ETC Element v2.1.0 User Manual

Page 315

Advertising
background image

2


2. Content Updates:

Certain Software uses content that is updated from time to time, including but not limited to the following
Software: antivirus and crimeware software use updated virus definitions; antispyware software uses
updated spyware definitions; antispam software uses updated antispam rules; content filtering and
antiphishing software use updated URL lists; some firewall software use updated firewall rules;
vulnerability assessment products use updated vulnerability data and web site authentication software
uses updated lists of authenticated web pages

; these updates are collectively referred to as “Content

Updates” (or alternatively referred to as “Protection Updates” or “Security Updates” at times). You shall
have the right to obtain Content Updates for any period for which You have purchased a subscription for
Content Updates for the Software (including any subscription included with Your original purchase of the
Software), except for those Content Updates that Symantec elects to make available by separate paid
subscription, or for any period for which You have otherwise separately acquired the right to obtain
Content Updates. Symantec reserves the right to designate specified Content Updates as requiring
purchase of a separate subscription at any time and without notice to You; provided, however, that if You
purchase a subscription that includes particular Content Updates on the date of purchase, You will not
have to pay an additional fee to continue receiving such Content Updates for the remaining period of Your
existing subscription even if Symantec designates such Content Updates as requiring separate purchase.
This License Agreement does not otherwise permit You to obtain and use Content Updates.

3. Product Installation; Required Activation:

A. During the installation process, the Software may uninstall or disable other security products, or
features thereof, if such products or features are incompatible with the Software or for purposes of
improving the overall functionality of the Software.

B. There may be technological measures in this Software that are designed to prevent unlicensed or
illegal use of the Software. You agree that Symantec may use these measures to protect Symantec
against software piracy. This Software may contain enforcement technology that limits the ability to install
and uninstall the Software on a computer to not more than a finite number of times for a finite number of
computers. This License Agreement and the Software containing enforcement technology may require
activation as further set forth in the Documentation. If so, the Software will only operate for a finite period
of time prior to Software activation by You. During activation, You may be required to provide Your
unique product key accompanying the Software and computer configuration in the form of an
alphanumeric code over the Internet to verify the authenticity of the Software. If You do not complete the
activation within the finite period of time set forth in the Documentation, or as prompted by the Software,
the Software will cease to function until activation is complete; at which time the Software functionality will
be restored. In the event that You are not able to activate the Software over the Internet, or through any
other method specified during the activation process, You may contact Symantec Customer Support
using the information provided by Symantec during activation, or as set forth below.

4. Privacy; Data Protection:

From time to time, the Software may collect certain information from the computer on which it is installed,
which may include:

Information on potential security risks as well as URLs of websites visited that the Software deems

potentially fraudulent. The URLs could contain personally identifiable information that a potentially
fraudulent website is attempting to obtain without Your permission. This information is collected by
Symantec for the purpose of

evaluating and improving the ability of Symantec’s products to detect

malicious behavior, potentially fraudulent websites and other Internet security risks. This
information will not be correlated with any personally identifiable information.

Portable executable files that are identified as potential malware, including information on the

actions taken by such files at the time of installation. These files are submitted to Symantec using
the Software’s automatic submission function. The collected files could contain personally
identifiable information that has been obtained by the malware without Your permission. Files of
this type are being collected by Symantec only for the purpose of improving the ability of
Symantec’s products to detect malicious behavior. Symantec will not correlate these files with any
personally identifiable information. Such automatic submission function may be deactivated after
installation by following the instructions in the Documentation for applicable products.

Advertising