Software Policy

Windows Software

Software Policy

FileHorse prides itself on its transparency with its users, its partners and the market in which it operates. In furtherance of this principle, this Software Policy is aimed at ensuring that developers, users, advertisers and the general public are aware of the guidelines applying to software and applications, and their behaviour, available on the FileHorse sites. There are further specific guidelines applying to specific language sites or services of FileHorse.

Basic Principles

  1. The software or application should propose and deliver a clear valuable proposition to users.
  2. FileHorse reserves the right to not make available from its websites, software or applications that FileHorse, in its discretion, considers to be or related to malware, spyware or viruses, nor potential threats to a user´s privacy.
  3. The unintended download of software or applications without user consent (“drive-by downloads”) will not be allowed.

Disclosure and clear behaviour

  1. At the time of installation, users should be able to clearly understand the principal and significant functions of the software and the specific effects the software will have on their computers.
  2. The software or application should have a verified signature obtained from a trusted certificate authority.
  3. The landing page relating to the software or application must clearly identify the owner of the software or application, with a valid physical mailing address and email that’s clearly visible.
  4. Prior to installation of the software or application, the user should have the opportunity to review and accept the relevant Terms of Service (TOS) or End User License Agreement (EULA) and privacy policy.
  5. The software or application should not be installed silently on the user’s device.
  6. Users should be given a meaningful opportunity to review all proposed installation options and system changes when installing software, and they must not be misled or deceived when approving such changes.
  7. Users should be given a “skip all” functionality on the first offer page for all ads or offers included in bundled software or if the user declines the first offer he won't get any additional offers.
  8. The name of each bundled application should be clearly visible to the user and be clearly disclosed prior to download.
  9. Neither the primary software nor any bundled application may perform ad injection.
  10. Software or applications should not engage in deceptive behavior (for example, misleading advertising or scare tactics).
  11. Software and applications should not engage in unexpected behavior, included but not limited to:
    1. Negatively impact system performance beyond reasonable user expectations
    2. Circumventing technical protection measures of other applications or content
    3. Sniffing or altering network traffic, unless it is the disclosed core functionality of the software
    4. Take measures to evade anti malware testing
  12. Software and application updates should be conspicuously notified to the user. If the update affects a main functionality, the user will have to approve it.
  13. Software and applications must follow current browser modification policies.
  14. Software and applications that seek to collect or transmit personally identifiable information, must do so in a transparent way by clearly stating the specific information that will be collected or transmitted.
  15. Financial and other sensitive information should not be processed without encryption.
  16. Software and applications must not send spam.

Clear Uninstallation Process

  1. It should be easy for users to disable or delete any software or application from the user´s system or device.
  2. Users must not be charged for software or application removal, and they must not be required to go through a lengthy process of unrelated uninstall tasks.
  3. Users should not be presented new offers during the uninstall process or after finishing it.
  4. If additional options are presented to the user, the option to completely remove the software or application should be the most prominent one.
  5. Uninstallation cannot impact unrelated files or otherwise utilize tricks or scare tactics to deter uninstallation. An example of such a tactic is a misleading claim about negative effects to the user’s computer or privacy.
  6. Software and applications that affect or change a computer’s settings should be reverted. In case of browser’s modifications it must clearly indicate how the user can undo those changes.
  7. Once the software or application is disabled or deleted, it may not leave any remnants or programs, and may not remain active or be automatically enabled later by itself or another software or application.

FileHorse reserves the right to immediately reject any software or applications, or blacklist software or applications from appearing on its websites, in breach of this policy, or considered harmful to its users, its image or its interests, in its sole discretion. This policy is constantly being refined. We count on your help for detecting breaches of it and improving it, so please do not hesitate to contact us.