Now this can make one’s head spin.
These types of information and personal information enables users to participate, share and leverage Trend Micro's global database of threat related intelligence to rapidly identify and defend against potential threats within each Customer's unique network environment, as described in more detail below, as well as enabling us to provide any support requested. You can find further details of the types of data that Trend Micro products collect, what this data is used for and detailed instructions on how to disable the specific features that feedback data to Trend Micro in the Privacy and Personal Data Collection Disclosure.[LINK/URL:
DCX]
• Product information, such as MAC address, device ID
• Public IP address of the user's gateway to the internet
• Mobile/PC environment
• Metadata from suspicious executable files
• URLs, Domains and IP addresses of websites visited and DNS data
• Metadata of user/device managed by gateway Product
• Information about the Android applications installed on a user's device
• Application behaviours
• Personal information contained within email content or files to which Trend Micro is provided
access
• Behaviours of Product users
• Information from suspicious email, including sender and receiver email address, and
attachments
• Detected malicious file information including file name and file path
• Detected malicious network connection information
• Debug logs
• Network Architecture/Topology and network telemetry data
• Screen capture of errors
• Windows event log content
• WMI event content
• Registry data
Security and threat detection functions relating to our Products and functions includes:
• Analyse data sent to/from the user's device to isolate and identify threats, vulnerabilities,
suspicious activity and attacks;
• Assess the reputation of a website, email sender’s IP address, device or file to advise the user
on whether access should be granted;
10
• Analyse email to protect against spam, impersonation and other suspicious content;
• Virus protection;
• Intrusion detection, prevention and protection;
• Threat prevention and prediction;
• Network defence;
• Sand box testing (for certain cloud products);
• Storage of emails for back up purposes (certain cloud products);
• Identify, block and/or remove applications, messages, and files that may compromise
productivity or the performance and security of computers, systems, and/or networks;
• Identify sources and methods of targeted attacks; and
• Deliver updated protection against malicious threats.
We may also use personal information for other business purposes,including:
• Internal record keeping;
• Compliance with the law and requests from governmentbodies;
• Product development;
• Keeping existing and past Customers informed about our Productsand promotions;
• Providing Customer support;
• Managing subscriptions and billing; and
• Responding to requests, questions and comments.
Comment: Trend Micro collects a massive amount of information-of-interest. This information is presumably used to improve detection and falls under various laws such as GDPR, California Consumer Protection Act and others. It is possible to turn telemetry off in settings which will prevent some information from being shared.