Flothers – PRODUCTS AND SERVICES PRIVACY POLICY

Introduction
This Privacy Policy describes how Flothers uses the information you provide when you use our products and services, and the choices you can make about our use of the information. We also describe the measures we take to protect the information and how you can contact us about our privacy practices. The Sources of Information
Flothers may obtain information about you from various sources, namely:
products and services; by your signing up for a Flothers products or services; in response to technical support or other communication in order to ensure the required performance of products and services; on our websites; in response to marketing or other communications; through participation in an offer, program or promotion.
Information Provided by Users and How We Use Information
Personal data processing by Flothers is always carried out in a legal and fair manner. Some data are non-personal, according to laws of certain countries. Regardless of the type of data and territory where data was received or processed, we use the highest standards of data protection and apply various legal, organizational, and technical measures in order to protect user data, guarantee safety and confidentiality, as well as ensure users’ rights guaranteed under applicable law. The data depends on the products and services you use, and could include the following:
  • License/ subscription information
It is processed in order to recognize legitimate users. This data is needed to maintain communication between the product and Flothers services – sending and receiving product databases, updates, etc.
  • Product information
Data on the product’s operation and its interaction with the user is also analyzed. For example, how long does threat scanning take? Which features are used more often than others? Answers to these and other questions help developers to improve products, making them faster and easier to use.
  • Device data
Data such as device type, operating system, etc. may be needed so the user doesn’t have to buy a new license for the security product after reinstalling the operating system. This information also helps us to analyze cyberthreats, because it shows how many devices are affected by any specific threat.
  • Threats detected
If a threat (new or known) is found on a device, information about that threat is sent to Flothers. This enables us to analyze threats, their sources, principles of infection, etc., resulting in a higher quality of protection for every user.
  • Information on installed applications
This information helps to create lists of harmless applications and prevents security products from mistakenly identifying such applications as malicious. This data is also used to update and extend program categories for features like Parental Control and Application Startup Control. In addition, this information helps us to offer users security solutions that best match their needs.
  • IP Addresses Connections
IPs can be sent to be checked whether they are malicious. This information also helps to create lists of harmless websites and prevents security products from mistakenly identifying such websites as malicious.
  • Operating System events
New malware can often be identified only by its suspicious behavior. Because of this, the product analyzes data on processes running on the device. This makes it possible to identify early on processes that indicate malicious activity and to prevent any damaging consequences, such as the destruction of user data.
  • Suspicious files and files that could be exploited by intruders
Suspicious files and files that could be exploited by intruders If an (as yet) unknown file, exhibiting suspicious behavior is detected on a device, it can be automatically sent for a more thorough analysis by machine learning-based technologies and, in rare cases, by a malware analyst. The ‘suspicious’ category includes mainly executable files (.exe). For the purpose of reducing the likelihood of false positives, executable and non-executable harmless files or their parts may be sent.
  • User contact data
Email addresses are used for authorization on the Flothers web portals which enables users to manage their protection remotely. Email addresses are used to send security messages to (e.g., containing important alerts) to users of Flothers products. Contact information is provided by users at their own discretion. FLOTHERS WILL ONLY PROCESS PERSONAL DATA FOR PARTICULAR, PRE-DETERMINED PURPOSES THAT ARE LEGITIMATE WITH REGARD TO APPLICABLE LAW, AND THAT ARE RELEVANT TO FLOTHERS’S BUSINESS.
  • To ensure the performance of a contract with users and to ensure the required performance of products and services for customers.
  • To protect the user from known threats to information security.
  • To verify that the license is legal.
  • To update the anti-virus databases.
  • To increase the effectiveness of the protection of devices, networks, and information systems, in particular to provide a faster response to new information and network security threats, to increase the effectiveness of the performance of the software’s protection component, to decrease the probability of false positive.
  • To detect advanced and previously unknown cybersecurity threats and reduce response times to them. More details are available below in the “Threat Intelligence for Protection of Cyber Space” section.
  • To improve user experience and our products and services, including features, functionalities, and interfaces.
  • To provide technical support of products and services for customers and to improve the quality of products and services.
  • To acquire an aggregated overview of products for home users by conducting statistical research and analyses. More details are available below in the “Product Statistical Research” section.
  • To provide users with personalized information and offers from Flothers, including in relation to product features, maintaining security levels, support and other help-related materials, as well as Flothers and third-party products and services, marketing offers, discounts, and promotional materials, based on user interests and preferences.
What we aren’t going to process
Through its products and services, Flothers never process “sensitive” personal data such as religion, political views, sexual preference, or health, or other special categories of personal data. We do not wish to receive any such data and will not request it from you. Information Security: How We Protect Your Privacy Information security is Flothers’s core business. All data and all information provided by you is confidential by default. Flothers will therefore always apply technical and organizational data security measures for the protection of personal data that are adequate and appropriate, taking into account the concrete risks resulting from the processing of personal data as well as up-to-date security standards and procedures. In order to, among other reasons, identify and fulfill the appropriate level of protection, Flothers classifies processing systems with personal data and implements cascading sets of protective measures.
How to Contact Us
If you have any questions or comments about this Privacy Policy, Kaspersky’s privacy practices or if you would like us to update or remove information or preferences you may contact at [email protected]
Scroll to Top