We fully understand the importance of privacy, always respect users' personal privacy and data security, and are committed to protecting information security. This Privacy Policy explains how the Product collects, uses, stores, and protects your data. Please read and understand this agreement carefully before using the software.

1. Information We Collect

1. When you upgrade to the Pro version and activate the license, we collect the following information:

  • A hash (MD5) value generated from the motherboard serial number and a random value stored in the registry.
  • Hash (MD5) values of the system computer name and login username.
  • The MAC address and information used to determine whether the software is running in a virtual machine.

2. When the option to "Help improve built-in rules with anonymous data" is enabled, the following information is collected:

  • Process path, process command line, process signature, rule name, and operation target, etc., when a built-in rule triggers a prompt.

3. When you provide feedback on false positives during antivirus scans, the following information about the selected file will be uploaded:

  • File signature, path, and file version information.
  • Feature information of the file in the machine learning antivirus engine (does not include any file content, only the index of matched features).

2. How We Use This Information

The information we collect will be strictly used for the following purposes:

  • 1. Pro version license activation and reclamation.
  • 2. Reducing the false positive rate of built-in rules and improving the user experience of built-in rules.

3. How We Protect Your Information

We attach great importance to information security and have taken reasonable protective measures:

  • 1. We use professional desensitization and encrypted storage technologies to ensure the security of your information.
  • 2. We have established comprehensive security management systems to protect information security. For example, we strictly limit internal personnel's access rights to prevent unauthorized access.
  • 3. After a built-in rule false positive is confirmed and resolved, we will completely delete the reported data and will not retain it permanently.

4. Updates to This Agreement

We may update this agreement from time to time. The updated agreement will be published on our official website and notified to you through the software interface or other means. Your continued use of the software indicates your acceptance of the updated agreement.