G Data Software AG
Help make G Data virus protection even better.
We are constantly striving to improve our virus protection. You can help us do so by participating in the G Data Malware Information Initiative.
G Data Malware Information Initiative Data Declaration for Mobile Security
What is the G Data Malware Information Initiative?
Specialists at the G Data Security Labs are always trying to find ways to protect G Data customers from malware. The more information that is provided about the malware, the faster and more effectively protection mechanisms can be developed. The G Data Malware Information Initiative was set up so that such information might be included in its analyses. Through your participation in this initiative, you can contribute to helping every G Data customer make smartphones and other mobile devices even safer to use.
What sort of data is collected?
On detecting a suspicious or malicious file, the following data is collected:
- Version of the Malware Information Initiative protocol
- Version number of the G Data product and the engines being used
- Version number of the signatures being used
- Device-specific data concerning the operating system, language settings (locale) and a GUID
- Information concerning providers available at the time of the infection
- Hardware-specific information on the device such as manufacturer, model, device version
- Name and ID of the signature for each malware file found
- Information concerning the suspicious file:
* Checksum for the file or the suspicious parts of it
* Time of the malware detection
* Active provider
* Market from which the malware file was downloaded
* Malware file manifest
* File name and normalised path (%USER% transferred in place of the user's name)
With volume tariffs additional charges may be incurred by the transfer. The volume of data is of the order of a few kilobytes and normally gives rise to very small costs.
IMPORTANT: No personal data is transferred. The transferred data is not intended to be used for and is not suitable for identifying smartphone users.
How will the received data be used?
When processing and saving the data we will observe the relevant country's legal requirements for data protection and forwarding of data. G Data takes great care to protect data from unauthorised access.
Evaluation of the data is carried out in the G Data Security Labs and is used exclusively for clarifying research questions relating to IT security. The principal intention is to investigate security risks and develop protection mechanisms. Examples of use include the creation of signatures and block lists, statistical evaluation for publication in specialist articles, or development and improvement of rule sets for protection technologies.
Participation in this initiative is voluntary and refusal to do so has no negative effects on the functioning of your G Data product. Through your participation in the G Data Malware Information Initiative, all G Data customers will in future be better informed about computer-based threats and the smartphones they use will be even better protected.
G Data Software AG, 2012