Summary
Trend Micro Phish Insight is provided with or automatically collects and transmits the following data, some of which may be considered personal data in certain jurisdictions, as part of using the service. It is necessary to collect this data to provide the fullfunctionality of this service. Therefore, you cannot disable these features however you may elect not to use certain functions to avoid certain data being processed. If you do not want Trend Micro to process this data, you should stop using the service.
Signing up
- When a user (IT Administrators) signs up, they enter the details below in the sign-up form and receive a verification email.
- When the user verifies the email they will have access to the standard level of the product.
Data transmitted to Trend Micro |
|
Feature Configuration Location | The Sign Up page can be accessed from the Phish Insight Homepage or directly on this URL https://cloud.phishinsight.trendmicro.com/auth/sign-up. Click the image to enlarge. |
Creating a campaign - Uploading Recipients
- Customer’s IT administrators can upload the list of recipients of the service in the following ways:
- CSV file
- Active directory integration
- Manual data entry
Data Collected |
|
Console Location | https://cloud.phishinsight.trendmicro.com/user-management/users Click the image to enlarge. |
Campaign interactions
When the employee receives the phishing simulation email they may:
- Click on the link and enter data on our simulated phishing webpages
- Respond to the email if it is a business email compromise simulation.
We will store both the username (or alternative user identifier credentials as identified below) and the reply received from the employee.
Data Transmitted to Trend Micro |
|
Feature Configuration Location | User name or other user identifier is collected from our simulated phishing landing pages Click the image to enlarge. It is also possible to collect the reply data from a BEC Simulation. Reply data is at the discretion of the employee, it may be an automatic out of office email, a facetious response, it may include the employee’s signature block and any other information provided by the employee. Click the image to enlarge. |