Trend Micro Maximum Security Data Collection Notice

  • Solution ID:1119821
  • Last Updated:Sep. 10, 2019 1:56 PM (PST)
  • Applies to:Maximum Security - 2019, 2020;
  • Data Collection Disclosure | Maximum Security

This article outlines the following Trend Micro Maximum Security features that collect data, the data transmitted, and how it can be configured.



Default Collection

Trend Micro Maximum Security automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, after installing/enabling the product. It is necessary to collect this data to provide the security functions on this product. Therefore, you cannot disable these features. If you do not want Trend Micro to access this data, you should uninstall and stop using the product.


Google Analytics
DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED

IP Address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]


Installation
DESCRIPTION

The data is used for troubleshooting when there is an installation error and to improve user experience.

DATA COLLECTED

Product Debug Logs
IP Address
MAC address
Gateway BSSID
Gateway MAC address
Computer name

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]


License Management
DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED

Password
Email address
First name
Last name
Computer name
IP address
MAC address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

Only applies to new customers with full licenses that choose to create a Trend Micro Account using the product during installation.

CONSOLE SETTINGS

[Back to top]


Active Update
DESCRIPTION

Active Update collects IP data to allow Trend Micro to know whether this device has the latest protection against the latest malware.

DATA COLLECTED

IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]


Error Log Auto Feedback
DESCRIPTION

We use this data to troubleshoot customers' problems.

DATA COLLECTED

Product debug logs and dumps
System information
Windows system event logs
IP address

CONSOLE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program on your device.

CONSOLE SETTINGS

[Back to top]


Configurable Features

Trend Micro Maximum Security includes the following features, which may collect and transmit the following data, some of which may be considered personal in certain jurisdictions, to Trend Micro. You can disable any of these features at any time to prevent the corresponding data from being sent to Trend Micro.


Share threat information with Trend Micro
DESCRIPTION

Sharing threat information with the Smart Protection Network allows Trend Micro to rapidly identify and address new threats.

Share threat information with Trend Micro controls the data collected by the following features:
- Manual Scan
- Scheduled Scan
- Real-time Scan
- Active Monitoring
- Browser Exploit Prevention
- Firewall Booster

DATA COLLECTED

Malware detection records (File name, File path, IP address, URL, Registry key, Registry value, Detected program name/path)
Firewall records (Source IP and port number, Destination IP and port number)
Secure Erase - deleted file name
Wi-Fi Advisor records (detected app name, app ID, app MAC, NIC ID, NIC name, NIC MAC address)

CONSOLE LOCATION
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro
CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share threat information with Trend Micro

    User Behavior and Smart Protection Network

[Back to top]


Share computer performance information with Trend Micro
DESCRIPTION

Trend Micro uses this data to optimize the performance of your devices and design new features to further protect our customers.

DATA COLLECTED

MAC address
File name
System information
Product settings
IP address
Browser setting
Installed applications
Running processes
Product UI shown
User interaction with product UI

CONSOLE LOCATION
  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro
CONSOLE SETTINGS
  • Main Console > Other Settings > Smart Protection Network > Share computer performance information with Trend Micro

    Share computer performance information with Trend Micro

[Back to top]


Web Threat Protection
DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED

IP address
URL
File name
File path
Original URL

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Web Threats

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Web Threats > Block potentially dangerous websites

    Block potentially dangerous websites

[Back to top]


Protect Another Device
DESCRIPTION

The data is used to let users know which detected devices are protected by Trend Micro products.

Do not scan your network using Protect Another Device if you do not want to transmit data to Trend Micro.

DATA COLLECTED

MAC address
Gateway SSID
Gateway MAC address
IP address
Hostname

CONSOLE LOCATION
  • Welcome Page
  • Main Console > Device > Protect Another Device > Choose
  • Main Console > Protect Another Device > Scan your network to find devices
CONSOLE SETTINGS
  • Welcome Page

    Welcome Page

  • Choose a Device
    Main Console > Device > Protect Another Device > Choose

    Protect Another Device - Choose

  • Scan your network to find your device
    Main Console > Protect Another Device > Scan your network to find devices

    Protect Another Device - Scan your network to find devices

  • Popups:

    Protect Another Device - See Connected Devices

    Protect Another Device - Scan Network

[Back to top]


Trend Micro Toolbar
DESCRIPTION

URLs you access are collected and checked against our threat intelligence database to prevent you from accessing malicious websites and protect you from online threats.

DATA COLLECTED

Unrated URL
IP address

CONSOLE LOCATION
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure
  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure
CONSOLE SETTINGS
  • Privacy Scanner: Main Console > Privacy > Privacy Scanner > Configure > Turn ON or Turn OFF Privacy Scanner

    Trend Micro Toolbar - Configure

    Enable Privacy Scanner

  • Social Networking Protection: Main Console > Privacy > Social Networking Protection > Configure > Turn ON or Turn OFF Social Networking Protection

    Trend Micro Toolbar - Configure

    Enable Social Networking Protection

[Back to top]


Support Tool
DESCRIPTION

Data collected is used to troubleshoot users' issues.

To opt-out of data collection, users should not use the Support Tool to report issues.

DATA COLLECTED

Debug logs from Trend Micro products
Modules
System information
Device name
Account name
File path
Detected suspicious files

CONSOLE LOCATION
  • Support Tool Console - For debug log collection in Tab (A) Debug
  • Support Tool Console - For malicious log collection in Tab (B) Threats
CONSOLE SETTINGS
  • Support Tool Console - For debug log collection in Tab (A) Debug:

    Support Tool - (A) Debug

    Support Tool - Finish Collecting Data


    Users can choose to automatically send log data to Trend Micro.

    Support Tool - Automatically send data to Trend Micro when finished

  • Support Tool Console - For malicious log collection in Tab (B) Threats:

    Support Tool - (B) Threats

    Support Tool - Generate Malicious Software Logs

[Back to top]


Single Password
DESCRIPTION

Password data is used to allow customers to access their Trend Micro products settings and Vault.

To opt-out of data collection, users should not set up password protection.

DATA COLLECTED

Email address
Password
Password hint

CONSOLE LOCATION

Main Console > Settings > Other Settings > Password

CONSOLE SETTINGS
  • Main Console > Settings > Other Settings > Password > Enable password protection to prevent unauthorized changes

    Single Password

[Back to top]


Anti Spam Toolbar
DESCRIPTION

Email data is used for Mail Phishing Score.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Spam email
Email reported by users as not spam

CONSOLE LOCATION

Main Console > Settings > Internet & Email Controls > Spam & Emailed Files

CONSOLE SETTINGS
  • Main Console > Settings > Internet & Email Controls > Spam & Emailed Files > Filter out unsolicited advertisements and other unwanted email messages from your Outlook inbox.

    Anti Spam Toolbar

[Back to top]


Fraud Buster
DESCRIPTION

Email data is used for scam mail and malicious mail detection.

To opt-out of data collection, users should not use this feature.

DATA COLLECTED

Email Sender
Email Subject
Email Content

CONSOLE LOCATION

Trend Micro Toolbar

CONSOLE SETTINGS
  • Enable Fraud Buster

    Enable Fraud Buster

  • Security Scan

    Security Scan

  • Check Evidence

    Check Evidence

[Back to top]