﻿KASPERSKY SECURITY NETWORK (“KSN”) STATEMENT

All terms used in this KSN Statement have the same meaning defined in the End User License Agreement (EULA) under the clause ''Definitions''.

Please carefully read the terms of this KSN Statement, as well as all documents referred to in this KSN Statement, before accepting it. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the KSN Statement before data processing begins.

Data Protection and Processing
The Rightholder handles the data it receives from the End User under this KSN Statement in accordance with the Rightholder’s Privacy Policy published at: www.kaspersky.com/Products-and-Services-Privacy-Policy.

Purposes of Data Processing
The data processing by the Rightholder under this KSN Statement could lead to increase in the effectiveness of protection provided by the Software against information and network security threats. It is achieved by:
- determining the reputation of scanned objects;
- identifying information security threats that are new and challenging to detect, and their sources;
- reducing the likelihood of false positives;
- increasing the efficiency of Software components;
- preventing information security incidents and investigating incidents that did occur;
- improving the performance of the Rightholder’s products.

Processed Data 
Certain data which is processed under this KSN Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this KSN Statement:
1. Information about the version of the operating system (OS) installed on the computer and the OS service packs installed: information about the OS bit version, kernel objects, drivers, services, entries in the hosts file and the system registry, network name of the computer (local and domain names), regional settings of the OS (time zone, default keyboard layout, interface language), UAC settings, OS firewall settings, OS parental control settings, data and settings of operating system services.
2. Information about all installed applications, including the name and version of the installed application, the versions of installed updates, the name of the publisher, the date of installation and the full path to the installation folder on the computer.
3. Information about the installed software of the Rightholder and status of anti-virus protection of the computer: software version, information about the files of loaded modules, their names, sizes, paths to them, checksums (MD5, SHA2-256, SHA1), publisher, signature and integrity, IDs of processes into which modules have been loaded, the module loading sequence, versions of anti-virus databases used and the time of their most recent update, statistics on updates and connections to Rightholder’s services, unique ID of software installation on the computer and unique ID of the computer, information about the software operating mode.
4. Information about the wireless network connection of the computer used: wireless network name, checksum (MD5 and SHA256) MAC address of the access point, attribute of the computer being powered by a battery or power grid, attribute of DNS availability, type of computer, information about the type and level of security of the wireless network; unique IDs consisting of the unique ID of the computer, unique ID of software installation on the computer, name of the wireless network, and MAC address of the access point; information about wireless networks available for connection: network name, MAC address of the access point, information about network security and signal quality level; attribute of a VPN connection being used, category of wireless network configured in software, DHCP settings, checksum (SHA256) of the IP address (IPv4 or IPv6) of the computer, domain name and checksum (SHA256) of the path from the URL address of the Internet access service; parameters of WPS access points: checksums of the name and serial number of the device, name and number of the device model, name of the device manufacturer; local time of the start and end of computer connection to the wireless network, mode of control of device connections to the home wireless network, list of available wireless network access points and their parameters;
5. Information about activity on the User’s computer: information about processes running in the system (system process ID (PID), process name, account under which the process was started, the application or command that started the process, the full path to process files and the command string used to launch the process, indicator signifying that the process file is on the autorun list, a description of the product to which the process belongs (product name and publisher information), information about digital certificates used and information needed to verify their authenticity, or information to the effect that the file does not have a digital signature), URL addresses of the websites visited and time of visits, response from the DNS server and duration of response buffering, IP addresses (IPv4 or IPv6) of the DNS server or domain of the website, domain name, method of domain name discovery, attribute signifying that the domain name is listed, name of the file of the process accessing the website, size and checksums (MD5 and SHA256) of the file, path to the file and path template code, result of verification of the file’s digital signature, User Agent string, duration of storage of this information prior to transmission to KSN, search queries, parameters of HTTP queries, time that has elapsed since the last user activity on the computer, as well as information about modules loaded into processes: their names, sizes, types, checksums (MD5, SHA2-256, SHA1), and paths to them.
6. Information about all scanned objects and operations: name of the object scanned, scan date and time, names and sizes of files scanned and paths to them, date and time of file creation, name of the packer (if the file was packed), data of the PE header of the file, version of the compiler, number, size and data of file sections, file entropy, ID of file type and format, URL and IP addresses from which the object was downloaded, ID of the download protocol and number of the connection port, checksums (MD5, SHA2-256, SHA1) of the process that downloaded the object, checksums of the object (MD5, SHA2-256, SHA1), type and value of the additional checksum of the object, information about the digital signature (certificate) of the object (date and time signed, name of the certificate holder, serial number of the certificate and checksum calculation algorithm, information about the public key of the certificate: checksum (SHA2-256) of the public key, ID of the certificate database, name of the certificate issuer, result of certificate verification), ID of the software task that performed verification, date and time of verification, result of completed verification, and decisions of the user and product following verification, information about changes of the trust group.
7. If a threat or vulnerability is detected, information about the object scanned is supplemented with information about the ID, version, and type of the anti-virus database record, threat name per the Rightholder’s classification, checksums (MD5, SHA2-256, SHA1) of the file of the application that requested access to the URL where detection occurred, the IP address (IPv4 or Ipv6) of the threat detected, ID of the type of traffic in which detection occurred, ID of vulnerability and its danger class, URL address of the page where detection occurred, number of the script on the page, ID of the threat, type and status of detection, interim results of object analysis, attribute signifying that the object is a container, and the level of process integrity.
8. Network attack information: IP address of the attacking computer and number of the port on the user’s computer targeted by the network attack, ID of the attack protocol, name and type of attack.
9. URL and IP addresses of the page where malicious or suspicious content was detected, name, size, and checksum of the file that requested access to this URL, ID and weight of the rule that returned the scan verdict, and attack target.
10. Information about operation of the URL Advisor component: user decisions on whether domains are safe or malicious based on scan results, checksums (MD5) of the URL and Referrer of the domain scanned, ID of the URL Advisor component.
11. Aggregated data on the results of scanning using local and cloud KSN databases during the scan period: number of unique unknown objects, number of unique trusted objects, number of unique untrusted objects, total number of “unknown object” verdicts, total number of “trusted object” verdicts, total number of “untrusted object” verdicts, number of objects found to be trusted based on certificate verification results, number of objects found to be trusted based on the trusted URL address, number of objects found to be trusted based on the logic of trust inheritance from a trusted process, number of unknown objects for which a trusted or untrusted verdict has not been issued, number of objects that the user marked as trusted. Version of the local KSN database on the computer at the time of transmission of statistics and ID of the database management setting of software, information about successful/failed requests to KSN (connections and transactions) and the time spent on transactions, duration of the KSN connection session, volume of data sent and received, start and end times of the operation to gather information to be relayed to KSN, and the total number of requests to KSN that have failed for some reason (including the reason).
12. If a potentially malicious object has been detected, the transmission includes information about process memory data, elements of the hierarchy of system objects (ObjectManager), UEFI BIOS memory data, names of registry keys and their values.
13. Information about system log events: event time, name of the log where the event has been detected, type and category of event, name of the event source and event description.
14. Information about network connections: version and checksums (MD5, SHA2-256, SHA1) of the file of the process that opened the port, path to the process file and its digital signature, local and remote IP addresses, numbers of the local and remote connection ports, connection status, port opening time.
15. Information about the running file: its checksum, format, number of times the file was run, version of the statistics package, software details: build number, IDs of the application and its version.
16. Information about the completed rollback of malware activity: information about the file whose activity is rolled back (file name, full path to the file, file size and checksums (MD5, SHA2-256, SHA1)), information about successful and failed attempts to remove, rename, or copy files and restore registry values (names of registry keys and their values), information about system files modified by malware before and after the rollback, name of the detected threat per Kaspersky Lab classification, ID of anti-virus databases and ID of the record in anti-virus databases based on which the verdict was returned.
17. Information about the use of VPN connection: IP address of the VPN server to which the connection is established, unique ID of software installation on the computer.

If software had been unloaded, the data listed under items 5, 6, 7 are not transmitted but may be stored in a limited-size storage on the User’s computer. Such data cannot be restored after software is removed. After software has loaded, such data will be relayed to Kaspersky Lab for the purposes mentioned above.

Objects that can be exploited by intruders to harm the User’s computer can be also sent to Kaspersky Lab to be examined additionally:
- Files or their parts.
- Name, size, and version of the file being sent, its description and checksums (MD5, SHA2-256, SHA1), file path, ID of the format, name of the publisher, name of the product to which the file belongs.
- Certificate validity start and end dates and times if the file being sent has a digital signature, date and time when the certificate was signed, name of the certificate publisher, information about the certificate holder, impression and public key of the certificate and algorithms used to calculate them, certificate serial number.
- Information about the date and time of creation and modification of the file, an attribute signifying whether or not the date and time of file signature is used in signature verification, the result of integrity verification of the file.
- Objects detected at malicious links.
Such objects may be temporarily stored on the User’s computer until they are transmitted.

In addition, for purposes of preventing and investigating incidents, the transmission may also include executable and non-executable trusted files, segments of random access memory, boot sectors of the operating system, and application activity reports containing:
- Information about processes and services that have been started: checksums (MD5, SHA2-256, SHA1) of the process or service file, file name and size, file path, names of and paths to files accessed by the process, names and values of registry keys accessed by the process, segments of random access memory, URL and IP addresses accessed by the process or from which the file that was run originated.
- The name of the account under which the process is running, the name of the computer on which it has been started, headers of process windows, ID of anti-virus databases, name of the threat detected per Kaspersky Lab classification, unique ID of the license, expiration date and type of license, version of the operating system (OS) and service packs installed on the computer, and local time.

To improve product performance, the User agrees to submit the following information to Kaspersky Lab:
- Information about the Rightholder’s software installed on the computer: date and time of installation, software name and version, versions of installed updates, information about the license installed (its ID and type), unique ID of software installation on the computer and unique ID of the computer, interface localization, date and time set on the computer at the time of data transmission to KSN, ID of software rebranding.
- Information about software installed on the computer: software name and the name of its vendors, information about registry keys and their values, information about files of components of installed software (including checksums (MD5, SHA2-256, SHA1) of the file, file name, path to the file on the computer, size, version, and digital signature), type of application involved in the detection.
- Information about hardware installed on the computer: information about RAM size, processor (CPU) brand and number of cores, brand of hard drives (HDD), type, name, model, and version of firmware, parameters of integrated and plug-in devices.
- If a threat is detected, the attribute signifying that the object is a container and the level of process integrity are transmitted.
- Information about errors encountered by product components: error type and time, ID of the product component and task that returned the error.
- Information about the scanning of secure connections: certificate used in establishing the connection and its checksums (MD5, SHA2-256, SHA1), DNS and IP address (IPv4 or IPv6) of the network resource, number of the remote port, name and version of the application being run that established the secure connection, and the path to this application, code of the error encountered while scanning the secure connection (if an error has been returned).
- Information about the quality of updates of the installed product and anti-virus databases: IP address (IPv4 or IPv6) of the update source used, type of the update task, number and total size of files downloaded during the update process, average update file download rate, average speed of network transactions during the update process, status of completion of the update task, type of error that may have occurred during the update process, ID of the product component that runs the update, value of the TARGET filter of the update task; date of creation of index files of the installed and downloaded updates, date and time of the installed and downloaded updates.
- Information about the resources used by product components during object scans: actual and average duration of scanning by different product components, total, minimum and maximum scan times, network traffic interception, number of scan requests, ID of the scan operation, start and end times of the launch of the service process and interface of the Kaspersky Lab product, duration of gathering of data on third-party software, number of events during this time.
- Information about interactions between the product and My Kaspersky services: ID and name of the service domain to which the request has been sent, number of requests and successful/failed connections to each service, number of responses from each service, number of request errors and timeouts, start and end times of the process of gathering data on the number of requests and connections.
- Information about the process attacking the product self-defense component: name and size of the process file, its checksums (MD5, SHA2-256, SHA1), full path to th file and path template code, dates and times of creation and compilation of the process file, attribute of an executable file, attributes of the process file, information about the certificate with which the process file is signed, code of the account under which the process was launched, IDs of operations performed to access the process, type of resource with which the operation is performed (process, file, registry object, window search using the FindWindow feature), name of the resource with which the operation is performed, operation success or failure, reputation of the process file and its certificate according to KSN.
- ID of the software process being attacked.
- ID of the event that crashed the software or application installed on the computer.
- Information about software operation on the computer: information about processor (CPU) usage, data on memory usage (Private Bytes, Non-Paged Pool, Paged Pool), number of active protocols and number of waiting threads, duration of software operation until the error occurred.
- Information about the system at the time when the BSOD occurred: name and version of the driver that caused the BSOD, code of bug check and its parameters, driver failure stack, ID of the type of detected memory segment created during the failure, attribute of OS session duration of more than 10 minutes prior to the BSOD or unexpected power off, unique ID of the OS memory segment, date and time of the BSOD, reports of software drivers from the memory segment (error code, module name, name of the file with source code and the string in which the error occurred), full number of the OS kernel build, name, localization, and version of the application in which the failure was detected, number of error and its description from the system log of the application for which the failure was detected, information about an exception error in the application, address of the application failure in the format of a module offset, name and version of the application module in which the failure occurred, attribute of application failure in the software plugin, failure stack, duration of application operation prior to the failure, method of detection of the software failure (driver intercepts, traffic processing, or number of waiting threads), name of the process that initiated traffic interception or exchange that resulted in the software failure.
- Name of the root index file of databases, its date and time, secondary index files and their date and time for certain categories of updates, names of certain files from updatable categories and their checksums for databases already downloaded and those being downloaded.
- Information about the NativeImage file: type, name, checksums (MD5, SHA2-256, SHA1) of the file, full path to the file on the computer, file path template code, ID of the version of the file module, checksum (SHA256) of the digital signature of the build from which the file being scanned was created, and ID of the method of determination of the build, IDs of file integrity check results.
- Information about the System Watcher component: full number of the component version, build number, ID of the current component event that took longer to process than the time limit set, event processing duration, total number of such events, name and checksums (MD5, SHA2-256, SHA1) of the file of the process that initiated the current event, name and code of the directory containing the file on the computer, maximum permissible event processing time, code of the event that caused an event queue overflow and the total number of such events, name of the file, directory, and code of the drive directory containing the file of the process that initiated the current event that caused an event queue overflow, checksums (MD5, SHA2-256, SHA1) of this file, ID of the event whose processing was interrupted due to timeout, ID of the interception filter and type of interception event, size of the event queue of the component at the time of transmission of statistics, difference between the first and current events in the queue at the time of transmission of statistics, probability of transmission of statistics, ID of preparation of statistics, type of scan task from which the product received the date of installation of the detected application, path, date, and time of installation and most recent use of the detected application, status of the detected application;
- Information about operation of the Installation Assistant component: name of the setup file of third-party software, checksums (MD5, SHA2-256, SHA1) of the setup file, its size, type, and full path to the file, path template code, additional information about the template file (file description and version, name and version of software installed by the file, name of software publisher, internal file name, original file name, copyright notice, language of software localization, attribute of availability of a digital signature, name of the entity or organization that signed the file), date and time of the most recent update of anti-virus databases installed on the computer, name of the category of the setup file per the Rightholder’s classification, ID, version and type of the anti-virus database record used, attribute of detection of the setup file in debugging mode, type and version of the template of the user interface of the setup file, its checksums (MD5, SHA2-256, SHA1), information about the use of the user interface of the setup file: ID of user activity involving an interface element, name, location and text of the interface element, attribute of the presence of command line parameters during the launch of the setup file, ID of the component scenario under which the statistics are transmitted, full version of the component.
- If the product detects an URL address that is used by an installer to download content that may contain advertising or proposals to install additional application, the transmission includes the detected URL address (domain name from the URL address if accessed via a secure protocol), the name of the URL address category per the Rightholder’s classification, the Referrer and IP address (IPv4 or IPv6) of the detected URL address.
- Information about the failed last OS reboot: number of failed reboots.
- Information about the use of adaptive protection scenarios: checksum (SHA256) received using the unique ID of software installation on the computer and the ID of statistics, as well as IDs of attributes signifying that the computer is used by a child;
- Device information: MAC address, type, number of characters in the name, the name of the vendor and other technical information;
- Information about the use of application during suspension of anti-virus protection: name and checksum (MD5) of the executable file of the application, file path and file path template code, information about the reason for and duration of suspension of anti-virus protection.
- Information about modules loaded into the browser process: type, version, and name of the browser, version of modules and the binary interface, parameters of loading of the modules, information about exceptions encountered during module operation, including the module name and addresses of the module load memory.
- Information about hard drive parameters: ID of the S.M.A.R.T. parameter, data of S.M.A.R.T. attributes, model, serial number, name and version of firmware, size, status, operating time and temperature of the hard drive.

By participating in the KSN program, you agree to submit the following information for the purposes listed above:
- Unique ID of software installation on the computer;
- Full version of installed software;
- ID of software type;
- Unique ID of the computer on which software is installed.

In order to increase the effectiveness of protection provided by the Software, the Rightholder may receive objects that could be exploited by intruders to harm the Computer and create information security threats. Such objects include:
• executable and non-executable files or their parts;
• portions of the Computer’s RAM;
• sectors involved in the process of booting the OS;
• network traffic data packets;
• web pages and emails containing suspicious and malicious objects;
• description of the classes and instances of classes of the WMI repository;
• application activity reports.

Such application activity reports contain the following data about files and processes:
• the name, size and version of the file being send, its description and checksums (MD5, SHA2-256, SHA1), file format identifier, the name of the file’s vendor, the product name to which the file belongs, full path on the Computer, template code of the file path, the creation and modification timestamps of the file;
• start and end date/time of the validity period of the certificate (if the file has a digital signature), the date and the time of the signature, the name of the issuer of the certificate, information about the certificate holder, the fingerprint, the certificate’s public key and appropriate algorithms, and the certificate’s serial number;
• the name of the account from which the process is running;
• checksums (MD5, SHA2-256, SHA1) of the name of the Computer on which the process is running;
• titles of the process windows;
• identifier for the anti-virus databases, name of the detected threat according to Rightholder’s classification;
• data about the installed license, its identifier, type and expiration date;
• local time of the Computer at the moment of the provision of information;
• names and paths of the files that were accessed by the process;
• names of registry keys and their values that were accessed by the process;
• URL and IP addresses that were accessed by the process;
• URL and IP addresses from which the running file was downloaded.

Also, in order to prevent false positives, the Rightholder may receive trusted executable and non-executable files or their parts.

Depending on the specific Software You use or switch to, additional data will also be processed.

If You use or switch to Kaspersky Internet Security, the following data will also be processed:
- Information about operation of the Safe Money component: attribute of its operating mode, information about changes made by the user to the list of websites protected by the component: URL address and Referrer (if any) of the website, attribute signifying that the website has been edited, edited, or removed, mode of component startup for this website, context of changes made to the list of websites; information about the browser used to visit the website: URL address and Referrer of the website, name and version of the browser, type of browser startup, duration of launch and attribute of launch success, information about the level of its protection and type of message about the level of protection, name and version of the browser from which the browser currently in use was launched.
- Information about updates of installed applications: IDs of the application being updated and its updates, IDs of the localization language of the application and its updates, application version before the update, URL address used to download the update setup file, ID of the setup file download error (if any), attribute signifying a violation of the integrity of the update setup file, ID of user action when the list of exclusions is used, type of application being updated, names of process files preventing the installation of the update, ID of the update result, parameters of the command line for launching the setup file of the update, attribute of successful update installation.
- Information about operation of the Software Cleaner component: version of the database with information about installed applications and their updates, name and version of the scanned application, registry folder associated with the given application, folder into which the application was installed, string with the application removal command, language of application localization, ID of the application scan result, attribute of application installation only for the current user, attribute of application scanning in debugging mode, ID of user action when the list of exclusions is used, types of applications recommended for removal and applications being removed, names of process files preventing the removal, ID of the result of removal, attribute of successful removal, information about the suite to which the detected software belongs: ID, version, name, developer, language ID, type of the primary application in the suite, source of information about the date of its installation, date and time of installation and most recent use of the primary application in the suite, as well as the installation path and level of protection provided;
- Information about operation of the Private Browsing component: Referrer from the HTTP tracking request, name of the service or organization providing tracking services, category of the tracking service per the Rightholder’s classification, ID and version of the browser that opened the URL.
- Information about links blocked by the Parental Control and Web Control components: reason for the block, version of the Parental Control and Web Control components, URL and IP address of the blocked link.
- Information about operation of the Trusted Applications Mode component: ID of the version of its settings, attribute of its operating mode, result of file status verification and source of the trusted status, aggregated data on the number of trusted, untrusted, and unknown objects.
If You use or switch to Kaspersky Total Security, the following data will also be processed:
- Information about operation of the Safe Money component: attribute of its operating mode, information about changes made by the user to the list of websites protected by the component: URL address and Referrer (if any) of the website, attribute signifying that the website has been edited, edited, or removed, mode of component startup for this website, context of changes made to the list of websites; information about the browser used to visit the website: URL address and Referrer of the website, name and version of the browser, type of browser startup, duration of launch and attribute of launch success, information about the level of its protection and type of message about the level of protection, name and version of the browser from which the browser currently in use was launched.
- Information about updates of installed applications: IDs of the application being updated and its updates, IDs of the localization language of the application and its updates, application version before the update, URL address used to download the update setup file, ID of the setup file download error (if any), attribute signifying a violation of the integrity of the update setup file, ID of user action when the list of exclusions is used, type of application being updated, names of process files preventing the installation of the update, ID of the update result, parameters of the command line for launching the setup file of the update, attribute of successful update installation.
- Information about operation of the Software Cleaner component: version of the database with information about installed applications and their updates, name and version of the scanned application, registry folder associated with the given application, folder into which the application was installed, string with the application removal command, language of application localization, ID of the application scan result, attribute of application installation only for the current user, attribute of application scanning in debugging mode, ID of user action when the list of exclusions is used, types of applications recommended for removal and applications being removed, names of process files preventing the removal, ID of the result of removal, attribute of successful removal, information about the suite to which the detected software belongs: ID, version, name, developer, language ID, type of the primary application in the suite, source of information about the date of its installation, date and time of installation and most recent use of the primary application in the suite, as well as the installation path and level of protection provided;
- Information about operation of the Private Browsing component: Referrer from the HTTP tracking request, name of the service or organization providing tracking services, category of the tracking service per the Rightholder’s classification, ID and version of the browser that opened the URL.
- Information about links blocked by the Parental Control and Web Control components: reason for the block, version of the Parental Control and Web Control components, URL and IP address of the blocked link.
- Information about operation of the Trusted Applications Mode component: ID of the version of its settings, attribute of its operating mode, result of file status verification and source of the trusted status, aggregated data on the number of trusted, untrusted, and unknown objects.
If You use or switch to Kaspersky Security Cloud for Windows, the following data will also be processed:
- Information about operation of the Safe Money component: attribute of its operating mode, information about changes made by the user to the list of websites protected by the component: URL address and Referrer (if any) of the website, attribute signifying that the website has been edited, edited, or removed, mode of component startup for this website, context of changes made to the list of websites; information about the browser used to visit the website: URL address and Referrer of the website, name and version of the browser, type of browser startup, duration of launch and attribute of launch success, information about the level of its protection and type of message about the level of protection, name and version of the browser from which the browser currently in use was launched.
- Information about updates of installed applications: IDs of the application being updated and its updates, IDs of the localization language of the application and its updates, application version before the update, URL address used to download the update setup file, ID of the setup file download error (if any), attribute signifying a violation of the integrity of the update setup file, ID of user action when the list of exclusions is used, type of application being updated, names of process files preventing the installation of the update, ID of the update result, parameters of the command line for launching the setup file of the update, attribute of successful update installation.
- Information about operation of the Software Cleaner component: version of the database with information about installed applications and their updates, name and version of the scanned application, registry folder associated with the given application, folder into which the application was installed, string with the application removal command, language of application localization, ID of the application scan result, attribute of application installation only for the current user, attribute of application scanning in debugging mode, ID of user action when the list of exclusions is used, types of applications recommended for removal and applications being removed, names of process files preventing the removal, ID of the result of removal, attribute of successful removal, information about the suite to which the detected software belongs: ID, version, name, developer, language ID, type of the primary application in the suite, source of information about the date of its installation, date and time of installation and most recent use of the primary application in the suite, as well as the installation path and level of protection provided;
- Information about operation of the Private Browsing component: Referrer from the HTTP tracking request, name of the service or organization providing tracking services, category of the tracking service per the Rightholder’s classification, ID and version of the browser that opened the URL.
- Information about links blocked by the Parental Control and Web Control components: reason for the block, version of the Parental Control and Web Control components, URL and IP address of the blocked link.
- Information about operation of the Trusted Applications Mode component: ID of the version of its settings, attribute of its operating mode, result of file status verification and source of the trusted status, aggregated data on the number of trusted, untrusted, and unknown objects.
Your Choice to Participate
It is entirely Your choice to automatically send data on a regular basis to the Rightholder under this KSN Statement. You can at any time withdraw Your consent from within the settings of the Software as described in the User Manual.

© 2018 AO Kaspersky Lab. All Rights Reserved.