Endpoint
10/25/2012
08:16 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Court To Notify Current And Former Norton Customers About $10 Cash Refunds For Antivirus Software Upgrades And Renewals

Products included in the settlement are Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall, and Norton SystemWorks

SAN FRANCISCO, Oct. 25, 2012 /PRNewswire/ -- A notification program began today, as ordered by the United States District Court for the Northern District of California (the "Court"), to alert people who purchased Norton antivirus software from Symantec Corporation ("Symantec") about a proposed class action settlement.

This settlement resolves a lawsuit over whether Symantec Corporation

("Symantec") improperly charged customers for the automatic renewal of a prior Norton software subscription after they purchased another Norton product.

Eligible claimants may receive a $10 cash refund or two-month Norton subscription extension for each eligible pair of Norton purchases. The settlement also provides that Symantec will make certain website disclosures and other changes to its business practices.

The following products are included in the settlement: Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall and Norton SystemWorks ("Eligible Products").

The Settlement Class includes all individuals, businesses and other entities in the United States who between October 1, 2005 and May 23, 2012: (a) purchased an Eligible Product, and (b) enrolled in Norton's automatic renewal service for that product, and (c) purchased (or renewed) a second Eligible Product either during the term of a subscription to the first Eligible Product or within 60 days after being charged an automatic renewal charge for that first Eligible Product, and (d) installed the second Eligible Product on the same computer as the first Eligible Product, and (e) have not received a refund of the automatic renewal charge. Each pair of product purchases is an "Eligible Transaction."

Class Members who submit valid claims by May 6, 2013, may receive a $10 cash refund or two-month Norton subscription extension for each Eligible Transaction.

Claims for a single Eligible Transaction do not require proof from the claimant--the claim is based on their knowledge and recollection. Claims for multiple Eligible Transactions require that the claimant provide proof-of-purchase documentation. Class Members can request a Claim Form, Detailed Notice and postage prepaid envelope by calling the toll free number or visiting the website. Claims may be submitted by postal mail, email or fax.

Notices will be sent to potential Settlement Class Members and are scheduled to appear in nationwide print and online media leading up to a hearing on April 4, 2013, when the Court will consider whether to grant final approval to the settlement.

The Court has appointed the law firms of The Law Offices of Thomas M. Mullaney in New York, NY, and Larry D. Drury, Ltd., in Chicago, IL, as Class Counsel to represent the Settlement Class.

Those affected by the settlement can ask to be excluded from, or object to, the settlement and its terms. The deadline for exclusions and objections is February 26, 2013.

A toll free number, 1-877-853-3045, has been established in the case known as Marolda v. Symantec Corp., Case No. 08-5701 (EMC), along with a website, www.NortonSettlement.com, where the notice, claim form and other information may be obtained. Those affected may also send an email to info@NortonSettlement.com or write to Norton Upgrade Settlement, P.O. Box 3170, Portland, OR 97208-3170.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.