SYMANTEC SOFTWARE LICENSE AGREEMENT

Norton Internet Security

IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE SOFTWARE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTEC”) IS WILLING TO LICENSE THE SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERENCED BELOW AS “YOU” OR “YOUR”) ONLY ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING THIS PACKAGE, BREAKING THE SEAL, CLICKING THE “ACCEPT” OR “YES” BUTTON OR OTHERWISE INDICATING ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, CLICK THE “I DO NOT ACCEPT” OR “NO” BUTTON OR OTHERWISE INDICATE REFUSAL, MAKE NO FURTHER USE OF THE SOFTWARE, AND CONTACT SYMANTEC CUSTOMER SERVICE FOR INFORMATION ON HOW TO OBTAIN A REFUND OF THE MONEY YOU PAID FOR THE SOFTWARE (LESS SHIPPING, HANDLING, AND ANY APPLICABLE TAXES EXCEPT IN CERTAIN STATES AND COUNTRIES WHERE SHIPPING, HANDLING, AND TAXES ARE REFUNDABLE) AT ANY TIME DURING THE SIXTY (60) DAY PERIOD FOLLOWING THE DATE OF PURCHASE.

1. License:

The software and documentation that accompanies this license (collectively the “Software”) is the property of Symantec, or its licensors, and is protected by copyright law. While Symantec continues to own the Software, You will have certain rights to use the Software after Your acceptance of this license. This license governs any releases, revisions, or enhancements to the Software that Symantec may furnish to You. Except as may be modified by a Symantec license certificate, license coupon, or license key (each a “License Module”) that accompanies, precedes, or follows this license, Your rights and obligations with respect to the use of this Software are as follows.

You may:

A. use one copy of the Software on a single computer. If a License Module accompanies, precedes, or follows this license, You may make the number of copies of the Software licensed to You by Symantec as provided in Your License Module. Your License Module shall constitute proof of Your right to make such copies;

B. make one copy of the Software for archival purposes, or copy the Software onto the hard

disk of Your computer and retain the original for archival purposes;

C. use the Software on a network, provided that You have a licensed copy of the Software for each computer that can access the Software over that network;

D. after written notice to Symantec, transfer the Software on a permanent basis to another person or entity, provided that You retain no copies of the Software and the transferee agrees to the terms of this license; and

E. use the Software in accordance with any additional permitted uses set forth below.

You may not:

A. copy the printed documentation that accompanies the Software;

B. sublicense, rent, or lease any portion of the Software; reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the Software, or create derivative works from the Software;

C. use the Software as part of a facility management, timesharing, service provider, or service bureau arrangement;

D. use a previous version or copy of the Software after You have received and installed a disk replacement set or an upgraded version. Upon upgrading the Software, all copies of the prior version must be destroyed;

E. use a later version of the Software than is provided herewith unless You have purchased upgrade insurance or have otherwise separately acquired the right to use such later version;

F. use, if You received the software distributed on media containing multiple Symantec products, any Symantec software on the media for which You have not received a permission in a License Module;

G. use the Software in any manner not authorized by this license; nor

H. use the Software in any manner that contradicts any additional restrictions set forth below.

2. Content Updates:

Certain Software utilize content that is updated from time to time (including but not limited to the following Software: antivirus software utilize updated virus definitions; content filtering software utilize updated URL lists; some firewall software utilize updated firewall rules; and vulnerability assessment products utilize updated vulnerability data; these updates are collectively referred to as “Content Updates”). You shall have the right to obtain Content Updates for any period for which You have purchased maintenance, except for those Content Updates that Symantec elects to make available by separate paid subscription, or for any period for which You have otherwise separately acquired the right to obtain Content

Page 75
Image 75
Symantec NIS2005 manual Symantec Software License Agreement

NIS2005 specifications

Symantec Norton Internet Security 2005 is a comprehensive security suite designed to protect computers from various online threats, including viruses, spyware, and phishing attacks. It combines multiple layers of defense, making it a popular choice among users seeking enhanced security for their personal or business systems.

One of the key features of NIS 2005 is its advanced antivirus protection. It utilizes a powerful scanning engine that detects and removes viruses in real-time, providing users with immediate protection. The product is equipped with automatic updates that ensure users receive the latest virus definitions and security patches, helping to safeguard against emerging threats.

Another notable technology integrated into NIS 2005 is the Smart Firewall. This firewall monitors incoming and outgoing network traffic, preventing unauthorized access to the user’s system. It utilizes advanced heuristics to identify suspicious behavior, significantly reducing the risk of attacks from hackers and malicious software.

Norton Internet Security 2005 also includes anti-spyware capabilities designed to detect and remove spyware and adware. This feature is crucial, as such software can compromise user privacy by tracking personal information without consent. The robust scanning tools in NIS 2005 effectively identify and eliminate these threats.

Phishing protection is another essential characteristic of this suite. NIS 2005 employs browser protection that alerts users to potential phishing websites that attempt to steal sensitive information such as passwords and banking details. The product actively blocks access to these fraudulent sites, ensuring a safer browsing experience.

Additionally, NIS 2005 offers user-friendly parental controls that allow parents to monitor and restrict their children’s online activities. This feature provides options to block inappropriate content and set time limits, fostering a safer internet environment for younger users.

The suite is designed with minimal system impact in mind, allowing users to run their daily applications without noticeable slowdowns. Furthermore, its intuitive interface makes it easy for users of all experience levels to navigate the software and manage their security settings effectively.

In conclusion, Symantec Norton Internet Security 2005 offers a robust suite of security features, combining antivirus protection, a smart firewall, anti-spyware capabilities, phishing protection, and parental controls. With its user-friendly interface and minimal system impact, NIS 2005 remains a vital tool for users looking to maintain a secure online presence.