Endpoint
10/25/2012
08:16 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Court To Notify Current And Former Norton Customers About $10 Cash Refunds For Antivirus Software Upgrades And Renewals

Products included in the settlement are Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall, and Norton SystemWorks

SAN FRANCISCO, Oct. 25, 2012 /PRNewswire/ -- A notification program began today, as ordered by the United States District Court for the Northern District of California (the "Court"), to alert people who purchased Norton antivirus software from Symantec Corporation ("Symantec") about a proposed class action settlement.

This settlement resolves a lawsuit over whether Symantec Corporation

("Symantec") improperly charged customers for the automatic renewal of a prior Norton software subscription after they purchased another Norton product.

Eligible claimants may receive a $10 cash refund or two-month Norton subscription extension for each eligible pair of Norton purchases. The settlement also provides that Symantec will make certain website disclosures and other changes to its business practices.

The following products are included in the settlement: Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall and Norton SystemWorks ("Eligible Products").

The Settlement Class includes all individuals, businesses and other entities in the United States who between October 1, 2005 and May 23, 2012: (a) purchased an Eligible Product, and (b) enrolled in Norton's automatic renewal service for that product, and (c) purchased (or renewed) a second Eligible Product either during the term of a subscription to the first Eligible Product or within 60 days after being charged an automatic renewal charge for that first Eligible Product, and (d) installed the second Eligible Product on the same computer as the first Eligible Product, and (e) have not received a refund of the automatic renewal charge. Each pair of product purchases is an "Eligible Transaction."

Class Members who submit valid claims by May 6, 2013, may receive a $10 cash refund or two-month Norton subscription extension for each Eligible Transaction.

Claims for a single Eligible Transaction do not require proof from the claimant--the claim is based on their knowledge and recollection. Claims for multiple Eligible Transactions require that the claimant provide proof-of-purchase documentation. Class Members can request a Claim Form, Detailed Notice and postage prepaid envelope by calling the toll free number or visiting the website. Claims may be submitted by postal mail, email or fax.

Notices will be sent to potential Settlement Class Members and are scheduled to appear in nationwide print and online media leading up to a hearing on April 4, 2013, when the Court will consider whether to grant final approval to the settlement.

The Court has appointed the law firms of The Law Offices of Thomas M. Mullaney in New York, NY, and Larry D. Drury, Ltd., in Chicago, IL, as Class Counsel to represent the Settlement Class.

Those affected by the settlement can ask to be excluded from, or object to, the settlement and its terms. The deadline for exclusions and objections is February 26, 2013.

A toll free number, 1-877-853-3045, has been established in the case known as Marolda v. Symantec Corp., Case No. 08-5701 (EMC), along with a website, www.NortonSettlement.com, where the notice, claim form and other information may be obtained. Those affected may also send an email to info@NortonSettlement.com or write to Norton Upgrade Settlement, P.O. Box 3170, Portland, OR 97208-3170.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-0658
Published: 2015-03-27
The DHCP implementation in the PowerOn Auto Provisioning (POAP) feature in Cisco NX-OS does not properly restrict the initialization process, which allows remote attackers to execute arbitrary commands as root by sending crafted response packets on the local network, aka Bug ID CSCur14589.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.