This security products, services, and functionality-related data privacy notice is supplemental (“Supplement”) to the Intel Privacy Notice (“Notice”) and the Intel Corporate Privacy Rules (“ICPRs”) and is applicable to Intel’s collection, storage, and use of data related to its security products, services, and products and services containing security functionality (“Security Products, Services, and Functionality”).
We care deeply about your privacy and security and your online safety is a key element of our mission. We appreciate your decision to trust us with helping to protect your digital life from theft, disruption, and unauthorized access.
This Supplement is designed to inform you about how your personal information may be collected, managed, and used by Intel’s Security Products, Services, and Functionality to:
- Help safeguard your devices and protect your data;
- Personalize and manage our relationship with you;
- Investigate, respond, and manage security related incidents and events;
- Improve security related products, services, and functionality; and
- Predict future security threats and vulnerabilities.
We hope this Notice helps you understand how your data is processed, why we need to collect data to provide appropriate security, and our commitment to using the personal data we collect for the purposes discussed in this Notice. By collecting and processing data, we can help to predict threats and better protect you, your devices, and your information. Every time you turn on a connected device, connect to a network or open an electronic file, you are exposed to potentially significant risk from hackers, spammers, malware, spyware, and other forms of unauthorized access to your data and systems. This is why it is important to use security products, services, and functionality such as Intel’s to help keep you and your data safe. To defend against these threats and the thousands of new threats that emerge each day, Intel’s web sites, products, online services, software, apps, tools, and other services and functionality we provide both online and offline (collectively referred to as “Intel Services”) may:
• Analyze data sent to/from your device(s) for risks, threats, vulnerabilities, suspicious activity, and attacks;
• Assess the reputation of a sending/receiving device to determine whether access to data or target device should be allowed or if the transaction should be continued;
• Provide threat prediction to help enhance the protection provided by Intel Services;
• Share data with threat intelligence systems, networks, and organizations to improve our products, services, and overall internet security; and
• Adapt responses to new threats based on intelligence collected from your device and our global network;
1. The Information We Collect
Intel collects some information that is personal (i.e., information that identifies an individual on its own or in combination with other data). Intel also collects non-personal information that does not, on its own, identify an individual person. When non-personal information is combined with other information so that it does identify an individual person, we treat that combination as personal information.
Intel obtains personal information when you or someone acting on your behalf provides it to us. We also collect personal and non-personal information when you obtain or use Intel products or services or when you use a device with Intel products or services installed.
IP Addresses
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer, mobile phone, server) participating in a computer network that uses the Internet Protocol for communication. It is how devices find each other on a network.
While it is possible that IP addresses can be associated with a single individual’s device, they most often are associated with a group of systems, one system shared by many users, or a gateway into a group of systems or devices. For instance, IP addresses included in an email communication are typically associated with the respective email service provider and not with an individual user’s device.
Intel Security Products, Services, and Functionality may use IP addresses to help protect your information, your devices, and your data. For example, we may detect that a system or a group of systems associated with a particular IP address has been compromised and is sending malware or spam to some of our users. Even without identifying who owns the compromised system or who compromised it, we can assign a score to that IP address to reflect the heightened threat it poses. Our Security Products, Services, and Functionality may then be able to divert your traffic away from this IP address or block this IP address from sending malware to your Intel-protected device before your device is a victim of an attack.
The use of IP addresses and other machine data is necessary to keep security protections current, relevant, and effective as cyber threats and attacks evolve over time.
2. Security Products, Services, and Functionality Data Processing
If you install or use one of our products or services, software may operate in the background of your computer system or device environment that is designed to perform specific security and privacy related tasks, which may include:
• SPAM protection;
• Real-time virus and malware scanning and protection;
• Intrusion detection, prevention, and protection;
• Threat prevention and prediction;
• Network defense;
• User authentication;
• Data encryption;
• Mobile device lockdown, locate, and wipe; and
• Back-up and recovery activities.
3. Security Products, Services, and Functionality Updating and Reporting
Our Security Products, Services, and Functionality may also process certain data to provide updates and reports. These update functions may check your system to see whether files relating to the services need to be refreshed, updated, or modernized.
For example, certain products, Services, and functionality may transmit log and bug report files to Intel. These files contain information, including the number of checked, suspicious, infected, or unwanted files or emails, the number of infections, the date and hash values of the detected infections, and the number of false negatives/false positives. The purpose of these reports is to analyze the frequency of particular infections or the prevalence of threats. Intel also uses the information to adapt the product to conform to user preferences based on actual use.
4. Supplement Updates
We may change this Supplement. The “Last Updated” section at the top of this page states when this Supplement was last revised. Any changes to this Supplement will become effective when we post the revised Supplement on the Intel Services. Your use of the Intel Services following these changes means that you accept the revised Supplement.
If any change may materially affect the privacy of your personal information, we will use reasonable efforts to notify you in advance and give you a reasonable period of time to object to any changes.
We encourage you to periodically review this Supplement to stay informed about how we collect, use and share personal information.
5. Contact Us
If you have questions or concerns about Intel’s privacy practices, you can contact us by using the Contact Us form or send a letter to the postal address listed below. Please include your contact information, name of the Intel web site or service, and a detailed description of your request or privacy concern.
Intel Corporation
ATTN: Privacy Office
M/S RNB4-145
2200 Mission College Blvd.
Santa Clara, CA 95054 USA
Last updated: January 22, 2016