Endpoint
10/25/2012
08:16 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Court To Notify Current And Former Norton Customers About $10 Cash Refunds For Antivirus Software Upgrades And Renewals

Products included in the settlement are Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall, and Norton SystemWorks

SAN FRANCISCO, Oct. 25, 2012 /PRNewswire/ -- A notification program began today, as ordered by the United States District Court for the Northern District of California (the "Court"), to alert people who purchased Norton antivirus software from Symantec Corporation ("Symantec") about a proposed class action settlement.

This settlement resolves a lawsuit over whether Symantec Corporation

("Symantec") improperly charged customers for the automatic renewal of a prior Norton software subscription after they purchased another Norton product.

Eligible claimants may receive a $10 cash refund or two-month Norton subscription extension for each eligible pair of Norton purchases. The settlement also provides that Symantec will make certain website disclosures and other changes to its business practices.

The following products are included in the settlement: Norton AntiVirus, Norton Internet Security, Norton 360, Norton Personal Firewall and Norton SystemWorks ("Eligible Products").

The Settlement Class includes all individuals, businesses and other entities in the United States who between October 1, 2005 and May 23, 2012: (a) purchased an Eligible Product, and (b) enrolled in Norton's automatic renewal service for that product, and (c) purchased (or renewed) a second Eligible Product either during the term of a subscription to the first Eligible Product or within 60 days after being charged an automatic renewal charge for that first Eligible Product, and (d) installed the second Eligible Product on the same computer as the first Eligible Product, and (e) have not received a refund of the automatic renewal charge. Each pair of product purchases is an "Eligible Transaction."

Class Members who submit valid claims by May 6, 2013, may receive a $10 cash refund or two-month Norton subscription extension for each Eligible Transaction.

Claims for a single Eligible Transaction do not require proof from the claimant--the claim is based on their knowledge and recollection. Claims for multiple Eligible Transactions require that the claimant provide proof-of-purchase documentation. Class Members can request a Claim Form, Detailed Notice and postage prepaid envelope by calling the toll free number or visiting the website. Claims may be submitted by postal mail, email or fax.

Notices will be sent to potential Settlement Class Members and are scheduled to appear in nationwide print and online media leading up to a hearing on April 4, 2013, when the Court will consider whether to grant final approval to the settlement.

The Court has appointed the law firms of The Law Offices of Thomas M. Mullaney in New York, NY, and Larry D. Drury, Ltd., in Chicago, IL, as Class Counsel to represent the Settlement Class.

Those affected by the settlement can ask to be excluded from, or object to, the settlement and its terms. The deadline for exclusions and objections is February 26, 2013.

A toll free number, 1-877-853-3045, has been established in the case known as Marolda v. Symantec Corp., Case No. 08-5701 (EMC), along with a website, www.NortonSettlement.com, where the notice, claim form and other information may be obtained. Those affected may also send an email to info@NortonSettlement.com or write to Norton Upgrade Settlement, P.O. Box 3170, Portland, OR 97208-3170.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-1375
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not properly restrict access to the upload functionality, which allows remote attackers to write to arbitrary files.

CVE-2015-1376
Published: 2015-01-28
pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com.

CVE-2015-1419
Published: 2015-01-28
Unspecified vulnerability in vsftp 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.

CVE-2014-5211
Published: 2015-01-27
Stack-based buffer overflow in the Attachmate Reflection FTP Client before 14.1.433 allows remote FTP servers to execute arbitrary code via a large PWD response.

CVE-2014-8154
Published: 2015-01-27
The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overf...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.