Views:

Default Collection

Trend Micro Internet Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.

To see where this data is processed, refer to our list of data centers and authorized data subprocessors and their locations.

Google Analytics

DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED
  • IP Address
FEATURE LOCATION

This feature cannot be disabled.

[Back to top]

Installation

DESCRIPTION

The data is used for troubleshooting when there is an installation error and to properly identify your computer and network environment in order to provide better support.

DATA COLLECTED
  • Product Debug Logs
  • IP Address
  • MAC address
  • Gateway BSSID
  • Gateway MAC address
  • Computer name
FEATURE LOCATION

This feature cannot be disabled.

[Back to top]

License Management

DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes and to remind users to use relevant in-product features, products and services and if user opts in, to introduce new features, products and services to the user.

DATA COLLECTED
  • Email address
  • Password
  • First name
  • Last name
  • Computer name
  • Physical address (Japan)
  • Phone number (Japan)
  • Birthday (Japan)
  • IP address
  • MAC address
FEATURE LOCATION

This feature cannot be disabled.

Note: Only applies to new customers with full licenses that choose to create a Trend Micro Account using the product during installation.

[Back to top]

Active Update

DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED
  • IP address
FEATURE LOCATION

This feature cannot be disabled.

[Back to top]

Error Log Auto Feedback

DESCRIPTION

Trend Micro uses this data to troubleshoot any issues encountered while using the product.

DATA COLLECTED
  • Product debug logs and dumps
  • System information
  • Windows system event logs
  • IP address
FEATURE LOCATION

This feature cannot be disabled.

[Back to top]

Configurable Features

Trend Micro Internet Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.

Share threat information with Trend Micro

DESCRIPTION

Sharing threat information with the Smart Protection Network allows Trend Micro to rapidly identify and address new threats.

Share threat information with Trend Micro controls the data collected by the following features:

  • Manual Scan
  • Scheduled Scan
  • Real-time Scan
  • Active Monitoring
  • Browser Exploit Prevention
  • Firewall Booster
DATA COLLECTED
  • Malware detection records (File name, File path, IP address, URL, Registry key, Registry value, Detected program name/path)
  • Firewall records (Source IP and port number, Destination IP and port number)
  • Secure Erase - deleted file name
  • Wi-Fi Advisor records (detected app name, app ID, app MAC, NIC ID, NIC name, NIC MAC address)
FEATURE LOCATION
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    Share threat information with Trend Micro

    Note:If you only want to disable the data collection for a specific feature, disable each feature separately using the related product screens. Refer to the Online Help for more information.

[Back to top]

Share computer performance information with Trend Micro

DESCRIPTION

Trend Micro uses this data to optimize the performance of your devices and design new features to further protect our customers.

DATA COLLECTED
  • MAC address
  • File name
  • System information
  • Product settings
  • IP address
  • Browser setting
  • Installed applications
  • Running processes
  • URL (Users choose to open websites automatically in Pay Guard, or disable this feature)
  • Product UI shown
    - User interaction with product UI
FEATURE LOCATION
  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro

    Share computer performance information with Trend Micro

[Back to top]

Web Threat Protection

DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED
  • IP address
  • URL
  • File name
  • File path
  • Original URL
  • Browser’s user agent
FEATURE LOCATION
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites

    Block potentially dangerous websites

[Back to top]

Protect Another Device

DESCRIPTION

This data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED
  • MAC address
  • Gateway SSID
  • Gateway MAC address
  • IP address
  • Hostname
FEATURE LOCATION
  • Welcome Page

    Welcome Page

  • Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • Popups

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]

Trend Micro Toolbar

DESCRIPTION

URLs you access are collected and checked against our threat intelligence database to prevent you from accessing malicious websites and protect you from online threats.

DATA COLLECTED
  • Unrated URL
  • IP address
FEATURE LOCATION
  • Main Console > Privacy > Privacy Scanner > Configure
  • Main Console > Privacy > Social Networking Protection > Configure

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

    Enable Social Networking Protection

[Back to top]

Support Tool

DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED
  • Debug logs from Trend Micro products
  • Modules
  • System information
  • Device name
  • Account name
  • File path
  • Detected suspicious files
FEATURE LOCATION
  • Support Tool Console - For debug log collection in Tab (A) Debug:

    Support Tool - (A) Debug

    Support Tool - Finish Collecting Data


    Users can choose to automatically send log data to Trend Micro.

    Support Tool - Automatically send data to Trend Micro when finished

  • Support Tool Console - For malicious log collection in Tab (B) Threats:

    Support Tool - (B) Threats

    Support Tool - Generate Malicious Software Logs

[Back to top]

Single Password

DESCRIPTION

Password data is used to allow customers to access their Trend Micro products settings and Vault.

To opt-out of data collection, users should not set up password protection.

DATA COLLECTED
  • Email address
  • Password
  • Password hint
FEATURE LOCATION
  • Main Console > Settings > Other Settings > Password

    Enable password protection to prevent unauthorized changes

[Back to top]

Anti Spam Toolbar

DESCRIPTION

Email data is used for Mail Phishing Score.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED
  • Spam email
  • Email reported by users as not spam
FEATURE LOCATION
  • Main Console > Settings > Internet & Email Controls > Spam & Emailed Files

    Filter out unsolicited advertisements and other unwanted email messages from your Outlook inbox.

[Back to top]

Email Defender

DESCRIPTION

Email data is used for scam mail and malicious mail detection.

To opt-out of data collection, users should not use this feature.

Do not include personal information when reporting a false alarm.

Sharing threat information allows Trend Micro to rapidly identify and address new threats.

Note:Malicious detection records collection is not applied to Trend Micro Toolbar for Firefox.

DATA COLLECTED
  • Email Sender
  • Email Subject
  • Email Content
  • User comments
  • Malicious detection records (Sender’s full email address, URL, and phone number)
FEATURE LOCATION
  • Enable Email Defender

    Enable Email Defender

  • Report False Alarm

    Report False Alarm

  • Email Defender

    Email Defender

  • View Details

    View Details

[Back to top]

Dangerous Notification Scanning

DESCRIPTION

The feature will scan notification URLs inside the browser preference file.

This feature can be disabled by Trend Micro Diagnostic Toolkit.

DATA COLLECTED
  • Notification URLs
  • File path of browser preference file
  • OS notification information
FEATURE LOCATION

Dangerous Notification Scanning

[Back to top]

Unwanted Notification Blocker

DESCRIPTION

This feature checks the Allow notification setting of your Chrome and Edge browsers. When dangerous and suspicious websites are found, the feature changes their notification setting from Allow to Block.

DATA COLLECTED
  • SPN GUID of your Trend Micro security software
  • File paths of your browser settings
  • URLs in your browser’s Allow notification list
  • URL rating results
  • Installed software
  • Installed extensions
  • Raw notification payload from wpndatabase.db
  • OS notification information
  • OS Version
  • OS language
FEATURE LOCATION

Please choose non feedback version if you do not wish to feedback data to Trend Micro.

[Back to top]

AI-Powered Assistant

DESCRIPTION

This feature uses collected data to improve customers' chat experience.

DATA COLLECTED
  • Conversation History
FEATURE LOCATION

This feature cannot be disabled. If you do not want this data to be collected, please do not use this feature.

Trend Micro AI-Powered Guardian

Trend Micro AI-Powered Guardian - Chat

[Back to top]

See also

Comments (0)
Add a comment