![]() send you information about the services, for example to inform you of expiring licenses, new versions and features, digital security in general, related services arrange competitions and conduct customer satisfaction surveys.track the services that you have bought and used so that we can manage your customer relationship and communicate with you.improve the functionality of the services and related websites.maintain, develop, and enhance the services and your customer experience and do troubleshooting and performance measurement.enable the use of parental controls, such as viewing and restricting installed applications.deliver the services to you (including identifying authorized users and managing licenses).The data is not accessible to other third parties and it is not used for any other value-added services. On the publication date of this policy, we are using Google Maps to show the location of your queried device and Google privacy policies apply to such use. When you query your device location using a third-party map service, the provider of the location data utilizes such data based on its own terms, privacy statements, and laws applicable to it. A user can only locate their own device or the devices of their children when using Family Rules, not other registered users’ devices. The location data of past queries is only stored for those queries that are visible in the service. In such cases, the location data is processed for your use only for a limited amount of time, after which we will either delete it or make it anonymous. You can use the service portal to locate your misplaced devices. In cases where we provide you with personal support services, we may need to ask you for additional information. We also exchange some such data as explained below under “Transfers and disclosures”. Operator partner: If you have subscribed to the service via your operator, the data set we collect varies per operator partner, but is limited to the above data. Service portal: To help you in managing your subscriptions and settings and to help us help you better in case of problems, the following data from all of the devices and users in the subscription is visible to those who share the same subscription: user name, device name, profile name, first name, last name. More detailed information can be found from our e-store. Android marketing identifier) service statistics per device other similar non-sensitive device and service data.į‑Secure e-store: In addition to the above name, email address, language, address, country, zip code, Internet Protocol (IP) address, payment type. operating system) of your device unique identifiers (e.g. The service collects a varying set of data depending on where you download or purchase the service.Īpplication stores: number of purchased licenses purchase history for F‑Secure products price and time of purchase order number technical environment (e.g. What do we collect and what is it used for? Customer relationship data More information on such topics as well as on other aspects (data subject rights, contact information, etc.) of the processing of your personal data is also available via the embedded links. Such items are in particular 1) the type of personal and private data that the service collects, 2) what we use it for, 3) our justification, 4) typical disclosures, and 5) for how long we store it. This service-specific policy focuses on the items we believe are the most relevant for you. ![]() the portal provides limited visibility among those who share the same subscription.the focus of data collection is not on you, but on your device and our service and.we analyze and secure, but do not read, share, or sell any of your traffic.we ask for your name, email address, and/or phone number.For example, an F‑Secure Internet Security subscription includes endpoint protection, but not VPN, password management, or breach detection components. The applicable sections of this policy therefore depend on the components included in your subscription. Depending on your subscription, this service can include endpoint protection, Virtual Private Network (VPN), password management, and breach detection components, as well as a management portal to help you better manage your licenses across your devices and those of your family members. ![]() In this policy, F‑Secure Total refers to the security solutions provided by F‑Secure Corporation through the F‑Secure app to protect computers, tablets, and smartphones. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |