Symantec 10514879 - Norton Confidential User Manual page 4

User guide
Hide thumbs Also See for 10514879 - Norton Confidential:
Table of Contents

Advertisement

E. use the Software in accordance with any
additional permitted uses set forth below.
You may not:
A. sublicense, rent or lease any portion of the
Software;
B. reverse engineer, decompile, disassemble,
modify, translate, make any attempt to discover
the source code of the Software or create
derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider or
service bureau arrangement, unless you are
using the Software as part of a service provided
by a Symantec authorized service provider; or
D. use the Software in any manner that is not
permitted pursuant to this license.
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as such features are
made available by Symantec in its discretion
during Your Service Period. Symantec may, at
its discretion, add, modify or remove features
from the Software at any time with or without
notice to You.
B. Certain Software utilize content that is
updated from time to time, including but not
limited to the following Software: antivirus and
crimeware software utilize updated virus
definitions; antispam software utilize updated
antispam rules; content filtering and
antiphishing software utilize updated URL lists;
some firewall software utilize updated firewall
rules; vulnerability assessment products utilize
updated vulnerability data and web site
authentication software utilize updated lists of
authenticated web pages; these updates are
collectively referred to as Content Updates" (or
alternatively referred to as Protection Updates"
or Security Updates" at times). You shall have
the right to receive Content Updates for the
Software during Your Service Period.
3. Product Installation; Required
Activation:
A. During the installation process, the Software
may uninstall or disable other security products,
or features thereof, if such products or features
are incompatible with the Software or for
purposes of improving the overall functionality
of the Software.
B. There may be technological measures in this
Software that are designed to prevent
unlicensed or illegal use of the Software. You
agree that Symantec may use these measures
to protect Symantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install and
uninstall the Software on a computer to not more
than a finite number of times for a finite number
of computers. This License Agreement and the
Software containing enforcement technology
require activation as further set forth in the
Documentation. The Software will only operate
for a finite period of time prior to Software
activation by You. During activation, You may
be required to provide Your unique product key
accompanying the Software and computer
configuration in the form of an alphanumeric
code over the Internet to verify the authenticity
of the Software. If You do not complete the
activation within the finite period of time set
forth in the Documentation, or as prompted by
the Software, the Software will cease to function
until activation is complete; at which time the
Software functionality will be restored. In the
event that You are not able to activate the
Software over the Internet, or through any other
method specified during the activation process,
You may contact Symantec Customer Support
using the information provided by Symantec
during activation, or as set forth below.
4. Privacy; Data Protection:
From time to time, the Software will collect
certain information from the computer on which
it is installed, which may include:
·Information regarding installation of the
Software. This information indicates to
Symantec whether installation of the Software
was successfully completed and is collected by
Symantec for the purpose of evaluating and
improving Symantec's product installation
success rate. This information will not be
correlated with any personally identifiable
information.
·Information on potential security risks as well
as URLs of websites visited that the Software
deems potentially fraudulent. This information
is collected by Symantec for the purpose of
evaluating and improving the ability of
Symantec's products to detect malicious
behavior, potentially fraudulent websites and
other Internet security risks. This information

Advertisement

Table of Contents
loading

This manual is also suitable for:

Norton confidential

Table of Contents