Failure diagnostics including crash dumps and system logs (36 months).User interactions with Norton websites and Norton extensions download pages (26 months).Network connection activity (36 months).Application names and versions (deidentified).Executable files identified as potential or known malware (deidentified).Device identifiers including MAC address (while active or 36 months).Device names and/or assigned names (36 months). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |