﻿KASPERSKY SECURITY NETWORK (“KSN”) STATEMENT

Kaspersky Security Network Statement (hereinafter “KSN Statement”) relates to Kaspersky Security Cloud for Mac (hereinafter “Software”).
All terms used in this KSN Statement have the same meaning defined in the End User License Agreement (EULA) under the clause ''Definitions''.

Please carefully read the terms of this KSN Statement, as well as all documents referred to in this KSN Statement, before accepting it. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the KSN Statement before data processing begins.

Data Protection and Processing
The Rightholder handles the data it receives from the End User under this KSN Statement in accordance with the Rightholder’s Privacy Policy published at: www.kaspersky.com/products-and-services-privacy-policy.

Purposes of Data Processing
Use of the KSN may increase the Software’s speed of reaction to information and network security threats. It is achieved by:
	⁃ Determining the reputation of scanned objects
	⁃ Identifying information security threats that are new and challenging to detect, and their sources
	⁃ Reducing the likelihood of false positives
	⁃ Increasing the efficiency of Software components
	⁃ Preventing information security incidents and investigating incidents that did occur
	⁃ Improving the performance of the Rightholder’s Software
	⁃ Receiving reference information about the number of objects with known reputation
	⁃ Improving the quality of Rightholder’s Software

Processed Data
Certain data which is processed under this KSN Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this KSN Statement:
1. Information about the operating system (OS) installed on the Computer and installed updates, current and default OS language settings, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode, the last unsuccessful OS restart, the number of unsuccessful restarts.
2. Information about the Rightholder's installed Software and the anti-virus protection status: the full version of the Software, the unique Software identifiers on the Computer, the type identifier of the installed Software, information about updates.
3. Information about all detected objects (including silent detect) and actions: the name of the detected object, the date and time of the detection, the URL and Referrer from which it was downloaded, the names and size of the detected files and their paths, the date and time of file creation, the file's entropy, the file's type, the file type code, identifier and format, the URL from which the object was downloaded, the object's checksum (MD5), the type and value of the object's supplementary checksum, data about the object's digital signature (certificate), number of starts of the object since statistics were last sent, ID of the Software scanning task. If the file was packed: name of the packer, size of the packer, size of the archived object, technical parameters of the applicable detection technologies.
For executable files: sign of sending service information, reputation verification flag or file signature flag, name, type, ID, type, checksum (MD5) and the size of the application that was loaded by the object being validated, the application path and template paths, a sign of the Autorun list, date of entry, the list of attributes, name of the Packer, information about the digital signature of the application: the publisher certificate, the name of the uploaded file in the MIME format.
4. If threats or vulnerabilities are detected, in addition to information about the detected object, information is provided about the identifier, version, and type of the record in the anti-virus database, the name of the threat based on the Rightholder's classification, the checksum (MD5, SHA2-256, SHA1) of the application file that requested the URL where the threat was detected, the IP address (IPv4 or IPv6) of the detected threat, the identifier of the type of traffic on which the threat was detected, the vulnerability identifier and its threat level, the URL of the web page where the vulnerability was detected, the intermediate results of object analysis, and the flag for the silent detection of the object.
5. Information about scanned objects: file type, file checksums (MD5, SHA256, Sha2), file size, file image size, PE-file header subsystem, PE-file header characteristics, number of sections, bit mask from DataDirectory, overlay size, number of found strings, number of found nonrandom strings, vector of DataDirectory objects sorted by RVA, vector of DataDirectory objects sorted by section numbers, cosine hash of the collected data, minwise hash of the collected data, identifier indicating whether the data sent in force mode, scan type, emulation depth, emulation version, compiler version, object hash, file entropy, frequency of 0s, frequency of numbers, 4-byte DWT vector, virtual section size, real section size.
6. Information about the running applications and their modules: checksums (MD5, SHA256) of running files, size, attributes, creation date, and PE-file header information, names of packers (if the file was packed), code of the account under which the process has been started, command line parameters used to start the process, names of files and their modules, the checksums of the files (SHA256), running of the executable file, the identifier conditions for the formation of statistics based on the information provided, an identifier of the existence and validity of the data provided in the statistics.
7. Information about application and command that started the process running on the system: process ID (PID), process name, information about the account the process was started from, the full path to the process’s files, and the starting command line, an indication whether the process’s file has autorun status, a description of the product that the process belongs to: the name of the product and information about the publisher, as well as digital certificates being used and information needed to verify their authenticity or information about the absence of a file’s digital signature), and information about the modules loaded into the processes: their names, sizes, types, creation dates, attributes, checksums (MD5, SHA2-256, SHA1), the paths to them, PE-file header information, names of packers (if the file was packed), IP-addresses (IPv4 or IPv6) of visited websites, the domain name, the method for determining the domain name, the sign indicating the domain name has entered the list, the name of the file of the process that opened the website, the size and checksums (MD5, SHA2-256) of the process’s file, the path to the process’s file and the template code of the file path, the result of the file’s certificate validation, the User Agent string, the storage duration of this information prior to being sent to KSN, the result of the file’s validation by KSN.
8. Information about network attacks: the IP address of the attacking computer and the port number at which the network attack is directed on the User's Computer, the identifier of the protocol used to carry out the attack, the name and type of attack, and information about the record in the anti-virus database.
9. The URL and IP address of the web page where harmful or suspicious content was detected, the name, size, and checksum of the file that requested the URL, the identifier and weight of the rule used to reach scanning results, the objective of the attack.
10. Information about changes made by the User in the list of websites protected by the Safe Money component: the URL of the website, a flag indicating that a website has been added, modified or deleted, information about whether the website was added in the Software window or via a browser, URL from which the User opened the website (if the website was added from a browser), information about whether the User chose to remember the change for the website (if the website was added from the browser), information about the mode in which Safe Money runs for the website.
11. Information about the use of Kaspersky Security Network (KSN): KSN identifier, software identifier, full version of the application, depersonalized IP address of the user’s device, indicators of the quality of fulfillment of KSN requests, indicators of the quality of the processing of KSN packets, indicators of the number of KSN requests and information about the types of KSN requests, date and time when statistics started being sent, date and time when statistics stopped being sent, KSN protocol version.
12. Information about the Website tracking blocking component: the Referrer from the http tracking request, the name of the service or organization which provides tracking services, the category of the tracking service in accordance with the Rightholder’s categorization, ID and the version of the browser, which opened the URL.
13. If a potentially malicious object is detected, information is provided about data in the processes’ memory, data in EFI memory.
14. Information about events in the systems logs: the event’s timestamp, the name of the log in which the event was found, type and category of the event, name of the event’s source and the event’s description.
15. Information about network connections: version and checksums (MD5, SHA2-256, SHA1) of the file from which process was started that opened the port, the path to the process’s file and its digital signature, local and remote IP-addresses, numbers of local and remote connection ports, connection state, timestamp of the port’s opening.
16. Information about the wireless network connection being used by the Computer: the checksum (MD5 and SHA256) of the MAC-address of the access point, information about the wireless network’s security and signal quality, flag indicating whether the Computer is running on battery power or a stationary power supply, DNS flag, the type of the Computer, information about wireless network type and security; the unique identifiers, made using a unique identifier of the Computer, unique identifier of the Software installation, name of the wireless network and MAC-address of the access point; flag for use of the VPN connection, the category of the wireless network specified in the Software, DHCP settings, the checksum (SHA256) of the IP-address (IPv4 and IPv6) of the Computer, the domain name and the checksum (SHA256) of the path from the URL-address of the captive portal; WPS settings of the access points: the checksums of the name and serial number of the wireless device, the number and name of the wireless device model, the name of its manufacturer; local time at the start and end of the wireless connection session, the list of available wireless access points and their parameters, the monitoring mode of devices connection to the home wireless network; hash(MachineID+PCID+BSSID), hash(MachineID+PCID+SSID), hash(MachineID+PCID+SSID+BSSID).
17. Information about updates of the installed Software and anti-virus databases: the type of the update task, the completion status of the update task, the type of error that may occur during an update, the number of unsuccessful updates, the identifier of the Software component that performs updates, and the database version and date of creation.
18. Information about the software installed on the Computer: the name of the software and the name of its publisher, information about registry keys and their values, information about software components files: checksums (MD5, SHA2-256, SHA1), name of a file, its path on the Computer, size, version and digital signature.
19. Information about hardware installed on the Computer: type, name, model name, firmware version, parameters of built-in and connected devices.
20. Information about devices connected to the wireless network: the MAC-address of the device, the type, the number of characters in the title, the type of installed OS, the manufacturer name, and data from the DHCP packet received from the device.
21. Information about files and processes: names and paths of the files that were accessed by the process, URL- and IP-addresses that were accessed by the process, URL- and IP-addresses from which the running file was downloaded.

22. Information about device usage by child: hash of the User unique ID, Software type ID, Software full version ID, the time of the verdict generation, current verdict of the child detection engine, the start of time period for which statistics are gathered, the end of time period for which statistics are gathered, name of the user in operating system, CRC64 of user SID, default user keyboard layout, this user visited URLs, event time, web-site category, the title of visited web page, the URL of visited page with stripped down user-sensitive info, this user search queries, query category, raw search query of the user, this user software activities, the type of software activity event, the software running time, locally unique process identifier, application name, application category, file MD5, PEGI or ESRB categories of application, minimum required age, location information, country identifier, city identifier, OS language identifier, child detection engine version, hash of the Computer ID, the user time zone difference in minutes.

The Kaspersky Security Network service may process and submit whole files (for example, objects detected through malicious links which might be used by criminals to harm your Computer) and/or their parts to Kaspersky Lab for additional examination.

Also, in order to achieve the declared purpose of increasing the effectiveness of protection provided by the Software, the Rightholder may receive objects that could be exploited by intruders to harm the Computer and create information security threats. Such objects are:
	⁃ Executable or non-executable files or parts thereof
	⁃ Computer's RAM areas
	⁃ Sectors involved in the OS boot process
	⁃ Network traffic data packages
	⁃ Web pages and emails containing suspicious or malicious objects
	⁃ Description of classes and class instances for the WMI storage
	⁃ Application activity reports

Such application activity reports contain the following information about the files and processes:
	⁃ Name, size, and version of the file being sent, it's description and checksums (MD5, SHA2-256, SHA1), format ID, its manufacturer's name, the name of the product the file belongs to, the fully qualified path to the file on the Computer and the path template code, date and time of file creation and update
	⁃ Certificate validity start and end dates and times if the file being sent has a digital signature, date and time when the certificate was signed, name of the certificate issuer, information about the certificate holder, impression and public key of the certificate and algorithms used to calculate them, certificate serial number
	⁃ Name of the account that had run the process
	⁃ Checksums (MD5, SHA2-256, SHA1) for the name of the Computer that is running the process
	⁃ Process’ windows headers
	⁃ ID for the anti-virus databases, name of the identified threat according to the Rightholder’s classification
	⁃ Information about the license used for the Software, license ID, it's type and expiry date
	⁃ Computer's local time at the moment the information was provided
	⁃ The names and paths of the files that were accessed by the process
	⁃ URL- and IP-addresses that were accessed by the process
	⁃ URL- and IP-addresses from which the running file was downloaded

Your Choice to Participate
It is entirely Your choice to automatically send data on a regular basis to the Rightholder under this KSN Statement. You can at any time withdraw Your consent from within the settings of the Software as described in the User Manual.

© 2019 AO Kaspersky Lab. All Rights Reserved.
