Kaspersky Security Cloud for Windows

Data provision under the End User License Agreement

30 November 2021

ID 144976

This section contains information on the specific data that are provided to Kaspersky if you have installed the application version which is not intended for use in the European Union, the United Kingdom, Brazil, or by California residents.

You agree to automatically submit the information specified below to AO Kaspersky Lab via the installed software (hereinafter "the Software"), the rights to which belong to AO Kaspersky Lab (hereinafter "Kaspersky" or "the Rightholder"), for the purposes of improving the quality of real-time protection and generating the most suitable informational and advertising offers, improving the performance of the software and the speed of identification and rectification of errors associated with the mechanism for installation, removal and update of the software, and accounting for the number of users:

  • Information about the Rightholder's installed Software: full version of the Software; Software update ID; type of installed Software; Software installation ID (PCID); installation date and time for the Software; Software ID derived from the license; ID of the licensed Software; Software localization; flag indicating whether participation in KSN is enabled; Software rebranding ID; Software installation/uninstallation status; installation error code; Software ID; ID of the Software rebranding; installation type (new installation, update); types of third-party software offered to be installed during installation of the Software; types of third-party software selected to be installed during installation of the Software; types of third-party software installed during installation of the Software; ID of the user of the Rightholder's website; duration of Software installation in seconds; flag indicating whether the installation was aborted by the user; Software ID; code of the partner organization associated with the Software rebranding; information about interface element from which the user decided to purchase the Software; user story type; full name of the partner organization through which the Software license order was placed;
  • Other information: protocol used to exchange data with KSN; delay of sending the statistics; ID of the marketing campaign; version of the protocol of interaction between the Software and marketing messages; page ID; Web-Portal registration type; ID of the control in the user interface; ID of the user action; user email entered while creating an order in the software interface; type of the request; size of the request content; protocol ID; data compression type; ID of the user's choice in the marketing campaign; user's choice in the marketing campaign; type of the region in which the event occurred; ID list of the content that user have read;
  • Information about the User environment: Device Guard (windows) enablement status; device ID; external IP address; unique device ID; OS type (server, workstation, domain controller); OS version, OS build number, OS update number, OS edition, extended information about the OS edition; OS Service Pack version; operating system family; type of hardware platform; additional information about OS features; device type (laptop, desktop, tablet); browser version; date and time on the user's device;
  • Information about an object being processed: checksum (MD5) of the object being processed; checksum (SHA256) of the object being processed; checksum of parts of the object being scanned to quickly detect malware or legitimate software that can be used to damage the computer or user data; public key of the certificate; digital certificate thumbprint of the scanned object and hashing algorithm; name of the detected malware or legitimate software that can be used to damage the user's device or data; timestamp of the triggered record in the Software's anti-virus databases; ID of the triggered record in the Software's anti-virus databases; type of the triggered record in the Software's anti-virus databases; size of the object being processed; name of the object being processed; path to the object being processed; directory code; ID of the vulnerability found in the software settings; checksum type for the object being processed;
  • Information about accessing a web service: web address being processed; port number; web address of the source of the web service request (referer); accessed IPv4 address of the web service; certificate type;
  • Information about the license and other agreements: type of legal agreement accepted by the user while using the Software; version of the legal agreement accepted by the user while using the Software; flag indicating whether the user has accepted the terms of the legal agreement while using the Software; date and time when the user accepted the Agreement terms while using the Software; Software activation date; serial number of the Software license key; Software license ID; ID of the information model used to provide the Software license; type of Software license used; Software license term; number of days till Software license expiration; full name of the partner organization through which the Software license order was placed; information about trial version of Software; current status of the Software license key; order number through which the Software license was purchased; ID of the price list item through which the Software license was purchased; order number of the purchase of the Software license from the partner; ID of the country of the partner that sold the Software license; data about the license for identifying a group of users of the company that purchased the license by the comment in the license properties; Software license expiration date and time; current status of the Software subscription; reason of current/changing status of Software subscription; Software subscription type; Software subscription expiration date and time; Software license data for user group identification based on additional settings of the subscription license; Software license data for user group identification based on additional settings of the subscription license; license data for user group identification based on additional settings of the subscription license; number of days since Software activation; number of days since Software license key expiration; information about Software activation errors; Software activation error category; Software activation error code; purchased activation codes; set of IDs of Software that can be activated on the user's device; Software activation code; currently used Software activation code; Software license header; ID of a regional activation center; Software license key creation date and time; type of the license used to activate the Software; ID of the Software retail item (SKU);
  • Information on interaction with Web-Portal: Web-Portal account ID; Web-Portal website page that Software redirects to; country and region of Kaspersky Lab web service from which the trial version of Software was downloaded; time of the last status change; version of the protocol used to control software settings from the Web-Portal; device protection status; protection components usage status; scan tasks status; status of the task of updating databases and application modules; list of security problems; contents of the recommendations for the list of problems section; status of the license used by the Software; Software operating mode; information about updating databases and application modules; list of ignored security problems; user ID issued after successful user authentication on Web-Portal; one-time password for automatically connecting the Software downloaded from the Web-Portal account; one-time password for device registration on Web-Portal; computer name on the network (domain name); type of the device connected to Web-Portal; reason for disconnecting from Web-Portal; token type; data to receive an authentication token for the session;
  • Information about local database update: ID of the Software update start.

Additional Information

  • Information about hardware installed on the computer, including information on the manufacturer, the model and capacity of the hard drive (HDD), the size of the physical and virtual memory, the RAM manufacturer, the manufacturer of the motherboard, the manufacturer and name of the BIOS application, the manufacturer of the video card and the size of the video RAM, the manufacturer and type of network adapter, its data transfer speed, the manufacturer and name of the monitor, ID of software installation and unique ID of the computer.
  • Information about the USB devices connected to the computer: the class / model of the USB device, the manufacturer of the device and name, and the date on which the device last connected to the computer.
  • Information about devices that support the UPnP protocol, including the name of the manufacturer and name of the device, as well as the date of last connection.
  • Information about the system load, including the free and used memory, and the size of free disk space.
  • Information about all installed applications, including the name and version of the installed application, the versions of the installed updates, the name of the publisher, the date of installation and the full path to the installation folder on the computer, and the configuration (settings) of the application (including browsers).
  • Information about the versions of the operating system (OS) and service packs installed on the computer; the name of the computer on the network (local and domain name); regional OS settings (information on the time zone, the default keyboard layout, and interface language); UAC settings; OS network firewall settings; OS parental control settings; Windows Update settings; parameters of the OS operating mode and the user's account.
  • Name and location of any file on the computer.
  • Aggregated information about user activity on the computer: the duration of the user's interaction with the computer; the period of information aggregation; the total number of events during this period; aggregated information about processes started by the user in the system; the name of the process; the total number of times the process was run; the total duration of its operation; the checksum (CRC64) of the account name from which the process was started; the full path to the process file; information about the software to which the process is associated (name, description, manufacturer, and version); the total number of times the software window was displayed; the total duration of its display; statistical parameters of the window name; the name localization language and the distribution of words in the name.
  • Information about visited websites; the website address; domain parts of web addresses that the user entered into the address bar of the browser or that the user opened from search systems.

The core functionality of the Software as described in the User Manual is to protect the End User from known threats to information security. To ensure that these core functional capabilities are provided in the software you are using, the Rightholder must receive and process the following information:

  • Information about the Anti-Spam component: heuristically determined IP address of the sender based on the received and SMTP session headers; most likely IP address of the spam sender; checksum of the processed object (MD5); checksums of attachments; determined text categories of an email message; web addresses detected in the processed email message; metadata and parts of the processed email message to be checked in the Rightholder's services.
  • Information about the User environment: Wi-Fi network name; checksum (MD5 with salt) of the MAC address of the access point; checksum (SHA256 with salt) of the MAC address of the access point; Wi-Fi network authentication type; Wi-Fi network encryption type; Wi-Fi network ID based on the MAC address of the access point; Wi-Fi network ID based on the Wi-Fi network name; Wi-Fi network ID based on the Wi-Fi network name and the MAC address of the access point; Wi-Fi signal strength; list of available Wi-Fi networks and their settings; DHCP settings (checksums of the local IP address of the gateway, DHCP IP, DNS1 IP, DNS2 IP, and subnet mask); DHCP settings (checksums of gateway local IPv6, DHCP IPv6, DNS1 IPv6, DNS2 IPv6, subnet mask); URL of the service used to access the internet; first 5 bytes of device MAC address; OS ID; information about device control mode in the Wi-Fi network; device ID based on the User ID on the Web-Portal; status of the device connected to the Wi-Fi network; device type; vendor of the device or network card.
  • Information about an object being processed: checksum of the user name; number of software runs since the last time the file checksum was sent; format of the object being processed; grouping severity level; link to a Knowledge Base article; indicator of processing the setting; number of detected vulnerabilities in the security settings; indicator showing if it is possible to remotely fix the detected vulnerabilities in the security settings; ID of the applied rule; severity category of security settings.
  • Other information: version of the statistics being sent; date and time of receipt of the application request (GMT); detection of device usage by a child; method used to detect devices in the network; version of the component that provides device detection in the network.
  • Information about local database update: value of the update task TARGET filter.
  • Information about the Rightholder's installed Software: ID of the KSN service accessed by the Software.

If You decide to use the Adaptive Security feature, You agree to automatically provide the information needed to generate recommendations to improve security. These recommendations will be shown in the Web-Portal in the User Account, to which the Software is connected. Information about the recommendations shown may be used by Technical Support only when processing a request from the User.

Kaspersky protects the received information according to legal requirements and applicable rules of Kaspersky. The data is transmitted over encrypted channels.

In order to improve security awareness about new threats and their sources and in order to improve Your security protection level and the product's operation, the Rightholder, with your consent that has been explicitly confirmed in the Kaspersky Security Network Data Collection Statement, is expressly entitled to receive such information. You can deactivate the Kaspersky Security Network service during installation. Also, You can activate and deactivate the Kaspersky Security Network service at any time in the Software settings window.

You further acknowledge and agree that any information gathered by Rightholder can be used to track and publish reports on security risk trends in the Rightholder's sole and exclusive discretion.

If you do not wish for the information collected by the Software to be sent to the Rightholder, You should not activate and/or de-activate, the Kaspersky Security Network service.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.