Do you share or sell my data to third parties?
No. We do not sell personal data or use it for advertising or profiling.
We share only what is necessary to operate the product, under contracts that restrict use to the stated purpose:
-
Service providers: licensing/activation, payment processing, crash/error reporting, email delivery, and secure cloud hosting. They may process limited data (e.g., license ID, app/version info, anonymized device ID, transactional details) solely to provide these services.
-
User-initiated support: if you choose Get help / Let us know, you may send diagnostic logs, sample files, or URLs. These are used only to investigate your request.
Additional points:
For full details, please see our Privacy Policy.
Glossary (A–Z)
Related Articles
How can I delete my data or logs?
You control what’s shared. Quarantined items can be removed in Tools → Quarantine. Diagnostic logs are only sent if you choose Get help / Let us know; you can delete any exported log files on your PC. To request deletion of account-related data, ...
What data does the app send to Gridinsoft?
Only what’s needed to operate and improve the product: Service data (required): update requests, license verification, app/engine version, basic OS info, and an anonymized device identifier. Threat data (optional/when you choose): file hashes, ...
I purchased and activated the license, but the program asks me to buy another key. What should I do?
Don’t buy a new key. Activation data can be lost after system changes (Windows updates, profile cleanup, disk cleaners), security software interference, or network settings. Try these steps: Re-activate with your existing key: Open Gridinsoft ...
Download Gridinsoft Anti-Malware
Gridinsoft Anti-Malware provides comprehensive protection against malware, spyware, adware, and other security threats. This guide walks you through the complete download and installation process, ensuring you get optimal protection for your ...
What happens when my license expires?
You can still open the app and run scans, but protection is limited. Threat database updates stop, real-time modules (e.g., Internet Security, On-Run protection) are disabled, and malware removal is blocked. You can view logs and Quarantine items, ...