KASPERSKY SECURITY NETWORK (KSN) STATEMENT
Kaspersky Security Network Statement (hereinafter "Statement") relates to Kaspersky Internet Security (hereinafter "Software").
All terms used in this Statement have the same meaning defined in the End User License Agreement (EULA) under the paragraph "Definitions".
Please carefully read the terms of this Statement, as well as all documents referred to in this Statement, before accepting it. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of this Statement before data processing begins.
Data Protection and Processing
The Rightholder handles the data it receives from the End User under this Statement in accordance with the Rightholder's Privacy Policy published at: https://www.kaspersky.com/Products-and-Services-Privacy-Policy.
Purpose of Data Processing
To make it possible to increase the Software's speed of reaction to information and network security threats. It is achieved by:
- Determining the reputation of scanned objects
- Identifying information security threats that are new and challenging to detect, and their sources
- Reducing the likelihood of false positives
- Increasing the efficiency of Software components
- Investigating of infection of a user's computer
- Improving the performance of the Rightholder's products
- Receiving reference information about the number of objects with known reputation
Processed Data
Certain data which is processed under this Statement could be considered personal data according to laws of some countries. With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under this Statement:
Information about suspicious files:
- File or part of a file
- Service information (constant, version, and service name)
Information about device firmware:
- Operating system
- Device model
- Build ID for displaying to the user
- Firmware fingerprint
- Firmware identifier
- Product/hardware manufacturer
- Full product name
- Build type, for example, "user" or "eng"
- Current development codename or the string "REL" for production builds
- Incremental number of the build
- Flag indicating whether the device is rooted
- Whether installation of apps from outside of Google Play is allowed
- Status of the cloud service for verification of Google apps
- Status of the cloud service for verification of Google apps being installed through ADB
- License type
Information about the detected object:
- MD5 hash sum of the detected object
- Size of the detected object
- Name of the detected object according to the Kaspersky Lab classification
- Flag indicating the verdict status
- Name of the detected object (file)
- Full path to the detected file
- Path template code
- Identifier of the anti-virus database record on which the verdict is based
- Database release time
- Record type, the identifier of the anti-virus database that a record belongs to
- Date and time of the last anti-virus database update on the user's device
- Information about whether the detected file is a portable executable (PE) file
- File type code
- File type identifier
- SHA2-256 hash sum of the detected object
Information about opening the phishing URL:
- Operating system version
- Operating system service pack version
- Version of the statistics package
- URL, which refers to the detected object
- MD5 hash sum of the executable file that requested the URL
- Size of the executable file that requested the URL
- Name of the executable file that requested the URL
- HTTP referrer data
- IP address of the server with which a connection was established
Information for identifying new web threats and analyzing false positive detects:
- Operating system version
- URL address of the page on which malicious or suspicious content, or a malicious or suspicious object was detected
- IPv4 address of the blocked object
- Version of the statistics package
- Name of the detected object according to the Kaspersky Lab classification
- Name of the executable file that downloaded the detected object
- Size of the executable file that downloaded the detected object
- MD5 hash sum of the executable file that downloaded the detected object
- Identifier of the anti-virus database record on which the verdict is based
- Database release time
- Identifier of the anti-virus database that a record belongs to
- Release date and time of the anti-virus database on the user's device
Information about Wi-Fi networks:
- Wi-Fi network SSID
- SHA256 hash sum of the MAC address (BSSID) of the Wi-Fi access point
- MD5 hash sum of the MAC address (BSSID) of the Wi-Fi access point
- Flag indicating whether the device is plugged in
- Flag indicating whether a DNS name is available
- Device type
- Product version
- Product identifier
- Hash sum of the UID and BSSID
- Hash sum of the UID and SSID
- Hash sum of the UID, BSSID, and SSID
- List of available Wi-Fi access points
- Resulting security category of the network in the product
- Resulting publicity category of the network in the product
- DHCP settings
- Signal level
- Hash sum of the local IPv4 address
- Hash sum of the local IPv6 address
- Local time when the connection was started
- Local time when the connection was interrupted
- Connection types supported by the access point
- The set of authentication protocols supported by this configuration
- The set of group ciphers supported by this configuration
- The set of key management protocols supported by this configuration
- The set of pairwise ciphers for WPA supported by this configuration
- The set of security protocols supported by this configuration
- Authentication protocol used for the WPA-EAP connection
- Internal authentication protocol
Information about the quality of KSN services:
- KSN service identifier
- Statistics for successful packets
- Statistics for unsuccessful packets
- Statistics for packet time
- Statistics for packet number
- Number of connections from cache
- Number of successful connections
- Number of unsuccessful connections
- Number of successful transactions
- Number of unsuccessful transactions
- Time distribution of successful connections
- Time distribution of unsuccessful connections
- Time distribution of successful transactions
- Time distribution of unsuccessful transactions
- Service request identifier
- Number of service requests
- Number of service requests from cache
- Number of requests canceled because of network problems
- Number of requests canceled because of inactive service
- Number of requests canceled because of an invalid path
- Time distribution of successful requests
- Time distribution of canceled requests
- Time distribution of requests that timed out
- Time histogram
Your Choice to Participate
It is entirely Your choice to automatically send data to the Rightholder on a regular basis under this Statement. You can withdraw Your consent at any time in the settings of the Software as described in the User Manual.
© 2021 AO Kaspersky Lab