Kaspersky Security Network Statement (hereinafter “KSN Statement”) relates to Kaspersky Internet Security for Android (hereinafter “Software”).
All terms used in this KSN Statement have the same meaning defined in the End User License Agreement (EULA) under the clause ''Definitions''.
Please carefully read the terms of this KSN Statement, as well as all documents referred to in this KSN Statement, before accepting it. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the KSN Statement before data processing begins.
Data Protection and Processing
The Rightholder handles the data it receives from the End User under this KSN Statement in accordance with the Rightholder’s Privacy Policy published at: https://www.kaspersky.com/products-and-services-privacy-policy.
Purposes of Data Processing
Use of the KSN may increase the Software’s speed of reaction to information and network security threats.
It is achieved by:
Determining the reputation of scanned objects
Identifying information security threats that are new and challenging to detect, and their sources
Reducing the likelihood of false positives
Increasing the efficiency of Software components
Investigating of infection of a user’s computer
Improving the performance of the Rightholder’s products
Receiving reference information about the number of objects with known reputation
Processed Data
Certain data which is processed under this KSN Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this KSN Statement:
Information about suspicious files:
File or part of a file
Service information (constant, version, and service name)
Information about device firmware:
Operating system
Device model
Build ID for displaying to the user
Firmware fingerprint
Firmware identifier
Product/hardware manufacturer
Full product name
Build type, for example, "user" or "eng"
Current development codename or the string "REL" for production builds
Incremental number of the build
Flag indicating whether the device is rooted
Whether installation of apps from outside of Google Play is allowed
Status of the cloud service for verification of Google apps
Status of the cloud service for verification of Google apps being installed through ADB
License type
Information about the detected object:
MD5 hash sum of the detected object
Size of the detected object
Name of the detected object according to the Kaspersky Lab classification
Flag indicating the verdict status
Name of the detected object (file)
Full path to the detected file
Path template code
Identifier of the anti-virus database record on which the verdict is based
Database release time
Record type, the identifier of the anti-virus database that a record belongs to
Date and time of the last anti-virus database update on the user’s device
Information about whether the detected file is a portable executable (PE) file
File type code
File type identifier
SHA2-256 hash sum of the detected object
Information about opening the phishing URL:
Operating system version
Operating system service pack version
Version of the statistics package
URL, which refers to the detected object
MD5 hash sum of the executable file that requested the URL
Size of the executable file that requested the URL
Name of the executable file that requested the URL
HTTP referrer data
IP address of the server with which a connection was established
Information for identifying new web threats and analyzing false positive detects:
Operating system version
URL address of the page on which malicious or suspicious content, or a malicious or suspicious object was detected
IPv4 address of the blocked object
Version of the statistics package
Name of the detected object according to the Kaspersky Lab classification
Name of the executable file that downloaded the detected object
Size of the executable file that downloaded the detected object
MD5 hash sum of the executable file that downloaded the detected object
Identifier of the anti-virus database record on which the verdict is based
Database release time
Identifier of the anti-virus database that a record belongs to
Release date and time of the anti-virus database on the user’s device
Information about Wi-Fi networks:
Wi-Fi network SSID
SHA256 hash sum of the MAC address (BSSID) of the Wi-Fi access point
MD5 hash sum of the MAC address (BSSID) of the Wi-Fi access point
Flag indicating whether the device is plugged in
Flag indicating whether a DNS name is available
Device type
Product version
Product identifier
Hash sum of the UID and BSSID
Hash sum of the UID and SSID
Hash sum of the UID, BSSID, and SSID
List of available Wi-Fi access points
Resulting security category of the network in the product
Resulting publicity category of the network in the product
DHCP settings
Signal level
Hash sum of the local IPv4 address
Hash sum of the local IPv6 address
Local time when the connection was started
Local time when the connection was interrupted
Connection types supported by the access point
The set of authentication protocols supported by this configuration
The set of group ciphers supported by this configuration
The set of key management protocols supported by this configuration
The set of pairwise ciphers for WPA supported by this configuration
The set of security protocols supported by this configuration
Authentication protocol used for the WPA-EAP connection
Internal authentication protocol
Information about the quality of KSN services:
KSN service identifier
Statistics for successful packets
Statistics for unsuccessful packets
Statistics for packet time
Statistics for packet number
Number of connections from cache
Number of successful connections
Number of unsuccessful connections
Number of successful transactions
Number of unsuccessful transactions
Time distribution of successful connections
Time distribution of unsuccessful connections
Time distribution of successful transactions
Time distribution of unsuccessful transactions
Service request identifier
Number of service requests
Number of service requests from cache
Number of requests canceled because of network problems
Number of requests canceled because of inactive service
Number of requests canceled because of an invalid path
Time distribution of successful requests
Time distribution of canceled requests
Time distribution of requests that timed out
Time histogram
Your Choice to Participate
It is entirely Your choice to automatically send data on a regular basis to the Rightholder under this KSN Statement. You can at any time withdraw Your consent from within the settings of the Software as described in the User Manual.
© 2019 AO Kaspersky Lab. All Rights Reserved.