Trend Micro Internet Security Data Collection Notice

  • Solution ID:1120129
  • Last Updated:Sep. 05, 2018 3:19 AM (PST)
  • Applies to:Internet Security - 2019;
  • Data Collection Disclosure | Internet Security

This article outlines the following Trend Micro Internet Security features that collect data, the data transmitted, and how it can be configured.


Trend Micro Internet Security includes the following modules which may cause the corresponding personal data to be transmitted to Trend Micro.

Detailed information and instruction are provided below for opt-out of the personal data collection by disabling specific modules.

Modules that cannot be disabled are indicated below:


Google Analytics
DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

CONSOLE SETTINGS

[Back to top]


Installation
DESCRIPTION

The data is used for troubleshooting when there is an installation error and to improve user experience.

DATA COLLECTED

Product Debug Logs
IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

CONSOLE SETTINGS

[Back to top]


License Management
DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED

Password
Email address
First name
Last name
Computer name
Physical address
Phone number
IP address
Mac address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

CONSOLE SETTINGS

[Back to top]


Smart Protection Network
DESCRIPTION

We process the data to improve the usability of our products.

DATA COLLECTED

Share threat information with Trend Micro controls the data collected by the following features:

Trend Micro Toolbar
Manual Scan / Schedule Scan
Realtime Scan
Active Monitor
Web Threat Protection
Browser Exploit Prevention
Firewall Booster
Anti Spam Toolbar
All malware detection records
Secure Erase - deleted filename
Wi-Fi Advisor
- detected ap name
- ap ID
- ap MAC
- NIC ID
- NIC name
- NIC MAC

CONSOLE LOCATION

Main Console > Other Settings > Smart Protection Network

CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    User Behavior and Smart Protection Network

[Back to top]


Protect Another Device
DESCRIPTION

The data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED

Gateway BSSID
Gateway Mac address
Mac address
IP address
Bluetooth name and address
Host name
Computer name and ID

CONSOLE LOCATION
  • Welcome Page
  • Main Console > Device > Protect Another Device > Choose
  • Main Console > Protect Another Device > Scan your network to find devices
CONSOLE SETTINGS
  • OPTION 1: Welcome Page

    Welcome Page

  • OPTION 2: Choose a Device
    Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • OPTION 3: Scan your network to find your device
    Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • Popups:

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]


Active Update
DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

CONSOLE SETTINGS

[Back to top]


Error Log Auto Feedback
DESCRIPTION

We use this data to troubleshoot customers' problems.

DATA COLLECTED

Product debug logs and dumps
System information
Windows system event logs
IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

CONSOLE SETTINGS

[Back to top]


PC Health Checkup & User Behavior
DESCRIPTION

We use this data to optimize customers' devices performance and design new features to provide additional help to our customers.

DATA COLLECTED

MAC address
Filenames
System information
Product settings
IP address
Bluetooth name

CONSOLE LOCATION
  • Main Console > Settings > PC Health Checkup
  • Main Console > Other Settings > Smart Protection Network
CONSOLE SETTINGS
  • Main Console > Settings > PC Health Checkup.

    PC Health Checkup

  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro

    Share computer performance information with Trend Micro

[Back to top]


Trend Micro Toolbar
DESCRIPTION

The data is collected so that Trend Micro can analyze these URLs to check their safety.

DATA COLLECTED

Unrated URL
IP address

CONSOLE LOCATION
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure
  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure
CONSOLE SETTINGS
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure > Turn ON or Turn OFF Privacy Scanner

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure > Turn ON or Turn OFF Social Networking Protection

    Trend Micro Toolbar - Configure

    Enable Social Networking Protection

[Back to top]


Manual Scan/ Scheduled Scan
DESCRIPTION

Manual and Scheduled Scans are used to detect threats on users' devices.

Data is collected to improve threat detection and generate scan reports.

To opt-out of data collection, users should not scan their devices.

DATA COLLECTED

File name and full path
IP address
Original URL

CONSOLE LOCATION
  • Manual Scan:
    • Main Console > Arrow Icon
    • Trend Micro Shortcut > Scan Now
    • Dropdown Menu
  • Scheduled Scan: Main Console > Settings > Scheduled Scans
CONSOLE SETTINGS
  • Manual Scan:
    • OPTION 1: Main Console > Arrow Icon > Quick Scan / Full Scan / Custom Scan

      Manual Scan - Scan Dropdown

    • OPTION 2: Trend Micro Shortcut > Scan Now

      Manual Scan - Scan Now

    • OPTION 3: Dropdown Menu

      Manual Scan - Dropdown Menu

  • Scheduled Scan: Main Console > Settings > Scheduled Scans > Turn ON or Turn OFF Conduct a scheduled scan of the computer

    Scheduled Scan - Conduct a scheduled scan of the computer

[Back to top]


Real-time Scan

Scan for threats when opening, saving, or downloading files

DESCRIPTION

Data is collected to build a knowledge base to enhance detection rate and reduce false alarms.

DATA COLLECTED

File name
File path
IP address
Original URL
Suspicious files
Task scheduler
WMI information
Network group name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Scan for threats when opening, saving, or downloading files

    Scan threats when opening, saving, or downloading files

[Back to top]

Enable machine-learning to protect from new or unknown threats

DESCRIPTION

Data collected for machine-learning is used to identify if a file is malicious and fine tune our engine logics and pattern definitions.

DATA COLLECTED

File name
File path
URL
Path
Domain name
Account name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Enable machine-learning to protect from new or unknown threats

    Enable machine-learning to protect from new or unknown threats

[Back to top]

Back up files encrypted or modified by suspicious programs

DESCRIPTION

We collect this data to improve our solutions and provide reports to customers.

DATA COLLECTED

Restored file name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Back up files encrypted or modified by suspicious programs

    Back up files encrypted or modified by suspicious programs

[Back to top]


Active Monitoring
DESCRIPTION

Active Monitoring monitors system activity in real time and takes action when activity of a program violates a policy.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

Registry key
Registry value
URL

File name
File path
File type
IP address
Original URL
Network group name

CONSOLE LOCATION

Main Console > Settings > Scan Preferences

CONSOLE SETTINGS
  • Main Console > Settings > Scan Preferences > Check if programs try to make unauthorized changes to system settings that could threaten your security

    Check if programs try to make unauthorized changes to system settings that could threaten your security

[Back to top]


Web Threat Protection
DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

IP address
URL
File name
File path
Original URL
Network group name

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites.

    Block potentially dangerous websites

[Back to top]


Browser Exploit Prevention
DESCRIPTION

Analyzes malicious URLs and malicious scripts in web pages.

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

    Prevent Internet Explorer, Firefox, and Chrome from running malicious scripts on infected websites

[Back to top]


Firewall Booster
DESCRIPTION

Data collected by Firewall Booster is used to increase the accuracy and detection rate of each pattern rule.

DATA COLLECTED

Source IP and port number
Destination IP and port number

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Network

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Network > Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

    Activate the Firewall Booster to enhance the protection given by the Windows Firewall and detect botnet programs that can hijack your computer by remote control

[Back to top]


Support Tool
DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED

Debug logs from Trend Micro products
Modules
System information
Device name
Account name
File path
Detected suspicious files

CONSOLE LOCATION
  • Support Tool Console - For debug log collection in Tab (A) Debug
  • Support Tool Console - For malicious log collection in Tab (B) Threats
CONSOLE SETTINGS
  • Support Tool Console - For debug log collection in Tab (A) Debug:

    Support Tool - (A) Debug

    Support Tool - Finish Collecting Data


    Users can choose to automatically send log data to Trend Micro.

    Support Tool - Automatically send data to Trend Micro when finished

  • Support Tool Console - For malicious log collection in Tab (B) Threats:

    Support Tool - (B) Threats

    Support Tool - Generate Malicious Software Logs

[Back to top]


Single Password
DESCRIPTION

Password data is used to allow customers to access their Trend Micro products settings and Vault.

To opt-out of data collection, users should not set up password protection.

DATA COLLECTED

Email address
Single password

CONSOLE LOCATION

Main Console > Settings > Other Settings > Password

CONSOLE SETTINGS
  • Main Console > Settings > Other Settings > Password > Enable password protection to prevent unauthorized changes

    Single Password

[Back to top]


Anti Spam Toolbar
DESCRIPTION

Email data is used for Mail Phishing Score.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Spam emails
Emails reported by users as not spam

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Spam & Emailed Files

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Spam & Emailed Files > Filter out unsolicited advertisements and other unwanted email messages from your Outlook inbox.

    Anti Spam Toolbar

[Back to top]