, SP2 MR2, SP2 MR3, SP2 MR4
The article concerns Kaspersky Endpoint Security 10 for Windows:
- Service Pack 2 Maintenance Release 4 (version 10.3.3.304)
- Service Pack 2 Maintenance Release 3 (version 10.3.3.275)
- Service Pack 2 Maintenance Release 2 (version 10.3.0.6294)
- Service Pack 2 Maintenance Release 1 (version 10.3.0.6294)
- Service Pack 2 (version 10.3.0.6294)
Kaspersky Security Network Statement
Kaspersky Security Network Statement – Kaspersky Endpoint Security 10 for Windows
Please read this document thoroughly. It provides important information that you should be acquainted with before continuing to use our services or software. We reserve the right to modify this Statement at any time by making changes to this page.
AO Kaspersky Lab (further Kaspersky Lab) has created this Statement in order to inform and disclose its data gathering and dissemination practices for Kaspersky Endpoint Security 10 for Windows.
Kaspersky Lab has a strong commitment to providing superior service to all of our customers and particularly respecting your concerns about Data Processing.
This Statement contains numerous general and technical details describing the steps we take to respect your Data Processing concerns. Meeting your needs and expectations forms the foundation of everything we do – including protecting your Data.
The Kaspersky Security Network service allows users of Kaspersky Lab security products from around the world to help facilitate identification and reduce the time it takes to provide protection against new (“in the wild”) and complex security threats and their sources, intrusion threats, as well as increasing the protection level of information stored and processed by the computer’s user. This information contains no personally identifiable information about the user and is utilized by Kaspersky Lab for no other purposes but to enhance its security products and to further advance solutions against malicious threats and viruses.
By participating in Kaspersky Security Network, you and the other users of Kaspersky Lab security products from around the world contribute significantly to a safer Internet environment.
Legal Issues (if applicable)
Kaspersky Security Network may be subject to the laws of several jurisdictions because its services may be used in different jurisdictions, including the United States of America. Kaspersky Lab shall disclose information without your permission when required by law, or in good-faith belief that such action is necessary to investigate or protect against harmful activities to Kaspersky Lab guests, visitors, associates, property or to others. As mentioned above, laws related to data and information processed by Kaspersky Security Network may vary by country.
Kaspersky Security Network shall duly inform the users concerned when initially processing the above-mentioned information of any sharing of such information and shall allow these Internet users to opt in (in the EU Member States and other countries requiring opt-in procedures) or opt out (for all other countries) online from the commercial use of this data and/or the transmission of this data to third parties.
Kaspersky Lab may be required by law enforcement or judicial authorities to provide some information to appropriate governmental authorities. If requested by law enforcement or judicial authorities, we shall provide this information upon receipt of the appropriate documentation. Kaspersky Lab may also provide information to law enforcement to protect its property and the health and safety of individuals as permitted by statute.
B. RECEIVED INFORMATION
In order to identify new and challenging data security threats and their sources, as well as threats of intrusion, and to take prompt measures to increase the protection of the data stored and processed by the User with a computer, the User agrees to automatically provide the following information:
- Date of software installation and activation;
- Information about the software installed on the computer, including kernel objects, drivers, services, Microsoft Internet Explorer extensions, printing system extension, Windows Explorer extensions, downloaded objects, Active Setup elements, control panel applets, entries in the hosts file and system registry, versions of browsers and mail clients;
- Information about the computer’s hardware, including a checksum of the HDD’s serial number;
- Data about software tools used to fix problems in software installed on the User’s computer, or to change its functionality, and the return codes received after the installation of each piece of software;
- Information about the state of the computer’s anti-virus protection, including the versions and release dates and times of the anti-virus databases being used, statistics about updates and connections with Kaspersky Lab services, job identifier and the identifier of the software component performing scanning;
- Information about files being downloaded by the User, including the URL and IP addresses of the download and the download pages, download protocol identifier and connection port number, the status of the URLs as malicious or not, file’s attributes, size and checksums (MD5, SHA2-256, SHA1), information about the process that downloaded the file (checksums (MD5, SHA2-256, SHA1), creation/build date and time, autoplay status, attributes, names of packers, information about signatures, executable file flag, format identifier, and entropy), file name and its path, the file’s digital signature and timestamp of its generation, the URL where detection occurred, the script’s number on the page that appears to be suspicious or harmful, information about HTTP requests generated and the response to them;
- Information about the running applications and their modules, including information about processes running on the system (process ID (PID), process name, information about the account the process was started from, the application and command that started the process, the sign of trusted program or process, the full path to the process's files, and the starting command line, a description of the product that the process belongs to (including the name of the product and information about the publisher), as well as digital certificates being used and information needed to verify their authenticity or information about the absence of a file's digital signature), and information about the modules loaded into the processes, including their names, sizes, types, creation dates, attributes, checksums (MD5, SHA2-256, SHA1), the paths to them, PE-file header information, names of packers (if the file was packed);
- Information about all potentially malicious objects and actions, including the name of the detected object and the full path to the object on the computer, checksums (MD5, SHA2-256, SHA1) of the files being processed, detection date and time, names and size of downloaded files and paths to them, code of the path template, names of packers (if the file was packed), file type code, file format identifier, list of the activities of malicious applications and associated decisions made by the software and the User, identifiers for the anti-virus databases the software used to make a decision, name of the detected threat according to Kaspersky Lab’s classification, danger level and detection status, reason for including a file in the analyzed context and the file’s serial number in the context, checksums (MD5, SHA2-256, SHA1), name and attributes of the executable file for the application that passed the infected message, anonymized IP address (IPv4 and IPv6) of the blocked object’s host, the file’s entropy, autoplay status, time of the file’s first detection in the system, number of times the file has been run since the last time statistics were sent, information about the name, checksums (MD5, SHA2-256, SHA1) and size of the mail client used to receive the malicious object, identifier of the entry in the anti-virus databases used to arrive at a decision, job identifier of the software that performed the scan, flag of the reputation verification or file signature verification, result of processing the file, checksum (MD5) of the pattern collected on the object and pattern size in bytes;
- Information about scanned objects, including the assigned trust group to which and/or from which the file has been placed, the reason the file was placed in that category, category identifier, information about the source of the categories and the version of the category database, the file’s trusted certificate flag, name of the file’s vendor, file version, name and version of the software product which includes the file;
- Information about vulnerabilities detected, including the vulnerability ID in the database of vulnerabilities, the vulnerability danger class, and the status of detection;
- Information about emulation of the executable file, including file size and its checksums (MD5, SHA2-256, SHA1), the version of the emulation component, emulation depth, an array of properties of logical blocks and functions within logical blocks obtained during the emulation, data from the executable file’s PE headers;
- Information about network attacks, including the IP addresses of the attacking computer (IPv4 and IPv6), the number of the port on the User’s computer that the network attack is directed at, identifier of the protocol of the IP packet containing the attack, the attack’s target (organization name, website), flag for the reaction to the attack, the attack’s weight, trust level;
- Information about attacks associated with spoofed network resources, including the DNS and IP addresses (IPv4 and IPv6) of visited websites, number of IP address assignments for the domain name;
- Information about the rolling back of malware’s activities, including data about the file whose activities are being rolled back (file name, full path to the file, its size and checksums (MD5, SHA2-256, SHA1)), data about successful and unsuccessful actions to delete, rename, and copy files and restore values in the registry (names of registry keys and their values), information about system files changed by malware, before and after the roll back, name of the detected threat according to Kaspersky Lab’s classification, identifiers for the anti-virus databases and the identifier of the record in the anti-virus database the software used to make a decision;
- Information about the loaded software modules, including name, size and checksums (MD5, SHA2-256, SHA1) of the module file, its full path and template code of the file path, parameters of the module file’s digital signature, timestamp of the signature generation, names of the subject and the organization that signed the module file, identifier of the process, in which the module was loaded, name of the module vendor, index number of the module in the load queue;
- Information to determine the reputation of files and URL-addresses, including checksums of the scanned file (MD5, SHA2-256, SHA1) and pattern (MD5) obtained during the emulation of the file, size of the pattern, emulation depth, the version of the emulation component, type of the detected threat and its name according to Kaspersky Lab’s classification, identifier for the anti-virus databases, URL address at which the reputation is being requested, as well as the referrer URL address, the connection’s protocol identifier and the number of the port being used;
- Service information about the software’s operation, including the compiler version, flag for the potential maliciousness of the scanned object, version of the set of statistics being sent, information about the availability and validity of these statistics, identifier of the mode for generating the statistics being sent, flag indicating whether the software is operating in interactive mode;
- If a potentially malicious object is detected, information is provided about data in the processes’ memory, elements of the system object hierarchy (ObjectManager), data in UEFI BIOS memory, names of registry keys and their values;
- Information about events in the systems logs, including the event’s timestamp, the name of the log in which the event was found, type and category of the event, name of the event’s source and the event’s description;
- Information about network connections, including version and checksums (MD5, SHA2-256, SHA1) of the file from which process was started that opened the port, the path to the process’s file and its digital signature, local and remote IP-addresses, numbers of local and remote connection ports, connection state, timestamp of the port’s opening.
For additional examination the User agrees to provide files or parts of files that could be exploited by intruders to harm the User’s computer.
Additionally, to prevent incidents and investigate those that do occur, the User agrees to provide trusted executable and non-executable files, URLs, portions of the computer’s RAM, and the operating system’s boot sectors, as well as the following information about files and processes:
- The name, size and version of the file being send, its description and checksums (MD5, SHA2-256, SHA1), file format identifier, the name of the file’s vendor, the product name to which the file belongs, full path on the computer, template code of the file path, information about date and time of the creation and modification of the file;
- Start and end date/time of the validity period of the certificate (if the file has a digital signature), the date and the time of the signature, the name of the issuer of the certificate, information about the certificate holder, the fingerprint, public key certificate and appropriate algorithms, and the certificate serial number;
- Name of the account from which the process is running;
- Name of the computer on which the process is running;
- Titles of the process windows;
- Identifier for the anti-virus databases, name of the detected threat according to Kaspersky Lab’s classification;
- Data about the installed license, including its identifier, type and expiration date;
- Local time of the computer at the moment of the provision of information;
- The names and paths of the files that were accessed by the process;
- Names of registry keys and their values that were accessed by the process;
- URL- and IP-addresses that were accessed by the process;
- URL- and IP-addresses from which the running file was downloaded.
In order to promptly detect and fix errors associated with installation, uninstallation, and updating of the product, and to record the number of users, the User agrees to provide information about the date of installation and activation of the software on the computer, type of installed license and its expiration date, identifier of the partner from whom the license was purchased, serial number of license, type of software installation on the computer (initial installation, updating, etc.) and an installation success flag or the installation error number, a unique identifier for the installation of the software on the computer, type and identifier of the application that is being updated, identifier of the update job.
In order to increase the level of support and monitoring of the defined level of software protection, the User agrees to provide the following information about the results of testing software operability after applying of updates:
- Information about the set of all installed updates, and the set of most recently installed/removed updates;
- The type of event that caused the update information to be sent;
- Duration since the installation of last update;
- Information about any currently installed anti-virus databases;
- CPU usage data;
- The number of active streams and streams in standby state;
- Memory usage data (Private Bytes, Non-Paged Pool);
- Number of software dumps and system dumps (BSOD) since the software was installed and since the time of the last update, including the identifier and version of the software module that crashed, the memory stack in the product’s process, and information about the anti-virus databases at the time of the crash;
- The version of the installed software, including the version of the Nagent component;
- The set of installed software components, including the version of the installed encryption module and the status of each component.
To improve performance of Kaspersky Lab’s products, the User agrees to submit the following information:
- Information about software installed on the computer;
- The installation ID of the Software on your computer, the unique ID of the computer;
- Information about errors that occurred during operation of the product component, including the status ID of the Software, the error type, code and time of occurrence, the IDs of the component, module and process of the product in which the error occurred, the ID of the task or update category during which the error occurred, KL drivers’ logs of minidump (error code, module name, name of the source file and the line where the error occurred), identifier of the method to identify an error in the software operation, name of the process that initiated interception or traffic exchange which led to an error in the software operation;
- Information about updates of anti-virus databases and Software components, including the name, date and time of index files downloaded during the last update and being downloaded during this update, as well as the date and time of completion of the last update, names of the files of updated categories and its checksums (MD5);
- Information about abnormal termination of the Software, including the creation date and time of the dump, its type, the name of the process linked to the dump, the version and send time of the statistics dump;
- Information about Software operation, including data on the use of the processor (CPU) and memory usage (Private Bytes, Non-Paged Pool, Paged Pool), the number of active flows in the product process and flows in pending state, the length of time the Software was in operation before the error occurred, the memory stack in the product process;
- Data on the BSOD, including a flag indicating the occurrence of the BSOD on the computer, the name of the driver that caused the BSOD, the address and memory stack in the driver, a flag indicating the duration of the session before the BSOD occurred, memory stack of drivers that crashed, type of stored memory dump, flag for the session of the OS before BSOD lasted more than 10 minutes, unique identifier of the dump, timestamp of the BSOD;
- Event identifiers (unexpected power-off, third-party application crash, errors of interception processing), date and time of the unexpected power-off;
- Information about third-party applications that caused the error, including their name, version and localization, the error code and information about the error from the system log of applications, the address of the error and memory stack of the third-party application, a flag indicating the occurrence of the error in the Software component, the length of time the third-party application was in operation before the error occurred, checksums (MD5, SHA2-256, SHA1) of the application process image, in which the error occurred, path to the application process image and template code of the path, information from the system log with a description of the error associated with the application, information about the application module, in which an error occurred (information on the exception, crash memory address as an offset in the application module, name and version of the module, identifier of the application crash in the Rightholder’s plugin and memory stack of the crash, duration of the application session before crash);
- Information on the status of computer protection, including the protection status code;
- Version of the Updater component, number of crashes of the Updater component while running update tasks over the lifetime of the component;
- ID of the update task type, number of failed Updater attempts to complete update tasks;
- Full version of SystemWatcher component, code of the event that overflowed the event queue and number of such events, the total number of queue overflow events, information about the file of the process of the initiator of the event (file name and its path on the computer, template code of the file path, checksums (MD5, SHA2-256, SHA1) of the process associated with the file, file version), identifier of the event interception that occurred, the full version of the interception filter, identifier of the type of the intercepted event, size of the event queue and the number of events between the first event in the queue and the current event, number of overdue events in the queue, information about the file of the process of the initiator of the current event (file name and its path on the computer, template code of the file path, checksums (MD5, SHA2-256, SHA1) of the process associated with the file), duration of the event processing, maximum duration of the event processing, probability of sending statistics;
- Information about computer, including operating system and service packs installed, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode;
- Information about the software installed on the computer, including the name of the software and the name of its publisher, information about registry keys and their values, information about software components files, including checksums (MD5, SHA2-256, SHA1), name of a file, its path on the computer, size, version and digital signature;
- Information about hardware installed on the computer, including type, name, model name, firmware version, parameters of built-in and connected devices;
- Information about the last unsuccessful OS restart, including the number of unsuccessful restarts;
- Information to verify authenticity of digital certificates being used to sign files, including checksums (MD5, SHA2-256, SHA1) and the type of the file being scanned, the signature’s date and time, the fingerprint, the checksum algorithm, the certificate’s public key and serial number, the name of the issuer of the certificate, the result of certificate validation and the certificate’s database identifier;
- Information about the process executing the attack on the software’s Self-Defense: the name and size of the process file, its checksums (MD5, SHA2-256, SHA1), the full path to the process file and the template code of the file path, the creation/build timestamps, executable file flag, attributes of the process file, information about the certificate used to sign the process file, code of the account used to launch the process, ID of operations performed to access the process, type of resource with which the operation is performed (process, file, registry object, FindWindow search function), name of resource with which the operation is performed, success of the operation.
In order to receive the reference information about the number of objects with known reputation, the User agrees to provide information about the version of the protocol used to connect with the Rightholder’s services.
When participating in KSN, the User agrees to provide the following information for all purposes mentioned above:
- The unique Software installation identifier;
- The unique identifier of the computer with the installed Software;
- Information about the versions of the operating system and installed updates, including the word size, edition and parameters of the OS run mode;
- Information about the installed Software, including its full version and type, the software’s locale language, information about the installed updates, the value of the TARGET filter.
Securing the Transmission and Storage of Data
Kaspersky Lab is committed to protecting the security of the information it processes. The information processed is stored on computer servers with limited and controlled access. Kaspersky Lab operates secure data networks protected by industry-standard firewall and password protection systems. Kaspersky Lab uses a wide range of security technologies and procedures to protect information from threats such as unauthorized access, use, or disclosure. Our security policies are periodically reviewed and enhanced as necessary, and only authorized individuals have access to the data that we process. Kaspersky Lab takes steps to ensure that your information is treated securely and in accordance with this Statement. Unfortunately, no data transmission can be guaranteed secure. As a result, while we strive to protect your data, we cannot guarantee the security of any data you transmit to us or from our products or services, including without limitation Kaspersky Security Network, and you use all these services at your own risk.
We treat the data we process as confidential information; it is, accordingly, subject to our security procedures and corporate policies regarding protection and use of confidential information. All Kaspersky Lab employees are aware of our security policies. Your data is only accessible to those employees who need it in order to perform their jobs. Any stored data will not be associated with any personally identifiable information. Kaspersky Lab does not combine the data stored by Kaspersky Security Network with any data, contact lists, or subscription information that is processed by Kaspersky Lab for promotional or other purposes.
C. USE OF THE PROCESSED DATA
Kaspersky Lab processes the data in order to analyze and identify the source of potential security risks, and to improve the ability of Kaspersky Lab’s products to detect malicious behavior, fraudulent websites, crimeware, and other types of Internet security threats to provide the best possible level of protection to Kaspersky Lab customers in the future.
Disclosure of Information to Third Parties
Kaspersky Lab may disclose any of the information processed if asked to do so by a law enforcement official as required or permitted by law, in response to a subpoena or other legal process or if we believe in good faith that we are required to do so in order to comply with applicable law, regulation, subpoena, or other legal process or enforceable government request. Kaspersky Lab may also disclose information when we have reason to believe that disclosing this information is necessary to identify, contact or bring legal action against someone who may be violating this Statement, the terms of your agreements with the Kaspersky Lab or to protect the safety of our users and the public or under confidentiality and licensing agreements with certain third parties which assist us in developing, operating and maintaining the Kaspersky Security Network. In order to promote awareness, detection and prevention of Internet security risks, Kaspersky Lab may share certain information with research organizations and other security software vendors. Kaspersky Lab may also make use of statistics derived from the information processed to track and publish reports on security risk trends.
D. DATA PROCESSING – RELATED INQUIRIES AND COMPLAINTS
Kaspersky Lab takes and addresses its users’ Data Processing concerns with utmost respect and attention. If you believe that there was an instance of non-compliance with this Statement with regard to your information or data, or you have other related inquiries or concerns, you may write or contact Kaspersky Lab by email: firstname.lastname@example.org.
In your message, please describe in as much detail as possible the nature of your inquiry. We will investigate your inquiry or complaint promptly.
CHOICES AVAILABLE TO YOU
In case of refusal to participate in KSN the above data is not transmitted. The data is processed and stored in a restricted and protected partition on the user’s computer. This data cannot be restored after uninstallation. If you agree to participate in KSN, the data is transferred to Kaspersky Lab for the above purposes.
Kaspersky Lab protects the information received in accordance with the law and Kaspersky Lab’s rules.
Kaspersky Lab uses the information received only in an anonymized form as part of aggregated statistics. These aggregated statistics are generated automatically from the original information received and do not contain personal information or any other confidential information. Initial information received is destroyed upon accumulation (once a year). General statistics are kept indefinitely.
Participation in Kaspersky Security Network is optional. You can activate and deactivate the Kaspersky Security Network service at any time by altering the Feedback settings on your Kaspersky Lab product’s option’s tab. Please note, however, if you choose to deactivate the Kaspersky Security Network service, we may not be able to provide you with some of the services dependent upon the processing of this data.
We also reserve the right to send infrequent alert messages to users to inform them of specific changes that may impact their ability to use our services that they have previously signed up for. We also reserve the right to contact you if compelled to do so as part of a legal proceeding or if there has been a violation of any applicable licensing, warranty or purchase agreements.
Kaspersky Lab is retaining these rights because in limited cases we feel that we may need the right to contact you as a matter of law or regarding matters that may be important to you. These rights do not allow us to contact you to market new or existing services if you have asked us not to do so, and issuance of these types of communications is rare.
© 2016 AO Kaspersky Lab. All Rights Reserved.
How to view Kaspersky Security Network Statement
You view Kaspersky Security Network Statement during the product installation at the Kaspersky Security Network step.
Also you can open the statement via the program interface. To do this, open the main application window and go to Settings section. In the left frame of the window, select KSN Settings. In the right frame, click the KSN Participation Agreement button.
Figures are for installation of Kaspersky Endpoint Security 10 for Windows on a workstation. They are different from installation windows on file servers by a number of items in the left part of the window.