Views:

Default Collection

Ransom Buster v12.02 includes the following modules which may cause the corresponding data to be transmitted to Trend Micro.

Detailed information and instruction are provided below to opt-out of the data collection by uninstalling Ransom Buster.

Modules cannot be disabled.

Google Analytics

DESCRIPTION

Google Analytics data is used to improve user experience.

DATA COLLECTED
  • GUID
  • OS version
  • Language
  • Hardware model
  • Browser version
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

License Management

DESCRIPTION

License Management uses collected data to identify customers' accounts for support service purposes.

DATA COLLECTED
  • Email address
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

Error Log Auto Feedback

DESCRIPTION

Logs data is used to troubleshoot customers' problems.

DATA COLLECTED
  • Product debug logs and dumps
  • Windows system information
  • Windows system event logs
  • IP address
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

User Behavior and Smart Protection Network

DESCRIPTION

We process this data to improve the usability of our products.

DATA COLLECTED

Share threat information with Trend Micro controls the data for Active Monitor, and includes:

  • Language
  • User interactions with product UI
  • Product settings
  • All malware detection records
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

Active Monitoring

DESCRIPTION

The data collected is used to enhance detection rate and reduce false alarms.

DATA COLLECTED
  • Registry key
  • Registry value
  • Registry data type
  • URL
  • File name
  • File path
  • File type
  • File properties
  • File attributes
  • File description
  • Signature
  • SHA
  • IP address
  • OS name
  • OS version
  • Original URL
  • GUID
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

Malware Detection Record

DESCRIPTION

Data is collected to build a knowledge base to enhance detection rate and reduce false alarms.

DATA COLLECTED
  • Installed applications
  • Mozilla Firefox, Google Chrome, and Internet Explorer extension names and versions
  • Process names that run automatically on boot-up
  • Mac address
  • File name
  • File path
  • File property
  • File attributes
  • File description
  • File index
  • File signature
  • File type
  • SHA1
  • MD5
  • PE file header information
  • IP address
  • OS name
  • OS version
  • Original URL
  • GUID
FEATURE LOCATION

This feature cannot be disabled.

If you do not want this data to be collected, please uninstall the program from your device.

FEATURE SETTINGS

[Back to top]

Add a comment