Logo
How can we help you?

Flothers – PRODUCTS AND SERVICES PRIVACY POLICY

Introduction

This Privacy Policy describes how Flothers uses the information you provide when you use our products and services, and the choices you can make about our use of the information. We also describe the measures we take to protect the information and how you can contact us about our privacy practices.

The Sources of Information

Flothers may obtain information about you from various sources, namely:

Information Provided by Users and How We Use Information

Personal data processing by Flothers is always carried out in a legal and fair manner.

Some data are non-personal, according to laws of certain countries. Regardless of the type of data and territory where data was received or processed, we use the highest standards of data protection and apply various legal, organizational, and technical measures in order to protect user data, guarantee safety and confidentiality, as well as ensure users' rights guaranteed under applicable law.

The data depends on the products and services you use, and could include the following:

It is processed in order to recognize legitimate users. This data is needed to maintain communication between the product and Flothers services – sending and receiving product databases, updates, etc.

Data on the product's operation and its interaction with the user is also analyzed. For example, how long does threat scanning take? Which features are used more often than others? Answers to these and other questions help developers to improve products, making them faster and easier to use.

Data such as device type, operating system, etc. may be needed so the user doesn't have to buy a new license for the security product after reinstalling the operating system. This information also helps us to analyze cyberthreats, because it shows how many devices are affected by any specific threat.

If a threat (new or known) is found on a device, information about that threat is sent to Flothers. This enables us to analyze threats, their sources, principles of infection, etc., resulting in a higher quality of protection for every user.

This information helps to create lists of harmless applications and prevents security products from mistakenly identifying such applications as malicious. This data is also used to update and extend program categories for features like Parental Control and Application Startup Control. In addition, this information helps us to offer users security solutions that best match their needs.

IPs can be sent to be checked whether they are malicious. This information also helps to create lists of harmless websites and prevents security products from mistakenly identifying such websites as malicious.

New malware can often be identified only by its suspicious behavior. Because of this, the product analyzes data on processes running on the device. This makes it possible to identify early on processes that indicate malicious activity and to prevent any damaging consequences, such as the destruction of user data.

If an (as yet) unknown file, exhibiting suspicious behavior is detected on a device, it can be automatically sent for a more thorough analysis by machine learning-based technologies and, in rare cases, by a malware analyst. The 'suspicious' category includes mainly executable files (.exe). For the purpose of reducing the likelihood of false positives, executable and non-executable harmless files or their parts may be sent.

Email addresses are used for authorization on the Flothers web portals which enables users to manage their protection remotely. Email addresses are used to send security messages to (e.g., containing important alerts) to users of Flothers products. Contact information is provided by users at their own discretion.

FLOTHERS WILL ONLY PROCESS PERSONAL DATA FOR PARTICULAR, PRE-DETERMINED PURPOSES THAT ARE LEGITIMATE WITH REGARD TO APPLICABLE LAW, AND THAT ARE RELEVANT TO FLOTHERS'S BUSINESS.
What we aren't going to process

Through its products and services, Flothers never process "sensitive" personal data such as religion, political views, sexual preference, or health, or other special categories of personal data. We do not wish to receive any such data and will not request it from you.

Information Security: How We Protect Your Privacy

Information security is Flothers's core business. All data and all information provided by you is confidential by default. Flothers will therefore always apply technical and organizational data security measures for the protection of personal data that are adequate and appropriate, taking into account the concrete risks resulting from the processing of personal data as well as up-to-date security standards and procedures. In order to, among other reasons, identify and fulfill the appropriate level of protection, Flothers classifies processing systems with personal data and implements cascading sets of protective measures.

How to Contact Us

If you have any questions or comments about this Privacy Policy, Kaspersky's privacy practices or if you would like us to update or remove information or preferences you may contact at [email protected]