Symantec, theSymantec Logo,Norton, SONAR,LiveUpdate, Norton
AntiSpam, NortonAntiVirus, NortonInternet Security, Norton 360,
and NortonSystemWorks aretrademarks orregistered trademarks
of Symantec Corporation or its affiliates in the U.S. and other
countries. Windows is a trademark of Microsoft Corporation.
Portions of this product Copyright [1996-2008] Glyph & Cog, LLC.
Other names may be trademarks of their respective owners.
The productdescribed inthis document isdistributed under licenses
restricting itsuse, copying, distribution,and decompilation/reverse
engineering. No part of this document may be reproduced in any
form byany meanswithout priorwritten authorizationof Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED"AS IS" AND ALLEXPRESS
OR IMPLIED CONDITIONS, REPRESENTATIONS AND
WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULARPURPOSE OR
NON-INFRINGEMENT, AREDISCLAIMED, EXCEPT TOTHE EXTENT
THAT SUCH DISCLAIMERS ARE HELD TO BELEGALLY INVALID.
SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR
INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS
DOCUMENTATION. THE INFORMATION CONTAINED IN THIS
DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
Symantec Corporation
350 Ellis Street,
Mountain View, CA 94043
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Norton License Agreement
Norton™ Internet Security
IMPORTANT: PLEASE READ THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT (“LICENSE AGREEMENT”)
CAREFULLY BEFORE USING THE
SOFTWARE (AS DEFINED BELOW).
SYMANTEC CORPORATION, IF YOU ARE
LOCATED IN THE AMERICAS; OR
SYMANTEC ASIA PACIFICPTE LTD, IF YOU
ARE LOCATED IN THE ASIA PACIFIC RIM
OR JAPAN;OR SYMANTEC LIMITED,IF YOU
ARE LOCATED IN EUROPE, THE MIDDLE
EAST OR AFRICA (“SYMANTEC”) IS
WILLING TO LICENSE THE SOFTWARE TO
YOU AS THEINDIVIDUAL, THE COMPANY,
OR THE LEGAL ENTITY THAT WILL BE
UTILIZING THE SOFTWARE(REFERENCED
BELOW AS “YOU” OR “YOUR”) ONLY ON
THE CONDITION THAT YOU ACCEPT ALL
OF THE TERMS OF THIS LICENSE
AGREEMENT. THIS IS A LEGAL AND
ENFORCEABLE CONTRACTBETWEEN YOU
AND SYMANTEC. BY OPENING THIS
PACKAGE, BREAKINGTHE SEAL, CLICKING
THE “I AGREE” OR “YES” BUTTON OR
OTHERWISE INDICATING ASSENT
ELECTRONICALLY, OR LOADING THE
SOFTWARE, YOU AGREE TO THE TERMS
AND CONDITIONS OF THIS LICENSE
AGREEMENT. IF YOU DO NOT AGREE TO
THESE TERMS AND CONDITIONS, CLICK
THE “CANCEL” OR “NO” OR “CLOSE
WINDOW” BUTTON OR OTHERWISE
INDICATE REFUSAL, MAKE NO FURTHER
USE OF THE SOFTWARE, AND CONTACT
YOUR VENDOROR SYMANTECCUSTOMER
SERVICE, USING THE CONTACT DETAILS
IN SECTION 10 OF THIS LICENSE
AGREEMENT, FORINFORMATION ON HOW
TO OBTAINA REFUND OFTHE MONEY YOU
PAID FORTHE SOFTWARE (LESSSHIPPING,
HANDLING, AND ANY APPLICABLE TAXES
EXCEPT IN CERTAIN STATES AND
COUNTRIES WHERESHIPPING, HANDLING,
AND TAXES ARE REFUNDABLE) AT ANY
TIME DURINGTHE SIXTY (60)DAY PERIOD
FOLLOWING THE DATE OF PURCHASE.
1. License:
The software (including any accompanying
features and services) and documentation
(including any product packaging) (the
“Documentation”), that accompanies this
License Agreement (collectively the
“Software”) is the property of Symantec or
its licensors, and is protected by copyright
law. Although Symantec continues to own
the Software, after Your acceptance of this
License Agreement You will have certain
rights touse the Software duringthe Service
Period. The “Service Period” shall begin on
the date of Your initial installation of the
Software on a computer, mobile or mobile
computing device (a “Device”), regardless of
the number ofcopies that You are permitted
to use in accordance with Section 1.A of this
License Agreement, and shall last for the
period oftime setforth in theDocumentation
or theapplicable transactiondocumentation
from the authorized distributor or reseller
from which You obtained the Software. The
Software may automatically deactivate and
become non-operational at the end of the
Service Period, and You will not be entitled
to receive any feature or content updates to
the Software unless the Service Period is
renewed. Subscriptions for renewals of the
Service Periodwill be availablein accordance
with Symantec’s support policy posted at
This License Agreement governs any
releases, revisions,updates orenhancements
to the Software that Symantec may make
available to You. Except as may be modified
by the Documentation, and subject to
Symantec’s right to terminate for Your
breach pursuant to Section 9, Your rights
and obligations under this License
Agreement with respect to the use of this
Software are as follows.
During the Service Period, You
may:
A.use one copy of the Software on a single
Device. If a greater number of copies and/or
number of Devices is specified within the
Documentation orthe applicabletransaction
documentation from the authorized
distributor or reseller from which You
obtained the Software, You may use the
Software in accordance with such
specifications;
B. makeone copy of the Softwarefor back-up
or archival purposes, or copy the Software
onto the hard diskof Your Device and retain
the originalfor back-up orarchival purposes;
C. use the Software on a network, provided
that Youhave a licensedcopy of the Software
for each Devicethat can accessthe Software
over that network;
D. permanently transferall of Yourrights in
the Software granted under this License
Agreement to another person or entity,
provided that You retain no copies of the
Software and the transferee agrees to the
terms of this License Agreement. Partial
transfer of Your rights under this License
Agreement shall not be permitted. For
example, if the applicable documentation
grants You the right to use multiple copies
of the Software, only atransfer of the rights
to use all such copies of the Software would
be valid; and
E. use the Software in accordance with any
additional permitted uses which may be set
forth below.
You may not, nor may you permit
any other person to:
A. sublicense,rent or leaseany portion of the
Software;
B. reverseengineer, decompile, disassemble,
modify, translate, make any attempt to
discover the source code of the Software or
create derivative works from the Software;
C. use the Software as part of a facility
management, timesharing, service provider
or service bureau arrangement; or
D. usethe Software inany manner that isnot
permitted pursuant to this License
Agreement.
2. Software Feature and Content
Updates:
A. You shall have the right to receive new
features to the Software as Symantec, in its
sole discretion,makes suchfeatures available
with the Software during Your Service
Period. Symantec continually strives to
improve theusability and performanceof its
products and services. In order to optimize
the SoftwareSymantec may, at its discretion
and without notice, add, modify or remove
features from the Software at any time.
B. Certain Software uses content that is
updated fromtime totime, includingbut not
limited to the following Software: antivirus
and crimeware software use updated virus
definitions; antispyware software uses
updated spyware definitions; antispam
software uses updated antispam rules;
content filtering and antiphishing software
use updatedURL lists;some firewall software
use updated firewall rules; vulnerability
assessment products use updated
vulnerability data and web site
authentication software uses updated lists
of authenticated web pages; these updates
are collectively referred to as “Content
Updates” (or alternatively referred to as
“Protection Updates” or “Security Updates”
at times). You shall have theright to receive
Content Updates for the Software during
Your Service Period.
3. Product Installation; Required
Activation:
A. During the installation process, the
Software may uninstall or disable other
security products,or features thereof,if such
products or features are incompatible with
the Software or for purposes of improving
the overall functionality of the Software.
B. There may be technological measures in
this Software that are designed to prevent
unlicensed orillegal use ofthe Software. You
agree thatSymantec mayuse thesemeasures
to protectSymantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install
and uninstallthe Software ona Device tonot
more than a finite number of times for a
finite number of Devices. This License
Agreement and the Software containing
enforcement technology may require
activation as further set forth in the
Documentation. If so, the Softwarewill only
operate for a finite period of time prior to
Software activation by You. During
activation, You may be required to provide
Your unique activation code accompanying
the Softwareand Device configuration in the
form of an alphanumeric code over the
Internet to verify the authenticity of the
Software. If You do not complete the
activation within the finite periodof time set
forth in the Documentation, or as prompted
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
specified during the activation process, You
may contact Symantec Customer Support
using theinformation providedby Symantec
during activation, or as set forth below.
4. Technical Support:
Certain technical support features may be
offered from within the Software andwhich
may include live chat with a technical
support agent and/or assistance from a
technical supportagent viaremote computer
access (any such technical support offered
from within the Software shall be referred
to in this License Agreement as the
“Technical Support”). If such features are
offered and You choose to access such
Technical Support the following terms shall
apply. Any such Technical Support shall be
provided in Symantec’s sole discretion
without any guarantee or warranty of any
kind. It is solely Your responsibility to
complete a backup of all Your existing data,
software and programsbefore receiving any
Technical Support.In thecourse of providing
the Technical Support, Symantec may
determine that the technical issue is beyond
the scopeof theTechnical Support.Symantec
reserves the right to refuse, suspend or
terminate any of the Technical Support in
its sole discretion.
5. Sixty (60) Day Money Back
Guarantee:
If You are the original licensee of this copy
of the Software and are not completely
satisfied with it for any reason, please make
no further use of the Software and contact
Symantec Customer Service, using the
contact details set out in Section 10 of this
License Agreement, for a refund of the
money You paid for the Software (less
shipping, handling,and any applicabletaxes
except in certain statesand countries where
shipping, handlingand taxes are refundable)
at any time during the sixty (60) day period
following the date of purchase.
6. Limited Warranty:
Symantec warrants that any media
manufactured by Symantec on which the
Software is distributed will be free from
defects for a period of sixty (60) days from
the date of delivery of the Software to You.
Your sole remedy in the event of a breach of
this warranty will be that Symantec will, at
its option, replace any defective media
returned to Symantec within the warranty
period or refund the money You paid for the
Software. Symantec does not warrant that
the Softwarewill meet Yourrequirements or
that operation of the Software will be
uninterrupted or that the Software will be
error-free.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW, THE ABOVE
WARRANTY ISEXCLUSIVE AND INLIEU OF
ALL OTHER WARRANTIES, WHETHER
EXPRESS OR IMPLIED, INCLUDING THE
IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, AND
NON-INFRINGEMENT OF INTELLECTUAL
PROPERTY RIGHTS. THIS WARRANTY
GIVES YOU SPECIFIC LEGAL RIGHTS. YOU
MAY HAVE OTHER RIGHTS, WHICH VARY
FROM STATETO STATE AND COUNTRYTO
COUNTRY.
7. Disclaimer of Damages:
SOME STATES AND COUNTRIES DO NOT
ALLOW THE LIMITATION OR EXCLUSION
OF LIABILITY FOR INCIDENTAL OR
CONSEQUENTIAL DAMAGES, SO THE
BELOW LIMITATION OR EXCLUSION MAY
NOT APPLY TO YOU.
TO THE MAXIMUM EXTENT PERMITTED
BY APPLICABLE LAW AND REGARDLESS
OF WHETHER ANY REMEDY SET FORTH
HEREIN FAILSOF ITS ESSENTIALPURPOSE,
IN NO EVENT WILL SYMANTEC OR ITS
LICENSORS BE LIABLE TO YOU FOR ANY
SPECIAL, CONSEQUENTIAL, INDIRECT,OR
SIMILAR DAMAGES,INCLUDING ANY LOST
PROFITS OR LOST DATA ARISING OUT OF
THE USE OR INABILITY TO USE THE
SOFTWARE EVENIF SYMANTECHAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES.
IN NO CASE SHALL SYMANTEC’S OR ITS
LICENSORS’ LIABILITY EXCEED THE
PURCHASE PRICE WHICH YOU PAID FOR
THE APPLICABLE SERVICE PERIOD. The
disclaimers and limitations set forth above
will apply regardless of whether You accept
the Software.
8. U.S. Government Restricted
Rights:
For U.S. Government procurements, the
Software is deemed to be commercial
computer software asdefined in FAR12.212
and subject to restricted rightsas defined in
FAR Section 52.227-19 "Commercial
Computer Software - Restricted Rights" and
DFARS 227.7202, “Rights in Commercial
Computer Softwareor Commercial Computer
Software Documentation”,as applicable,and
any successor regulations. Any use,
modification, reproduction release,
performance, display or disclosure of the
Software by the U.S. Government shall be
solely in accordance with the terms of this
License Agreement.
9. Export Regulation:
You acknowledge that the Software and
related technical data and services
(collectively "Controlled Technology") may
be subject to the import and export laws of
the UnitedStates, specifically theU.S. Export
Administration Regulations (EAR), and the
laws of any country where Controlled
Technology is imported or re-exported. You
agree to comply with all relevant laws and
will not export any Controlled Technology
in contravention to U.S. law nor to any
prohibited country, entity, or person for
which an export license or other
governmental approval is required. All
Symantec product is prohibited for export
or re-exportto Cuba, NorthKorea, Iran, Syria
and Sudan and to any country subject to
relevant trade sanctions. USE OR
FACILITATION OF SYMANTEC PRODUCT
IN CONNECTION WITH ANY ACTIVITY
INCLUDING, BUT NOT LIMITED TO, THE
DESIGN, DEVELOPMENT, FABRICATION,
TRAINING, OR TESTING OF CHEMICAL,
BIOLOGICAL, OR NUCLEAR MATERIALS,
OR MISSILES,DRONES, OR SPACE LAUNCH
VEHICLES CAPABLE OF DELIVERING
WEAPONS OF MASS DESTRUCTION IS
PROHIBITED, IN ACCORDANCE WITH U.S.
LAW.
10. General:
This License Agreement will begoverned by
the laws of the State of California, United
States of America. This License Agreement
is the entire agreement between You and
Symantec relating to the Software and: (i)
supersedes allprior orcontemporaneous oral
or written communications, proposals, and
representations with respect to its subject
matter; and (ii) prevails overany conflicting
or additional terms of any quote, order,
acknowledgment, orsimilar communications
between the parties. Notwithstanding the
foregoing, nothingin thisLicense Agreement
will diminishany rightsYou may haveunder
existing consumer protection legislation or
other applicable laws in Your jurisdiction
that may not be waived by contract. This
License Agreement shall terminate upon
Your breach of any term contained in this
License Agreement and You shall cease use
of and destroy all copies of theSoftware and
Documentation. The disclaimers of
warranties and damages and limitations on
liability shall survive termination. This
License Agreement may onlybe modified by
the Documentationor bya writtendocument
that has been signed by both You and
Symantec. Should You have any questions
concerning thisLicense Agreement,or if You
desire to contact Symantec for any reason,
please write to Symantec Customer Service,
555 International Way, Springfield, OR
97477, U.S.A. or visit the Support page at t
www.symantec.com.
ADDITIONAL TERMS AND
CONDITIONS
Your use of the Software is subject to the
terms and conditions below in addition to
those stated above.
11. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the Device on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website isattempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of delivering the
functionalities of the software, and also for
evaluating and improving the ability of
Symantec’s products to detect malicious
behavior, potentiallyfraudulent websitesand
other Internet security risks. URLs of
websites visited as well as search keywords
and search results only if the Norton Safe
Web feature is enabled. This information is
collected by Symantec for the purpose of
providing protection and of evaluating and
advising Youregarding potentialthreats and
risks thatmay be associatedwith a particular
Web site before You view it.
Executable files and files that contain
executable content that are identified as
potential malware,including informationon
the actions taken by such files at the time of
installation. These files are submitted to
Symantec using the Software’s automatic
submission function.The collectedfiles could
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
are being collectedby Symantec onlyfor the
purpose of improving the ability of
Symantec’s products to detect malicious
behavior. Such automatic submission
function maybe deactivatedafter installation
by following the instructions in the
Documentation for applicable products.
The name given to the Device during the
initial setup of such Device. If collected, the
name willbe usedby Symantec as an account
name for the Device under which You may
elect to receive additional services and/or
under which You may use certain features
of the Software. You may change such
account name at any time after installation
of the Software (recommended).
Status information regarding installation
and operation of the Software. This
information indicates to Symantec whether
installation ofthe Software wassuccessfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
file or folderencountered by theSoftware at
the time of installation or error. The status
information iscollected by Symantec for the
purpose of evaluating and improving
Symantec’s product performance and
installation successrate. Symantec mayalso
use this information to optimize its
web-pages.
Information contained in email messages
that you send through the Software to
Symantec toreport as spamor as incorrectly
identified as spam. These email messages
may contain personally identifiable
information and will be sent to Symantec
only with your permission, and will not be
sent automatically. If you send such
messages to Symantec, Symantec will use
them only for the purpose of improving the
detection ability of Symantec’s antispam
technology. Symantecwill notcorrelate these
files with any other personally identifiable
information.
Information contained in a report that You
may choose to send throughthe Software to
Symantec when the Software encounters a
problem. The report includes information
regarding thestatus ofboth the Softwareand
Your Device at the time that the Software
encountered the problem. The status
information about Your Device may include
the systemlanguage, countrylocale, and the
operating systemversion for YourDevice, as
well as the processes running, their status
and performanceinformation, anddata from
files or folders that wereopen at the timethe
Software encountered the problem. The
information could contain personally
identifiable information ifsuch information
is included in, or is a part of the name of the
files or folders open atthe time the Software
encountered the problem. This information
will be sent to Symantec only with Your
permission, and will not be sent
automatically. The information is collected
by Symantec for the purpose of correcting
the encountered problem and improving
Symantec’s product performance. This
information will not be correlated with any
personally identifiable information.
The Internet Protocol (IP) address and/or
Media AccessControl (MAC) addressand the
Machine ID of the computer on which the
Software is installed to enable the Software
to function and for license administration
purposes.
Other general, statistical information used
for product analysis, and for improving
product functionality.
Unless itis expressly definedas optional, the
collected information as set out above is
necessary forthe purposeof the functionality
of Symantec’s products.
Information may be transferred to the
Symantec groupin theUnited Statesor other
countries that mayhave less protectivedata
protection lawsthan the region in whichYou
are situated (including the European Union)
and may be accessible by Symantec
employees or contractors exclusively to be
used in accordance with the purposes
described above. For the same purposes the
information may be shared with partners
and vendors that process information on
behalf of Symantec. Symantec has taken
steps so that the collected information, if
transferred, receives an adequate level of
protection.
Subject toapplicable laws,Symantec reserves
the right tocooperate with any legal process
and any law enforcement or other
government inquiry related to your use of
this Software. This means that Symantec
may provide documents and information
relevant to a court subpoena or to a law
enforcement or other government
investigation. Inorder topromote awareness,
detection andprevention ofInternet security
risks, Symantec may share certain
information withresearch organizationsand
other security software vendors. Symantec
may also use statistics derived from the
information to track and publish reports on
security risk trends. By using the Software,
You acknowledge and agree that Symantec
may collect, transmit, store, disclose and
analyze suchinformation forthese purposes.
Norton Internet Securitydelivers fast and light online
threat protection. It guards your PC, network, online
activities, and your identity with innovative detection
technologies optimized to combat today’s aggressive,
rapid-fire attacks. Norton Internet Security makes
online shopping,banking, and browsing safer andmore
convenient than ever.
The improved Norton Protection System features
multilayered securitytechnologies. They work together
to provide the comprehensive protection that detects
and removes threats before they can harm your PC.
The Norton Protection System stops online identity
theft, viruses, hackers, bots, spyware, Trojan horses,
and more without slowing you downor getting in your
way.
1
Overview
12
About Norton Internet Security
Loading...
+ 28 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.