Collected Files. The Software may automatically submit to Comodo any files or programs, including information on the actions taken by such files, for purposes of phishing detection and threat management. The collected files and programs could contain personally identifiable information that has been obtained by any of the identified pending/unrecognized file without your permission. Files of this type are being collected by Comodo only for the purpose of improving the ability of Comodo’s products to detect malicious behavior. Comodo will not correlate these files with any personally identifiable information.
Appears in 2 contracts
Sources: End User License Agreement, End User License Agreement