AdwareSpywareDetective Header Image
Detect & Remove Adware Spyware Trojan Dialers Worms & Other PC Threats

Redmag Media is committed to the privacy of personal information provided to us when using any of our Internet services. This Privacy Policy describes how we treat information we receive when you transmit data to Redmag Media Internet properties.

Web Information
When you purchase Redmag Media software, we may collect personal identifiable information including your name, address, email address, etc. for the purpose of recording and fulfilling the transaction. When we use a payment processing merchant we ensure that the same strict privacy criterion is in place. We do not (knowingly) collect personal information from persons under the age of eighteen.

We define a cookie as any string of data and information that is automatically stored on your computer upon access to our services. Redmag Media employs cookies to assign non-unique, non-identifiable strings to machines that access our services. This information enables us to deliver faster service capabilities to our customers or to our affiliates, prevent denial of service attacks on our systems, detect and prevent fraudulent transactions, and assist with awarding proper sales credit to our partners. All Redmag Media cookies are 1) of limited duration, 2) less than 5KB in length, 3) only visible to Redmag Media, 4) devoid of any personally identifiable information and 5) non-unique. Our Cookies are mainly maintained to track our affiliates to ensure proper payments for their sales and tracking activities relating to their affiliate relationship with us.

The personally identifiable information we collect about you is stored in limited access servers. We maintain such safeguards to protect security of servers and your personally identifiable information. We retain personally identifiable information only as long as necessary to complete a purchase, thwart fraud, provide customer service, or maintain your account with us.

How Information Is Used When Collected
We may use information in the following ways:
- For purposes you specifically provided the information such as to enable us to process, validate and verify purchases.
- To register you as a customer and open and maintain a support account for you.
- To send email notifications about new, existing, enhanced products or services. Information on special offers, or to contact you to reconfirm or verify accuracy of information provided.
- To obtain your feedback to help enhance existing features or provide additional products and services.
We may disclose and use personally identifiable information in special circumstances where it is necessary to enforce our service agreements or terms of use (for example protect our intellectual property rights). We may also disclose or use your personal information when we, in good faith, believe that the law may require us to do so.

Your copy of AdwareSpywareDetective, once installed, will check in with our server occasionally to receive threat database update. The only value transmitted to the server is the current version of the software. You can control the way updates are performed through Settings dialog. By default updates are performed after confirmed notification of engine update available.

Policy Modifications
We may change this Privacy Policy from time to time. However, any changes will be posted promptly here, so please check back periodically.

Latest Database Update
Download Free Scan
Uninstall Free Download

Virus Type Definiton

Spyware Definition Adware
Spyware Definition Spyware
Spyware Definition Trojan
Spyware Definition Tracking Cookie
Spyware Definition Key Logger
Spyware Definition Password Capture
Spyware Definition Dialer
Spyware Definition Downloader
Spyware Definition Backdoor
Spyware Definition Exploit
Spyware Definition Mail Bomber
Spyware Definition Hijacker
Spyware Definition Password Cracker
Spyware Definition Data Miner
Spyware Definition Browser Helper Object
Spyware Definition DoS
Spyware Definition Error Hijacker
Spyware Definition RAT
Spyware Definition Toolbar
Spyware Definition Surveillance
Spyware Definition Cracking Tool
Spyware Definition Annoyance
Spyware Definition P2P
Spyware Definition Bundleware
Spyware Definition AOL Pest
Spyware Definition Proxy
Spyware Definition Search Hijacker
Spyware Definition Commercial RAT
Spyware Definition DirTest
Spyware Definition Misc Tool
Spyware Definition Dropper
Spyware Definition PSW
Spyware Definition Rootkit
Spyware Definition IE Hijacker EULA | Privacy Policy | Contact Us | FAQ | Sitemap