The program goals
- To reduce the risk of a Partner's software being wrongly classified as malicious - known as false positive detections;
- To ensure a positive experience for users when they download and use Partner's and Kaspersky Lab software;
- To significantly reduce the load placed on the support services of both the Partner and Kaspersky Lab.
- The participation in the program is free-of-charge;
- Verified compatibility with the actual configurations of antivirus protection offered by Kaspersky Lab; Reduced risk of false alarms generated by antivirus protection in the event of non-standard behaviour of the Partner’s software;
- Independent 3rd party SW expertise provided by Kaspersky Lab – a leader in the area of anti-virus defence and information security.
Participation requirements for Whitelist program
- Company must have a working web site.
- Company’s web site must contain company’s legal address.
- Company’s software and its web site must not promote religious, political, or pseudo-scientific ideas.
- Company’s software must not replicate third-party products interface or standard operating system messages. Company’s software must not display fake messages allegedly provided by a third party.
- Every web site and software control icon and its title must unambiguously signify the associated action.
- Company’s software must not advertise or promote third-party software or web resources, unless they are used as a launch platform (like Steam or Origin).
- Software code or configuration files (including downloads) must not contain functions that make the software call malicious resources or resources hosting Potentially Unwanted Programs (PuP).
- Digital signature (if Company has one) must not be used by other vendors and/or compromised (there must be no registered cases of the signature having been used by malware or PuP).
- Remote administration program will not be added, if:
- The software is known to have been used by hackers. For example, the program was used as a Backdoor component.
- Program can be used to remotely access a computer without notifying the user.