Default Collection
Trend Micro Mobile Security for Android automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.
First Time Auto Scan
DESCRIPTION |
When launching app for the first time, after accepting data collection notices and EULA, Trend Micro Mobile Security will scan all installed apps and check the device status automatically. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
License Check
DESCRIPTION |
Checks the status of users’ license. Remind users to use relevant in-product features, products and services and if user opts in, to introduce new features, products and services to the user. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
Log Collector
DESCRIPTION |
Product logs are necessary to solve problems reported by our customers. Manual log collection is only used when the support center requests the logs. Crash / issue logs (auto-feedback) collects crash / issue logs in real-time for problems where there may be timing issues and logs may be difficult to collect manually. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
Integrated modules from third-party service providers:
DESCRIPTION |
Trend Micro Mobile Security for Android also uses this data to improve product stability, usability, and performance. The following marketing activities are based on this data:
|
---|---|
DATA COLLECTED |
Data collected and feedback by SDK, including:
|
FEATURE LOCATION |
This feature cannot be disabled. If you do not want this data to be collected, please uninstall the application from your device. |
Air Support
DESCRIPTION |
When launching the app for the first time, after accepting data collection notices and EULA, Trend Micro Mobile Security will collect UID and license status to decide whether the function is available. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
This information will be collected after user accepts EULA. If you do not want this data to be collected, please uninstall the application from your device. |
Configurable Features
Trend Micro Mobile Security for Android includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.
Security Scan
DESCRIPTION |
Security Scan leverages Trend Micro’s global database of threat-related intelligence to rapidly identify potential threats to protect users’ devices. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Web Guard
DESCRIPTION |
Web Guard collects this data to protect users from malicious web content and to remind users to use relevant in-product features, products and services and if user opts in, to introduce new features, products and services to the user. List of APPs that could be protected by Web Guard |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Pay Guard Launcher
DESCRIPTION |
Protects your financial and ecommerce activities from attacks & information leakage. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Parental Controls Website Filter
DESCRIPTION |
Parental Controls collects this data to protect users from malicious web content and keeps children from accessing unwanted web content and apps. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Lost Device Protection
DESCRIPTION |
Lost Device Protection helps locate a lost device after the user grants permission and enables the feature. Lost Device Protection can also perform a full-disk erase to prevent data theft. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Secret Snap
DESCRIPTION |
Secret Snap takes a photo and emails it to the user when an unauthorized person tries to access their phone. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Fraud Buster
DESCRIPTION |
Fraud Buster detect the fraud messages when user receive a new message or launch the default SMS App. |
---|---|
DATA COLLECTED |
Fraud Buster detects fraud messages when user receives a new message or launch the default SMS app.
|
FEATURE LOCATION |
|
Notification Scan
DESCRIPTION |
Notification Scan detects malicious links in notification contents. |
---|---|
DATA COLLECTED |
Only URL will be sent to backend, notification content will not be stored in local and cloud. |
FEATURE LOCATION |
|
Air Support
DESCRIPTION |
Air Support can establish a separate communication channel between user and support, which facilitates the collection of user equipment information and the detailed situation of the problem. Help users solve problems faster and more conveniently. When the user uses the air support function, the app will collect the user's device information, account info and log info to help user solve problems. |
---|---|
DATA COLLECTED |
Data collected and feedback, including:
|
FEATURE LOCATION |
|
Login
DESCRIPTION |
When users want to login to Trend Micro Mobile Security, they need to input their account and password, when they choose to login by phone number, SMS verification code is needed. |
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|
Data collected by SPN and provide monthly report
Integrated modules from third-party service providers:
- AppsFlyer
- Firebase
DESCRIPTION |
Trend Micro uses this data to provide a monthly report to users who purchase multiple device licenses. Trend Micro Mobile Security for Android also uses this data to improve product stability, usability, and performance. The following marketing activities are based on this data:
Device ID is the information that help us to associate the user non-anonymous date and user behaviors. The following activities are based on the data associate of Device ID:
|
---|---|
DATA COLLECTED |
|
FEATURE LOCATION |
|