background image

software utilize updated URL lists; some firewall
software utilize updated firewall rules;
vulnerability assessment products utilize
updated vulnerability data and web site
authentication software utilize updated lists of
authenticated web pages; these updates are
collectively referred to as “Content Updates” (or
alternatively referred to as “Protection Updates”
or “Security Updates” at times). You shall have
the right to obtain Content Updates for any
period for which You have purchased a
subscription for Content Updates for the
Software (including any subscription included
with your original purchase of the Software),
except for those Content Updates that Symantec
elects to make available by separate paid
subscription, or for any period for which You
have otherwise separately acquired the right to
obtain Content Updates. Symantec reserves the
right to designate specified Content Updates as
requiring purchase of a separate subscription
at any time and without notice to You; provided,
however, that if You purchase a subscription
that includes particular Content Updates on the
date of purchase, You will not have to pay an
additional fee to continue receiving such
Content Updates through the term of such
subscription even if Symantec designates such
Content Updates as requiring separate purchase.
This License Agreement does not otherwise
permit You to obtain and use Content Updates.

3. Product Installation; Required
Activation:

A. During the installation process, the Software
may uninstall or disable other security products,
or features thereof, if such products or features
are incompatible with the Software or for
purposes of improving the overall functionality
of the Software.

B. There may be technological measures in this
Software that are designed to prevent
unlicensed or illegal use of the Software. You
agree that Symantec may use these measures
to protect Symantec against software piracy.
This Software may contain enforcement
technology that limits the ability to install and
uninstall the Software on a computer to not more
than a finite number of times for a finite number
of computers. This License Agreement and the
Software containing enforcement technology
require activation as further set forth in the
Documentation. The Software will only operate
for a finite period of time prior to Software
activation by You. During activation, You may
be required to provide Your unique product key
accompanying the Software and computer

configuration in the form of an alphanumeric
code over the Internet to verify the authenticity
of the Software. If You do not complete the
activation within the finite period of time set
forth in the Documentation, or as prompted by
the Software, the Software will cease to function
until activation is complete; at which time the
Software functionality will be restored. In the
event that You are not able to activate the
Software over the Internet, or through any other
method specified during the activation process,
You may contact Symantec Customer Support
using the information provided by Symantec
during activation, or as set forth below.

4. Privacy; Data Protection:

From time to time, the Software will collect
certain information from the computer on which
it is installed, which may include:

•Information regarding installation of the
Software. This information indicates to
Symantec whether installation of the Software
was successfully completed and is collected by
Symantec for the purpose of evaluating and
improving Symantec’s product installation
success rate. This information will not be
correlated with any personally identifiable
information.

•Information on potential security risks as well
as URLs of websites visited that the Software
deems potentially fraudulent. This information
is collected by Symantec for the purpose of
evaluating and improving the ability of
Symantec’s products to detect malicious
behavior, potentially fraudulent websites and
other Internet security risks. This information
will not be correlated with any personally
identifiable information.

•Portable executable files that are identified as
malware. These files are submitted to Symantec
using the Software’s automatic submission
function. The collected files could contain
personally identifiable information that has been
obtained by the malware without your
permission. Files of this type are being collected
by Symantec only for the purpose of improving
the ability of Symantec’s products to detect
malicious behavior. Symantec will not correlate
these files with any personally identifiable
information. Such automatic submission
function may be deactivated after installation
by following the instructions in the
Documentation for applicable products.

•The name given during initial setup to the
computer on which the Software is being

Содержание 10514879 - Norton Confidential

Страница 1: ...User Guide PN 10748234...

Страница 2: ...rademarks and Tiger is a trademark of Apple Computer Inc Firefox is a registered trademark of Mozilla Corporation Other names may be trademarks of their respective owners The product described in this...

Страница 3: ...Agreement governs any releases revisions or enhancements to the Software that Symantec may furnish to You Your rights and obligations with respect to the use of this Software are as follows You may A...

Страница 4: ...riod of time prior to Software activation by You During activation You may be required to provide Your unique product key accompanying the Software and computer configuration in the form of an alphanu...

Страница 5: ...rned to Symantec within the warranty period or refund the money You paid for the Software Symantec does not warrant that the Software will meet Your requirements or that operation of the Software will...

Страница 6: ...ftware and i supersedes all prior or contemporaneous oral or written communications proposals and representations with respect to its subject matter and ii prevails over any conflicting or additional...

Страница 7: ...egin 9 Installing Norton Confidential 10 Setting up Norton Confidential 12 After installation 16 Chapter 2 Getting started Opening and quitting Norton Confidential 19 For more information 20 Service a...

Страница 8: ...Contents 8...

Страница 9: ...rator account name and password An administrator account is created when you set up your Mac See Checking your user account type on page 10 If you re not sure if your account is an administrator accou...

Страница 10: ...ou can check it in System Preferences To check your user account type 1 On the Apple menu click System Preferences 2 Click Accounts 3 View your account name and type Installing Norton Confidential Bef...

Страница 11: ...r this button may be labeled Upgrade instead of Install 1 To select the features you want to install click Customize use the checkboxes to select the features you want to install and then click Instal...

Страница 12: ...hold the mouse button to eject the CD while you start your computer For more information on how to eject a CD refer to the Mac Help Setting up Norton Confidential After you install the Norton Confide...

Страница 13: ...rmation Guard window use the buttons to enable or disable Information Guard and then click Continue If you choose not to enable Information Guard now you can enable the feature and add personal inform...

Страница 14: ...ard click Continue 12 In the Vulnerability Protection window use the button to enable or disable Vulnerability Protection and then click Continue 13 In the Finish Setup window do all the following act...

Страница 15: ...ered into Information Guard without dashes as follows 8885551234 Norton Confidential detects the guarded number regardless of how you enter it in the Web site 1 Enter the entire sequence of numbers or...

Страница 16: ...ould check for late breaking news about your new software You can also register your software with Symantec Registering Norton Confidential Registration qualifies you for technical support disk and ma...

Страница 17: ...u are done selecting your preferences click Submit at the bottom of the window Reading Late Breaking News Norton Confidential creates a Late Breaking News link You can click this link to see the lates...

Страница 18: ...Installation After installation 18...

Страница 19: ...ted If Norton Confidential detects a situation that requires your attention an alert opens to help you resolve it By default protection features are enabled and Norton Confidential monitors your compu...

Страница 20: ...hoose Quit Norton Confidential 1 Press Command Q For more information The product documentation provides assistance for using Norton Confidential You can find the information that you need on your com...

Страница 21: ...r Guide PDF 1 Insert the CD into the optical disk drive 2 Double click the PDF You can also copy the PDF to your computer and read it from there To read the User Guide that you copied to your computer...

Страница 22: ...Getting started For more information 22...

Страница 23: ...other nontechnical issues The Symantec Web site contains answers to the most common customer questions w If you received this product when you purchased your computer your computer manufacturer may b...

Страница 24: ...Service period lengths vary by Symantec product After your initial service period ends you must renew your service subscription before you can update and use your protection When you run LiveUpdate n...

Страница 25: ...n reg_ap Australia and New Zealand 1 Symantec Ltd Consumer Services Support PO Box 5689 Blanchardstown Dublin 15 Ireland http www symantec com region reg_eu Europe Middle East and Africa 1 Symantec Br...

Страница 26: ...Service and support solutions Worldwide service and support 26...

Страница 27: ...uarded information entering 14 H Help access 20 Symantec service and support 23 how do 19 how do I get started 19 how to 19 I installation post installation tasks 16 preparing for 9 Read Me 9 setup as...

Страница 28: ...acter set SBCS 14 start 19 start Norton Confidential 19 stop 19 Symantec Solutions 19 Symantec Web site product registration 16 T Technical Support 23 troubleshooting can t eject CD 12 technical suppo...

Отзывы: