Symantec Norton Internet Security Netbook Edition Uživatelská příručka Strana 5

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 42
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 4
forth in the Documentation, or as prompted
by the Software, the Software will cease to
function until activation is complete; at
which time the Software functionality will
be restored. In the event that You are not
able to activate the Software over the
Internet, or through any other method
specified during the activation process, You
may contact Symantec Customer Support
using the information provided by Symantec
during activation, or as set forth below.
4. Technical Support:
Certain technical support features may be
offered from within the Software and which
may include live chat with a technical
support agent and/or assistance from a
technical support agent via remote computer
access (any such technical support offered
from within the Software shall be referred
to in this License Agreement as the
Technical Support). If such features are
offered and You choose to access such
Technical Support the following terms shall
apply. Any such Technical Support shall be
provided in Symantecs sole discretion
without any guarantee or warranty of any
kind. It is solely Your responsibility to
complete a backup of all Your existing data,
software and programs before receiving any
Technical 3 Support. In the course of
providing the Technical Support, Symantec
may determine that the technical issue is
beyond the scope of the Technical Support.
Symantec reserves the right to refuse,
suspend or terminate any of the Technical
Support in its sole discretion.
5. Privacy; Data Protection:
From time to time, the Software may collect
certain information from the computer on
which it is installed, which may include:
Information on potential security risks as
well as URLs of websites visited that the
Software deems potentially fraudulent. The
URLs could contain personally identifiable
information that a potentially fraudulent
website is attempting to obtain without Your
permission. This information is collected by
Symantec for the purpose of evaluating and
improving the ability of Symantecs products
to detect malicious behavior, potentially
fraudulent websites and other Internet
security risks. This information will not be
correlated with any personally identifiable
information.
URLs of websites visited as well as search
keywords and search results only if the
Norton Safe Web feature is enabled. This
information is collected by Symantec for the
purpose of evaluating and advising You
regarding potential threats and risks that
may be associated with a particular Web site
before You view it. This information will not
be correlated with any personally identifiable
information.
Executable files that are identified as
potential malware, including information on
the actions taken by such files at the time of
installation. These files are submitted to
Symantec using the Softwares automatic
submission function. The collected files could
contain personally identifiable information
that has been obtained by the malware
without Your permission. Files of this type
are being collected by Symantec only for the
purpose of improving the ability of
Symantecs products to detect malicious
behavior. Symantec will not correlate these
files with any personally identifiable
information. Such automatic submission
function may be deactivated after installation
by following the instructions in the
Documentation for applicable products.
The name given during initial setup to the
computer on which the Software is being
installed. If collected, the name will be used
by Symantec as an account name for such
computer under which You may elect to
receive additional services and/or under
which You may use certain features of the
Software. You may change the account name
at any time after installation of the Software
(recommended).
Status information regarding installation
and operation of the Software. This
information indicates to Symantec whether
installation of the Software was successfully
completed as well as whether the Software
has encountered an error. The status
information could contain personally
identifiable information only if such
information is included in the name of the
file or folder encountered by the Software at
the time of installation or error. The status
information is collected by Symantec for the
purpose of evaluating and improving
Symantecs product performance and
installation success rate. This information
will not be correlated with any personally
identifiable information.
Information contained in email messages
that you send through the Software to
Zobrazit stránku 4
1 2 3 4 5 6 7 8 9 10 ... 41 42

Komentáře k této Příručce

Žádné komentáře