We process personal data that is necessary to administer and provide cybersecurity products and services in accordance with our customer agreements – including telemetry data from sensors used to detect cybersecurity threats and vulnerabilities. In the vast majority of cases, the data we process is anonymized and/or not directly identifiable. But in some cases, personal data associated with potentially malicious activity may be collected and quarantined for further analysis.
Personal data we may collect includes information about our customer end users’ computers, devices, applications, and networks, including internet protocol (IP) address, cookie identifiers, mobile carrier, Bluetooth device IDs, mobile device ID, mobile advertising identifiers, MAC address, IMEI, Advertiser IDs, and other device identifiers that are automatically assigned to computers or devices of customer end users. We also collect customer contact information (e.g., username, user email, phone number) to administer our contracts.
For more information about our personal data processing practices, see our Customer Data Processing Agreement, Data Transfer Addendum, Technical and Organizational Measures, List of Subprocessors, Privacy Notice, and Privacy Data Sheets.
We process personal data for purposes of monitoring, detecting, and responding to cybersecurity incidents and protecting against fraudulent or illegal activity, in accordance with our customers’ written instructions.
For more information about our purposes of processing, see our Customer Data Processing Agreement, Data Transfer Addendum, Privacy Notice, and Privacy Data Sheets.
We use a variety of data transfer mechanisms to comply with personal data transfer restrictions worldwide. For example, to comply with EU requirements under GDPR, we generally use EU Standard Contractual Clauses as approved by the European Commission (which are incorporated into our Data Transfer Addendum), and/or other legal mechanisms recognized by EU data protection laws.
For more information about our data transfer mechanisms, see our Data Transfer Addendum and other resources regarding Transfer Impact Assessment.
Trellix retains personal data in connection with the use of our products and services only as long as necessary to fulfill the purpose(s) for which it was collected, which varies from product to product, and depends on customer configuration. We further retain data as necessary for purposes of satisfying legal, accounting, reporting and contractual requirements, resolving disputes, establishing legal defenses, conducting audits, pursuing legitimate business purposes, enforcing our agreements, and complying with applicable law.
For more information about retention and deletion of customer data for specific Trellix products and services, see our Privacy Data Sheets.