Last Updated: Oct 12, 2015
Caution: Legalese ahead.
We may collect your information: (1) when you interact with certain portions of our website, such as our forums, blogs, and support center ("Website Collection"); (2) when you license and use our software ("Software Collection"); and (3) when you communicate with us by email, chat, or otherwise ("Dialogue Collection").
We collect your information when expected and in expected places on our website.
Some information you provide to us directly. For example, when you post comments, ask questions in our blog, or fill out a user profile. Also, we may collect and store all posted forum and blog information and user profiles and make them available for public viewing.
We collect your information when you give it to us or post in forums or blogs.
We collect information through "cookies," which are text files saved by your browser when you log into our software or services. We may use both session cookies and persistent cookies to identify that you have logged in, to tell us how and when you interact with our software or services, and to check aggregate usage and web traffic. Unlike persistent cookies, session cookies are deleted when you log off and close your browser. If you prefer, you can always change your browser options to stop accepting cookies or to prompt you before accepting cookies. However, if you do not accept cookies you may not be able to access the entirety of our software and services.
We also collect your information using "cookies" when you visit our website. You can prevent this method of information collection if you like.
If you create an account with us through a third party like Facebook or Twitter ("SNS Accounts") you may have to provide us with your user name or user ID so that we can authenticate your identity.
We collect your information when you create an account.
Our software collects information about your use of the software as well as transfers of information between your computers that run the software and our servers. This is necessary to ensure our software is operating correctly and to confirm the status of your license of our software.
We collect information about your Malwarebytes® license.
We may collect both personally identifiable information ("PII") and non-personally identifiable information ("Non-PII"). PII is information that is either expressly provided by you, such as your name, or information that can be used either alone or in combination with other information to personally identify you, such as your email address, phone number, and user name. Non-PII is all information that is not PII or is information that was PII but which we modify and/or aggregate with other data in order to make it Non-PII.
There are two types of information we collect: personal and non-personal.
Other than with respect to the exceptions below, we do not share PII with third parties. We use PII solely for shaping our external communication and messaging efforts.
With few exceptions, we don't share your personal information with a third party.
Exception #1: We share your information with Google for analytical purposes.
We may engage third-party service providers to administer and provide our services. We may provide PII to such third parties only for the purpose of performing services on our behalf. We require such third parties to agree not to disclose your PII or use your PII for any other purpose.
Exception #2: If we give your information to a partner company, they won't use your information outside of our business relationship.
Information that we collect from Users, including PII, is considered a business asset. Accordingly, if we go out of business or enter bankruptcy, or if we are acquired, e.g., as a result of a transaction such as a merger, acquisition, or asset sale, your PII may be disclosed or transferred to the third-party acquirer in connection with the transaction.
Exception #3: If someone buys us or we go bankrupt, your information may be transferred to someone else.
We may disclose PII to government agencies, law enforcement officials, and private parties as we, in our sole discretion, believe necessary: (1) to satisfy or comply with any applicable law, regulation or legal process; (2) to respond to lawful requests, including subpoenas, warrants or court orders; (3) to protect our property, rights and safety and the rights, property and safety of third parties or the public in general; and (4) to prevent or stop activity we consider to be illegal or unethical.
Exception #4: If the government asks for your information, we may comply.
We may share your PII with third-party sites or platforms, such as social networking sites, but only if you have expressly requested that we do so. Similarly, by posting profile, content, or other information, including PII to a forum or blog, you indicate your consent to its public use.
Exception #5: If you post your information in one of our forums or on the blog, well, that's public.
We take commercially reasonable measures to protect PII from unauthorized access, use, and disclosure. However, no method of transmitting information over the Internet or storing information is completely secure. Accordingly, we can't guarantee the absolute security of your PII.
You may access and modify the PII associated with your use of our services at any time by contacting us at firstname.lastname@example.org. If you want us to delete your PII, your forum account, or your support account, please contact us at email@example.com with your request. We will delete your information as soon as possible; however, some information may remain in archived/backup copies for our records or as otherwise required by law.
We'll delete or modify your information if you ask.
Your PII may be transferred to, and maintained on, computers located outside of your state, province, country, or other governmental jurisdiction where the privacy laws may not be as protective as those in your jurisdiction. If you are located outside the United States and choose to provide your PII to us, we may transfer your PII to the United States and process it there.
If you're not in the U.S., we may transfer your information to the U.S.
Our services are not directed to children under eighteen, and we do not knowingly collect PII from children under thirteen. If we learn that we have collected PII of a child under thirteen we will delete such information from our files as soon as possible, provided, however, that some information may remain in archived/backup copies for our records or as otherwise required by law.
We don't knowingly collect information on children, and delete it if we inadvertently do collect it.
We maintain and use the information we receive via Software Collection in the manner described below:
Each API communication coming from any of our client software identifies itself with a string that includes information about the software itself:
So we can manage your Malwarebytes product and ensure that it is up to date.
When we collect data from our client systems, we do not retain the IP address from which the request originates. However, we do use it to gather geographic information on the system calling in:
So our malware intelligence team can track malware outbreaks and patterns.
We collect client data from each program that describe the client environment (i.e., our software and the computer system it is running on.) For this data we identify each system with a unique identifier that is created at install time, so it is possible to track changes to an individual system over time. In this, we collect:
So we can gather performance data around our products and how they operate in relation to different hardware and software environments.
We collect data from products which have a paid or licensed mode reflecting the applicable license. These data also use a unique identifier, but a different one from the client data; as such, we can track license changes over time but cannot correlate a license key to a client data report. In this, we collect:
So we can remind you when your Malwarebytes subscription is about to expire or to determine the correct license type.
We collect data about the malware that is removed by our products. This information does not use a system identifier; it is not possible to correlate two different malware removals with each other. We collect:
So our malware intelligence team can track malware outbreaks and the efficacy of Malwarebytes products.
When a client attempts to start a trial, we track it remotely in order to validate that the trial is allowed. For this information we use another unique system identifier. We collect:
So we can update your Malwarebytes products accurately and when they need it.
In all Malwarebytes Anti-Exploit products (beginning with the 1.4 release) we collect a complex data object for any exploit process which is blocked by the software. In this data we collect:
So our malware intelligence team can track exploit outbreaks and deepen its understanding of new exploit techniques.