Default Collection
Trend Micro ScamCheck for Mobile automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.
Log Collection
Crash report collected by third-party service:
- Firebase
DESCRIPTION |
Product logs are necessary to solve problems reported by our customers. Manual log collection is only used when the support center requests the logs. Crash / issue logs (auto-feedback) collects crash / issue logs in real-time for problems where there may be timing issues and logs may be difficult to collect manually. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
FEATURE SETTINGS |
Integrated modules from third-party service providers
- Firebase
DESCRIPTION |
Trend Micro ScamCheck for Mobile Security uses this data to improve product stability, usability, and performance. Marketing activities are based on this data. |
---|---|
DATA COLLECTED |
Data collected and feedback by SDK. Data includes:
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
FEATURE SETTINGS |
Configurable Features
Trend Micro ScamCheck for Mobile includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.
Data collected by SPN and provide monthly report
Log Collection Crash report collected by third-party service:
- Microsoft App Center
- Firebase
Integrated modules from third-party service providers:
- AppsFlyer
- Firebase
DESCRIPTION |
Device ID is the information that help us to associate the user non-anonymous date and user behaviors. The following activities are based on the data associate of Device ID:
|
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
FEATURE SETTINGS |
|
Call identify and block
DESCRIPTION |
The call identify and block filter allows Trend Micro ScamCheck for Mobile to block the scam call. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
FEATURE SETTINGS |
|
SMS Filter
DESCRIPTION |
SMS Filter is the feature to protect users from fraud messages. It includes the below functions. We will scan the SMS / MMS message which is sent by an unknown sender. If the message include the risk links, we will move the message to Junk Folder of Messages. |
---|---|
DATA COLLECTED |
For SMS Filter, when user receives a new message from an unknown sender, Fraud Buster will scan and store the:
The data from Fraud Buster will be used to enhance the fraud detection. The collected data is deleted after 6 months. |
FEATURE LOCATION |
|
FEATURE SETTINGS |
|
Fraud Checking
DESCRIPTION |
Fraud Checking allows users to manually input any text data, URL, email address, even Line, ID to check if the data content is fraud or not. We will analyze the information from the input and let users know the detection result. The content may be safe, a fraud or a fake news. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This is manually inputed by users. We will get the data only when users would like to send the data to us for detection |
FEATURE SETTINGS |
Contacts
DESCRIPTION |
Trend Micro ScamCheck for Mobile only imports contacts, no other action for these data. |
---|---|
DATA COLLECTED |
In Android, Trend Micro ScamCheck for Mobile imports contacts of user's device.
The data from Fraud Buster will be used to enhance the fraud detection. The collected data is deleted after 6 months. |
FEATURE LOCATION |
|
FEATURE SETTINGS |
|
To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.