How CylancePROTECT Mobile collects and uses data
CylancePROTECT Mobile
collects and uses dataFor complete information about this product, see the Cylance Endpoint Security docs.
Item | Data collection and use |
---|---|
User information | BlackBerry collects the following information to manage users:
|
Endpoint data | BlackBerry collects the following endpoint data to detect suspicious activity, privilege escalations, or security misconfigurations:
|
Android mobile app data | BlackBerry collects the following information to detect malicious or suspicious applications on Android devices:
|
Scanning for malicious apps on Android devices |
|
iOS mobile app data | BlackBerry collects the following information to detect malicious or suspicious applications on iOS devices:
|
Scanning URLs in SMS text messages for iOS |
|
Scanning URLs in SMS text messages for Android |
|
Unsafe network and insecure Wi-Fi checks | On iOS and Android devices, the CylancePROTECT Mobile app will periodically try to connect to the CylancePROTECT Mobile cloud services. If the connection is not successful, CylancePROTECT Mobile determines that the network is not safe.On Android devices, the CylancePROTECT Mobile app periodically checks the properties of the current Wi-Fi access point to determine if it is secure (you can configure which Wi-Fi access algorithms your organization considers secure and insecure). When the CylancePROTECT Mobile app detects an unsafe network or insecure Wi-Fi access point, it is reported in the app and in the management console. |
Data storage |
|
Data retention
Personal data processed | Data retention period |
---|---|
User information | Data is removed at the end of the contract. Administrators can remove data using the management console. |
Endpoint data | Data is removed 60 days after the end of the contract. |
Mobile app data: Android & iOS | Data is removed 60 days after the end of the contract. |
SMS message data: Android & iOS | Hyperlinks contained within messages are de-identified and retained indefinitely. |
Potentially malicious mobile applications | Data is de-identified and retained indefinitely. |