Software Policy

Software Policy: Collect or transmit personally identifiable information You must do this in a transparent manner by clearly indicating the specific information to be collected or transmitted.

Financial and other sensitive

  • information should not be processed without encryption.
  • Software and applications may not send spam.
  • Clear the removal process
    It should be easy for users to disable or delete any software or application from the user’s system or device.
  • Users should not be charged for uninstalling programs or applications, and should not be required to perform a lengthy process of unrelated uninstall tasks.
    Users should not be presented with new offers during or after the uninstallation process.
  • If the user is presented with additional options, the option to completely remove the program or application should be the most prominent option.
  • The removal process cannot affect unrelated files or use tricks or scare tactics to deter the removal process. An example of this tactic is a misleading claim about negative effects on a user’s computer or privacy.
  • Programs and applications that affect or change computer settings should be rolled back. If changes are made to the browser, it must be clearly indicated how to undo those changes.
  • Once a program or application is disabled or deleted, it may not leave any remnants or programs behind, and may not remain active or be activated later automatically by itself or by another program or application.
  • FileHorses reserves the right to immediately refuse or blacklist, at its sole discretion, any software or applications appearing on its websites that constitute a violation of this policy, or are deemed harmful to its users, image or interests. This policy is constantly being improved. We rely on your help to detect violations and improve them, so please do not hesitate to contact us.

Disclosure and Clear Conduct

  • At the time of installation, users must be able to clearly understand the main and important functions of the software and the specific effects that the software will have on their computers.
  • The software or application must contain a verified signature obtained from a trusted certification authority.
  • A landing page related to the software or application must clearly identify the owner of the software or application, with a valid physical mailing address and email address clearly visible.
  • Before installing the software or application, the user must have the opportunity to review and accept the relevant Terms of Service (TOS) or End User License Agreement (EULA) and Privacy Policy.
  • The software or application must not be silently installed on the user’s device.
  • Users must be given a meaningful opportunity to review all proposed installation options and system changes when installing software, and must not be misled or misled into agreeing to such changes.
  • Users must get a “Skip All” feature on the first offer page for all ads or offers included in bundled programs, or if the user declines the first offer, they will not receive any additional offers.
  • The name of each bundled application must be clearly visible to the user and clearly disclosed before downloading.
  • Neither the underlying software nor any bundled application may perform ad injection.
  • Software or applications may not engage in deceptive behavior (for example, misleading advertising or scare tactics).
  • Software and Applications may not engage in unexpected behavior, including but not limited to:
  • Adversely affects system performance beyond the user’s reasonable expectations
  • Bypass technical security measures for applications or other content
  • Sniff or modify network traffic unless this is the primary functionality disclosed to the software
  • Take the necessary measures to evade anti-malware testing
  • The user must be clearly notified of software and application updates. If the update affects a major functionality, the user will have to approve it.
  • Programs and applications must follow current browser modification policies.
  • Software and applications that seek to collect or transmit personally identifiable information must do so in a transparent manner by clearly indicating the specific information that will be collected or transmitted.
  • Financial and other sensitivei nformation should not be processed without encryption.
  • Software and applications may not send spam.

Clear Uninstaller Process:

  • It should be easy for users to disable or delete any software or application from the user’s system or device.
  • Users should not be charged for uninstalling programs or applications, and should not be required to perform a lengthy process of unrelated uninstall tasks.
  • Users should not be presented with new offers during or after the uninstallation process.
  • If the user is given additional options, the option to completely remove the program or application should be the most prominent option.
  • The removal process cannot affect unrelated files or use tricks or scare tactics to deter the removal process. An example of this tactic is a misleading claim about negative effects on a user’s computer or privacy.
  • Programs and applications that affect or change computer settings should be rolled back. If changes are made to the browser, it must be clearly indicated how to undo those changes.
  • Once a program or application is disabled or deleted, it may not leave any remnants or programs behind, and may not remain active or be activated later automatically by itself or by another program or application.
  • FileHorses reserves the right to immediately refuse or blacklist, at its sole discretion, any software or applications appearing on its websites that constitute a violation of this policy, or are deemed harmful to its users, image or interests. This policy is constantly being improved. We count on your help to detect violations and improve them, so don’t hesitate to contact us.