Our products will also store a log of the actions they have taken on your device. We may also send automatic updates in order to add, remove, or change product features. For example, we will need to scan files and web page requests in order to ascertain if they are malicious or not.Īs cyber threats are constantly evolving, it is necessary for us to send automatic updates to our software installed on your devices from time to time, in order to maintain the effectiveness of the product. Installation will require ongoing storage space and processing capacity for product operation. In order to use the Sophos Home and Sophos Home Premium products, you will need to install our software onto the devices that you wish to protect and agree to the terms and conditions of use. Sophos may utilize such telemetry data for analytics, and may share analytics based on such telemetry data with the relevant device manufacturers. The prompt may allow Sophos and Cleverbridge to collect and use telemetry data relating to such installation and purchase. Some devices may include a pre-installed option for you to participate in a free trial and/or to purchase the products, in which case a prompt may appear on your device with instructions on installation. Sophos and Cleverbridge (as applicable) may collect and use your name, email address, password, user ID, IP address, and device, for purposes of account creation and billing for the products. Cleverbridge is responsible for any data that it collects from you during the purchase process, and you should refer to the Cleverbridge privacy policy for further information about its privacy practices. Purchase processĪll purchases of Sophos Home and Sophos Home Premium subscriptions are via an independent reseller, Cleverbridge. Sophos Home and Sophos Home Premium are consumer products that provide antivirus, web filtering, and an advanced next-generation endpoint protection platform offering signatureless exploit prevention, predictive machine learning for malware detection, and advanced protection to help stop malicious threats including zero-day, credential theft, and ransomware.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |