Mcafee моя учетная запись. Официальный магазин McAfee™. Очень выгодное предложение

Mcafee моя учетная запись. Официальный магазин McAfee™. Очень выгодное предложение

«Часто задаваемые технические вопросы Переход с Postini на McAfee SaaS Email Protection Часто задаваемые вопросы Недавно корпорация Google внезапно...»

Часто задаваемые технические вопросы

Переход с Postini на McAfee SaaS Email Protection

Часто задаваемые вопросы

Недавно корпорация Google внезапно объявила, что все клиенты Postini должны либо перейти на Google Apps, куда входит

усеченная версия Postini, либо расторгнуть договор по истечении срока его действия, и выбрать другого поставщика услуг:

http://support.google.com/postini/bin/answer.py?hl=en&answer=2717451

Более того, фильтр электронной почты Google Apps будет лишен поддержки многих ценных функций, к которым так привыкли многие отделы ИТ. Поэтому неудивительно, что с момента оглашения этой новости компания McAfee предлагает пользователям Postini свою удостоенную наград услугу McAfee SaaS Email Protection.

Вопрос: Почему стоит выбрать McAfee?

Ответ: Есть множество причин, по которым следует перейти с Google/Postini на McAfee.

Будучи крупнейшим в мире поставщиком решений для обеспечения безопасности, компания McAfee всегда стремится к обеспечению высшей степени безопасности своих клиентов. Если речь идет о безопасности электронной почты, то решения McAfee не только обеспечивают защиту от нежелательных сообщений, фишинга и смешанных атак, но и помогают защитить исходящую связь благодаря встроенным механизмам шифрования, надежному в использовании набору предварительно разработанных шаблонов правил нормативно-правового соответствия, возможности сканирования более чем 300 типов вложений и технологиям предотвращения утечек данных, позволяющим защитить информацию от злоумышленников и несчастных случаев. В решение встроены инструменты для обеспечения непрерывного доступа к электронной почте и архивирования электронной почты.



Компания McAfee давно занимается вопросами обеспечения безопасности электронной почты, о чем свидетельствует регулярное усовершенствование продуктов и более чем 10-летний опыт успешной работы в этой области.

Мы понимаем, что для предоставления качественных услуг мало наличия одного лишь веб-сайта технической поддержки, поэтому компания McAfee также предоставляет клиентам услуги круглосуточно и без взимания дополнительной платы.

Недавно компания McAfee получила подтверждения всемирного признания ее авторитета в области обеспечения безопасности электронной почты:

– Лидер «магического квадранта» компании Gartner среди поставщиков шлюзов для защиты электронной почты

– Лидер по ценности решений в отчете EMA Radar по услугам хостинга для обеспечения безопасности электронной почты

– Пятизвездочное «Лучшее приобретение» (Best Buy) в категории «Лучшее средство защиты содержимого электронной почты» по версии журнала SC Magazine

– Награда «Новатор в сфере защиты данных» журнала SC Magazine КомпаниейMcAfee выдано свидетельство, подтверждающее соответствие требованиям стандарта ISO 27001.

Компания обслуживает десятки тысяч предприятий и миллионы конечных пользователей по всему миру:

– интерфейс для конечных пользователей переведен на 18 языков;

– локализованы системы обработки электронной почты для центров обработки данных в Северной Америке, Европе, Азии и Австралии.

Обеспеченаинтеграция с McAfee SaaS Web Protection, что позволило организациям оптимизировать системы безопасности с точки зрения их экономической эффективности.

Вопрос: Чем McAfee SaaS Email Protection отличается от Postini и Google Apps?

Ответ: Первое и самое главное отличие состоит в том, что McAfee обеспечивает защиту вашей электронной почты на основе концепции «всесторонней защиты» от угроз с применением трех антивирусных ядер, защиты от угроз «нулевого часа» и, что самое важное, технологии McAfee Global Threat Intelligence (GTI). GTI - это облачная сеть McAfee, постоянно получающая актуальные сведения об угрозах от более чем 100 миллионов датчиков «прослушивания» каналов данных и анализирующая миллиарды почтовых отправлений в сутки.

Основные отличительные качества:

McAfee предлагает возможности буферизации на случай невозможности доставки сообщения электронной почты в вашу сеть из-за нарушений связи, включая предоставление пользователям возможности взаимодействия с сообщениями, находящимися в буфере.

Фильтрация исходящих сообщений, включая встроенные средства защиты от утечек данных и шифрования.

Хранение журнала аудита в течение 60 дней вместо 45, как у Postini.

Доступность данных об аудите сообщений в режиме, приближенном к реальному времени.

Фильтрация данных на уровне прокси-севера, сокращающая количество циклов записи на диск и гарантирующая отправителям точность и безопасность информации, а не модель «сохранить и передать», предлагаемая в Google Apps.

Архитектура прокси-серверов McAfee, не создающая проблем для вашей системы множеством ненужных подключений.

Отсутствие ограничения объема записей в списках «разрешенных» и «запрещенных» отправителей.

Удобные роли пользователей, такие как «администратор карантина», позволяют распределять уровни доступа к корпоративной службе поддержки.

Простые в использовании функции TLS, SPF и DKIM, помогающие реализовать передовые методики проверки подлинности сообщений электронной почты.

Обзор процесса миграции В этом руководстве представлены наиболее распространенные задачи настройки, однако, следует помнить, что возможности McAfee SaaS Email Protection этим не ограничиваются! Чтобы узнать больше, рекомендуем посетить один из бесплатных интерактивных учебных курсов. В зависимости от уровня ваших знаний и сложности вашей инфраструктуры настройка может занять от нескольких минут до нескольких дней.

Процедура

1. Подготовка

2. Настройка доставки входящих сообщений

3. Настройка режима перехода на другой ресурс при сбое на сервере входящих сообщений

4. Создание пользователей

5. Настройка политик для входящих сообщений

6. Настройка политик для исходящих сообщений

7. Переключение входящей связи на новую систему

8. Переключение исходящей связи на новую систему Шаг 1. Подготовка

1. С помощью удобного для вас браузера войдите в модуль System Administration (система администрирования) центра Postini Message Center, используя учетные данные администратора.

2. Откройте в браузере новую вкладку и выполните вход в консоль управления McAfee SaaS Control Console в роли администратора.

Теперь вы можете легко переключаться между веб-сайтами, переходя с одной вкладки на другую. Это упростит перенос настроек с одной консоли на другую.

–  –  –

Шаг 2. Настройка доставки входящих сообщений

1. Выберите в меню консоли Postini Message Center последовательно вкладки Inbound Servers Delivery Manager (Серверы входящей почты Диспетчер доставки).

2. В меню консоли McAfee Control Console откройте последовательно вкладки Email Protection Setup Inbound Servers (Защита электронной почты Настройка Серверы входящей почты).

3. Скопируйте все адреса почтовых серверов из Postini в поле SMTP Host Address (Адрес SMTP-сервера) консоли McAfee SaaS. Чтобы добавить новую строку, щелкните кнопку Add New Host (Добавить новый узел).

4. Проверьте подключение (кнопка Test Connectivity (Проверить возможность подключения)), чтобы убедиться в наличии связи между McAfee SaaS и вашей сетью.

5. Повторите описанные действия для каждого домена, не забывая сохранять изменения!

Совет. Независимо от настроек McAfee SaaS всегда пытается отправлять и получать сообщения, используя протокол шифрования TLS.

Шаг 3. Настройка режима перехода на другой ресурс при сбое на сервере входящих сообщений

1. Настройте режим перехода на другой ресурс при сбое на сервере, указав резервный сервер(ы) в свободной строке SMTP Host Address (Адрес SMTP-сервера), но с более высоким приоритетом, чем основной сервер(ы). В приведенном ниже примере используется один основной сервер (уровень приоритета «10») и один резервный сервер (уровень приоритета «20»).

2. В этом примере показано, как настроить два основных и два резервных сервера.

Шаг 4. Создание пользователей

Есть пять удобных способов заполнения данных учетных записей пользователей:

Ввод данных вручную;

Пакетный импорт данных;

Синхронизация путем извлечения данных из каталога службы Active Directory - рекомендуется для организаций среднего размера;

Созданные пользователи будут автоматически получать ежедневные отчеты о нежелательных сообщениях, чтобы иметь возможность безопасно просматривать нежелательные сообщения, помещенные в карантин, без помощи ИТ-специалистов.

Для просмотра параметров создания пользователей перейдите на вкладке Setup (Настройка) по ссылке User Creation Settings (Параметры создания пользователей).

Обнаружение SMTP-сервером Этот метод создания пользователей используется по умолчанию. Он самый простой в управлении, так как учетные записи пользователей создаются автоматически по мере получения пользователями допустимых сообщений.

Ввод данных вручную Пользователей можно указать вручную. Для этого надо перейти на вкладку Account Management Users (Управление учетными записями Пользователи), щелкнуть кнопку New (Создать) на панели инструментов и выбрать режим Creation Mode: Individual (Режим создания: Индивидуальный). В этом режиме пользователи создаются по одному.

Совет. Чтобы добавить псевдоним из списка пользователей на вкладке Users (Пользователи), дважды щелкните пользователя и перейдите на вкладку Aliases (Псевдонимы).

Пакетный импорт данных Для пакетного импорта пользователей из файла выполните описанные выше действия, только выберите режим Creation Mode: Batch (Режим создания: Пакетный) вместо Individual (Индивидуальный), а затем щелкните кнопку Browse (Обзор) и укажите файл со списком пользователей. Подробные сведения об использовании этой функции, а также требования в отношении формата файла можно найти в интерактивном справочном руководстве по продукту.

Синхронизация путем извлечения данных из каталога службы Active Directory В этом режиме выполняется автоматический импорт данных о пользователях из каталога службы Active Directory без помощи какого-либо локального программного обеспечения. Для этого перейдите на вкладку Account Management Configuration (Управление учетными записями Конфигурация), щелкните ссылку Directory Integration (Интеграция каталога) и выберите их списка пункт Email Domain (Домен электронной почты). Подробные сведения о настройке синхронизации с извлечением данных из каталога службы Actide Directiry см. в интерактивном справочном руководстве.

Cинхронизация путем рассылки данных из каталога службы Active Directory Для реализации этого метода требуется наличие программного подключаемого модуля Directory Services Connector (разъем для служб каталогов) на основе ePolicy Orchestrator, однако, преимуществом метода является то, что так McAfee SaaS и каталог Active Directory находятся по разные стороны межсетевого экрана.

Чтобы воспользоваться этой функцией, перейдите на ту же вкладку, что и в предыдущем случае, но выберите Logical Structure: AD Domain (Логическая структура:

Домен Active Directory) в списке Logical Structure (Логическая структура). Подробное описание функции представлено в интерактивном справочном руководстве и в документе Directory Services Connector Getting Started Guide (Руководство по началу работы с Directory Services Connector), который можно загрузить в консоли управления (см. ниже).

Шаг 5. Настройка политик для входящих сообщений Используемые по умолчанию параметры политики для входящих сообщений на начальном этапе подойдут большинству организаций, при этом предоставляются широкие возможности индивидуальной настройки. Политика Default Inbound (Политика по умолчанию для входящих сообщений) применяется ко всем пользователям и группам пользователей, которым не назначена какая-либо другая политика. Вы можете создать дополнительные политики и назначить их доменам. Для этого перейдите на вкладку Policies Inbound Policies (Политики Политики для входящих сообщений) и щелкните кнопку New (Создать).

Каждому пользователю можно назначить одну политику. Если вследствие членства в различных группах пользователю назначено несколько политик, применяется политика с высшим уровнем приоритета. Для назначения группе определенной политики откройте необходимую политику и перейдите на вкладку Group Subscriptions (Подписки группы).

Уровни фильтрации нежелательных сообщений В остальных темах этого раздела рассматриваются функции политик для входящих сообщений, для просмотра которых необходимо дважды щелкнуть интересующую политику.

McAfee SaaS распределяет нежелательные сообщения по трем категориям, каждой из которых присуще то или иное последующее действие:

«Средняя степень вероятности»: действие по умолчанию - карантин «Высокая степень вероятности»: действие по умолчанию - отклонение «Серый спам»: действие по умолчанию - доставка Информационные бюллетени и рекламные материалы из источников с хорошей репутацией, получение которых изначально было желательным и на них была оформлена подписка, но которые со временем стали досаждать. Фильтры «серого спама»

предназначены для активного сокращения трафика именно таких сообщений. Настройка фильтра осуществляется путем добавления в список Sender Allow (Разрешенные отправители) на уровне политики или пользователя адресов отправителей «серого спама», который вы желаете получать. Вы можете заметить, что активация фильтра «серого спама» напоминает стандартный режим фильтра «серого спама», реализованный в Postini.

Конфигурация отчета о нежелательной почте для конечного пользователя Передача конечным пользователям права помещать нежелательную почту в карантин может помочь отделу ИТ сократить собственные затраты. Конечные пользователи взаимодействуют с McAfee SaaS посредством версии консоли Control Console для конечных пользователей и/или посредством писем с отчетами о нежелательной почте. McAfee SaaS упрощает доступ пользователей к консоли Control Console, предоставляя в тексте сообщений с отчетами ссылки для автоматического входа.

По умолчанию пользователи получают отчеты о нежелательной почте по утрам с понедельника по пятницу. Чтобы не засорять почтовый ящик, каждый отчет содержит только список новых сообщений, поступивших с момента формирования предыдущего отчета. Параметры отчета доступны на вкладке Reporting (Отчеты) в области Spam (Спам).

Возможно множество вариантов настройки отчетов о нежелательной почте. Вот лишь несколько примеров:

Время и периодичность доставки (до двух раз в день) Предоставление конечным пользователям права управления различными параметрами Точная настройка параметров ссылок в отчетах с учетом потребностей в быстром доступе к консоли Control Console с применением передовых методов защиты Настройка сообщения, отображающегося в начале письма с отчетом Понимание уровня взаимодействия с конечным пользователем Электронное сообщение с отчетом о нежелательной почте имеет четкую и рациональную структуру, позволяющую быстро и эффективно оценить содержимое карантина. В отчете содержатся ссылки на дальнейшие действия. Переход по ссылке инициирует выполнение выбранного действия в консоли Control Console посредством веб-браузера, установленного по умолчанию. Конечные пользователи не получают доступ к почте, заблокированной из-за наличия вирусов, вложений и на основании политик блокирования запрещенного содержимого.

Совет. Выбранное время доставки приблизительное и может варьироваться в пределах часа.

Любые действия, инициированные из сообщения с отчетом, выполняются в версии консоли Control Console для конечных пользователей, которая имеет ограниченные возможности по сравнению с версией для администратора. Характер работы в значительной степени зависит от конкретных настроек, выполненных на упомянутой выше вкладке Spam Reporting (Отчет о спаме).

Версия консоли Control Console для конечных пользователей позволяет, среди прочего, выполнять следующие действия:

Просматривать и переносить в другие папки нежелательную почту, находящуюся в карантине;

Просматривать и назначать псевдонимы;

Настраивать чувствительность фильтров нежелательной почты;

Настраивать списки отправителей Allowed (Разрешенные) и Blocked (Запрещенные);

Пользоваться личным архивом электронной почты (при наличии).

На вкладке Quarantine (Карантин) можно просматривать помещенные в карантин письма за последние 14 дней.

Списки «разрешенных» и «запрещенных» отправителей уровня политики Ваши списки «разрешенных» и «запрещенных» отправителей уровня политики могут содержать до 1 500 записей для каждой политики. Ограничения длины записи отсутствует. Списки можно заполнять такими данными, как доменные имена, адреса электронной почты, IP-адреса и диапазоны IP-адресов в формате CIDR (например, 192.168.1.0/24).

Совет. Список разрешенных пользователей дополнен функцией SPF Validation (Проверка SPF), которая по своим качествам превосходит функцию IP Lock (Блокировка IP-адреса) в Postini. При создании новой записи в списке разрешенных пользователей установите флажок Require SPF Validation (Требовать проверку SPF), чтобы предотвратить использование записи спамерами. В процессе проверки SPF система сверяет записи DNS SPF отправителя, чтобы убедиться в том, что электронное сообщение поступает с разрешенного IP-адреса. Благодаря этой функции вам не нужно знать, какие именно IP-адреса отправитель использует или будет использовать в будущем.

Проверка подлинности электронного сообщения На вкладке Email Authentication (Проверка подлинности электронной почты) представлено несколько механизмов оптимизации проверки подлинности с использованием передовых методов:

Принудительное использование протокола TLS Принудительное использование протокола SPF Принудительное использование протокола DKIM Например, функция принудительного использования протокола SPF дает возможность легко блокировать попытки фишинга, имитирующие поведение крупных финансовых организаций и предприятий розничной торговли, которые в последнее время активно используют протокол SPF.

Шаг 6. Настройка политик для исходящих сообщений Политики для исходящих сообщений похожи на политики для входящих сообщений, однако есть некоторые отличия, главное из которых - более детальная фильтрация содержимого и возможность использования шифрования в зависимости от содержимого. Эти функции зависят от конкретного пакета, поэтому, если они вас заинтересовали, вы можете обсудить это с торговым представителем по работе с клиентами.

Защита от утечки данных и содержимого

Наряду с базовыми возможностями фильтрации содержимого McAfee DLP предоставляет следующие функции:

Более 100 встроенных словарей для обеспечения нормативно-правового соответствия;

Способность обнаруживать содержимое с регулярными выражениями;

Технология Registered Documents, также известная как технология идентификации крупных объемов данных по их фрагментам, позволяющая «обучать» систему McAfee SaaS распознавать вложенные файлы с конфиденциальной информацией, даже если содержимое файлов было намеренно изменено;

Контроль содержимого вложений с поддержкой более 400 используемых коммерческих форматов файлов;

Автоматическое требование шифрования для сообщений, требующих выполнение правил обработки содержимого.

Обнаружение содержимого с регулярными выражениями Находясь на вкладке Outbound Policy (Политика для исходящих сообщений), перейдите на вкладку Content Custom Content Groups (Содержимое Настраиваемые группы содержимого) и установите флажок Enable regular expressions (Включить регулярные выражения). Введите в поле Content (Содержимое) строки регулярных выражений (по одному выражению в строке) и выберите в списке Action (Действие) пункт Encrypt (Шифровать).

Для тестирования регулярных выражений предусмотрено простое в использовании средство проверки - щелкните кнопку Launch Validator (Запустить проверку), расположенную в нижней части экрана.

Шифрование с использованием протокола Secure Web Delivery (SWD) McAfee SaaS SWD упрощает процесс шифрования, предоставляя возможность отправлять зашифрованные сообщения любым получателям без необходимости управления ключами и обмена сертификатами, а просто доставляя зашифрованные сообщения по протоколу S/MIME через защищенный веб-сайт McAfee.

Шифрование включается автоматически в следующих случаях:

Содержимоеисходящего сообщения подлежит шифрованию согласно правилу для исходящих сообщений с действием Encrypt (Шифрование);

Пользователь включил в тему или тело сообщения инструкцию «» (Шифрование);

Пользователь отправляет сообщение с помощь надстройки McAfee Send Encrypted для Microsoft Outlook.

Когда сторонний адресат получает от вашей организации первое зашифрованное сообщение через McAfee SaaS, он также получает сообщение с предложением создать учетную запись в системе McAfee SWD. Регистрация отнимает меньше минуты и требуется только один раз. После регистрации получатель может безопасно просматривать зашифрованные сообщения в консоли Control Console, использующей для защиты сеанса протокол SSL. Версия консоли Control Console с функцией шифрования обладает множеством возможностей и проста в использовании. Получатели могут даже отвечать первоначальному отправителю (вашему конечному пользователю) и, если McAfee может установить TLS-подключение к вашему серверу, ответ будет отправлен непосредственно в ящик входящей почты, что существенно упрощает процесс обмена сообщениями.

Шаг 7. Переключение входящей связи на новую систему Перед переключением входящей связи с Postini на McAfee SaaS убедитесь, что пространству IP-адресов McAfee разрешены подключения через межсетевой экран к инфраструктуре электронной почты по протоколу SMTP. Ваш межсетевой экран может быть настроен на ограничение входящих SMTP-подключений к пространству IP-адресов Postini в соответствии с их конфигурацией.

MX-записи и пространство IP-адресов Используемые в McAfee SaaS MX-записи и пространство IP-адресов можно просмотреть на вкладке Setup (Настройка), перейдя по ссылке MX Records Recommended MX Record Settings (MX-записи Рекомендуемые параметры MX-записей) и Locking Down [ваш домен] Mail Servers (Блокирование почтовых серверов [ваш_домен]).

Теперь вы готовы перейти на McAfee SaaS Email Protection, изменив MX-записи DNS вашего домена.

Шаг 8. Переключение исходящей связи на новую систему Чтобы система McAfee SaaS могла принимать исходящие сообщения из вашей сети, необходимо сначала указать для каждого вашего домена в области Outbound Servers (Серверы исходящей почты) вкладки Setup (Настройка) диапазоны IP-адресов, от которых вы будете принимать подключения. После ввода данных подождите 30 минут, чтобы изменения распространились и вступили в силу во всей сети McAfee. Затем можно настроить ретрансляцию почты на сервере исходящей почты или функцию smart hosting с использованием имени узла, указанного в нижней части экрана Outbound Servers (Серверы исходящей почты).

Для персональных компьютеров создано огромное количество антивирусных программ. Наибольшей популярностью пользуются те антивирусы, которые в первую очередь проверяют интернет-трафик. Ведь всем известно, что сейчас наибольшей угрозой обладает именно Интернет. Среди подобных программ можно отметить McAfee Internet Security 2013. Этот программный пакет борется со спамом, хакерскими атаками и загрузкой вредоносных утилит. А ещё здесь присутствует облачное хранилище и родительский контроль.

Данная программа наделена огромным функционалом. Это не только стандартная фоновая защита от вредоносного воздействия хакеров. Антивирус способен регулярно производить резервное копирование важных данных. Так сказать, на всякий случай. Но есть у данного программного пакета и один серьезный недостаток: он достаточно дорогой. За годовую лицензию на три компьютера разработчики просят 1450 рублей.

Как получить лицензию на год

К счастью, сейчас эту программу можно получить бесплатно. Однако для этого разработчикам следует отправить номер вашей банковской карты. Эта операция совершенно безопасна, номер будет храниться в базе компании McAfee и нигде больше.

Для начала нужно посетить страницу регистрации аккаунта McAfee. Создавайте новую учетную запись (Create Your Account ) , в ходе которой нужно указать номер банковской карты.

Оплата производиться не будет, так как стоимость McAfee Internet Security 2013 по акции составляет 0 долларов . Но не стоит забывать , что через год лицензию нужно будет приобретать платно. Если вы не хотите автоматического продления подписки , то пройдите по пути My Account / Auto-Renewal Settings . И здесь следует нажать кнопку Turn off .

Теперь осталось только установить программу, воспользовавшись данными зарегистрированного аккаунта.

If you"re a new user, complete our customer profile form below (all fields are required).

Once you have created an account, McAfee remembers your information to help simplify any future orders. Click the I Agree button below to create your account now and to continue with your order. You will have an opportunity to review and confirm your order before your credit card is processed.

Your password must be between 8 and 32 characters long and contain at least one lowercase letter (a-z), one uppercase letter (A-Z), and one number (0-9). Feel free to use special characters.

By clicking "I Agree" below, you are indicating that you have read and agree to the

Forgot Your Password?

Send us the email address you used to create your McAfee account so we can send you a link to reset your password.

*The password reset link will expire in 72 hours

Make sure McAfee is on your safe sender’s list; otherwise, emails from us may end up in your spam folder by mistake.

Account LockedUnlock your account

Your account has been locked to protect it from fraudulent activity. Please contact McAfee Customer Support to unlock your account.

Forgot Your Email Address?

If you have changed your email address since you originally registered your McAfee software, try logging in with your old email address. Otherwise, contact Customer Support to get further assistance.

New Email Address?

Please keep us informed. At McAfee your email address is required to get product updates, to check your account information, and to access certain sections of the Web site.

McAfee Privacy Notice

McAfee and its family of companies (“McAfee”, “we”, “us”) are wholly owned subsidiaries of Intel Incorporated. We care deeply about your privacy and security and your safety is a significant part of our essential mission. We appreciate your decision to trust us with helping to protect your digital life from theft, disruption, and unauthorized access to your personal information and systems.

This privacy notice is designed to inform you about how your personal information is collected, managed, and used to:

  • Safeguard devices and data
  • Manage our relationship with you
  • Improve security products and services to predict future vulnerabilities
  • Protect data

By collecting and processing data, we can help to predict threats and protect you, your devices and your information. McAfee is committed to becoming as transparent as possible to help you understand how your data is processed, why it takes data to protect data, and our commitment to using the personal data we collect for the purposes discussed in this Notice. Every time you turn on a device, connect to a network or open a file, you face significant risk from hackers, spammers, malware, spyware and other forms of unauthorized access to your data. This is why it is important to use security products and services such as McAfee’s.

To defend against these threats and the thousands of new threats that emerge each day, McAfee technologies may:

  • Analyze data sent to your devices for signs of risk or suspicious activity in order to take corrective action
  • Assess the reputation of the sending device to determine whether access should be allowed or if the transaction should be continued;
  • Adapt responses to new threats based on intelligence from our global network.

Please read about our privacy practices and let us know if you have any questions.

Scope

This Privacy Notice applies to personal information we obtain from individuals interacting with McAfee and its websites, products, services, and applications. This Notice does not apply to personal information we obtain in our capacity as an employer.

Notice

We provide access to our Privacy Notice by:

  • Linking to it throughout our websites
  • Referencing it in our terms of use and end user license agreements
  • Incorporating it into our contracts and other legal agreements as necessary
The Information we collect

McAfee collects some information that is personal (i.e., information that identifies an individual either alone or in combination with other data). McAfee also collects non-personal information that does not, on its own, identify an individual person. When non-personal information is combined with other information so that it does identify an individual person, we treat that combination as personally identifiable information.

McAfee collects personal information when you or someone acting on your behalf provides it to us. We also collect information when you obtain or use McAfee products, services or when you communicate with a device using McAfee’s services.

The following are examples of the type of personal information that may be collected, directly from you (or someone acting on your behalf)

  • Contact information (including name, email address, mailing address, telephone and fax number)
  • Payment information (including payment card and bank account information);
  • Shipping, billing and other information provided in connection with the purchase or shipment of McAfee products and services;
  • Information about transactions with us (such as purchase history) and use of our products and services;
  • Information provided by you through McAfee-related communication channels such as forums, technical support, and customer service;
  • Username, password and other information used to verify identity; and
  • Photographs or other biometrics when submitted

The following are examples of the type of information that may be collected by McAfee, from your web browser or from interactions with our products and services:

  • Details about your computers, devices, applications and networks (including IP address, browser characteristics, device ID and characteristics, device operating system information and system language preferences);
  • activities on our websites and usage patterns of products and services; referring URLs, dates and times of website visits, and clickstream data such as information commonly recorded in web server logs; and
  • details about Internet or network usage (such as the URLs or domain names of websites you visit, information about applications that attempt to access your network, or traffic data);
  • data about files and communications, such as potential malware or spam (which may include computer files, emails and attachments, email addresses, metadata and traffic data related to files and communications, or portions or hashes -- a hash file is a file that has been converted into a numerical string by a mathematical algorithm --of any of this information); this may include similar information from third parties interacting with you;
  • other information used in the operation of our products and services (such as information regarding the number of checked, suspicious, infected or unwanted files or emails; the number of malware infections); and
  • Information that may be included in a virus or malware sample or a file you consider to be suspicious that you submit to McAfee for review.
IP Addresses

An Internet Protocol address (IP address ) is a numerical label assigned to each device (e.g., computer, printer, server) participating in a computer network that uses the Internet Protocol for communication. It is how devices such as computers find each other on the network.

Where it is sometimes possible that IP addresses can be associated with a single individual’s system, they most often are associated with a group of systems, one system shared by many users or a gateway into a group of systems or devices. For instance, IP addresses included in an email communication are typically associated with the respective email service provider and not with your device.

McAfee security products and services, like those of many security companies, depend on IP addresses to protect your information, your devices and your privacy. For example, we may detect that a system or a group of systems associated with a particular IP address has been compromised and is sending malware or spam to some of our users.

Even without identifying who owns a compromised system or who compromised it, we can assign a score to that IP address to reflect the heightened threat it poses. Our products and services can then divert your traffic away from this IP address or block this IP address from sending malware to your McAfee-protected device before your device is a victim of an attack.

The use of IP addresses and other machine data is critical to the ability to keep security protections current, relevant and effective as cyber threats and attacks evolve over time.

McAfee protects the collection of IP addresses – regardless of whether they are associated with any particular individual’s system or a group of systems. We do not use IP addresses that our security tools gather for marketing purposes such as online behavioral advertising or to push marketing messages.

Cookies

McAfee uses “cookies” to remember user preferences and to maximize the performance of our website and services. Additionally, cookies help us to identify returning users so, for example, we don’t need to ask them to enter their email and password on every visit.

Please note the information gathered by cookies is necessary to provide some McAfee services, including certain subscriptions. We do not provide those services to users who do not give their consent to the data processing carried out through cookies or whose browsers are set to reject all cookies. For example, when you purchase a subscription to an online technology, a cookie is set that identifies the version of the protective software and when it expires. We use this information to alert you that a newer version is available or if your subscription is going to terminate and, thus, leave your system open to attack.

Cookies may also be used to control the type and/or frequency of ads, promotions, or other marketing messages the customer views. These ads may be placed by third-party advertising companies which are our vendors McAfee also uses “web beacons” (small transparent image files) to count visitors to our sites and analyze how visitors use our sites. The information collected is generally anonymized and is not used to identify any particular user.

As is common on the Internet, McAfee maintains log files of the traffic that visits our sites. For example, our servers may automatically record the information you or your browser send when you visit a website. These log files may include information such as your requests, IP address, browser type, browser language, the date and time of your request, and one or more cookies that may uniquely identify your system.

Use of the Personal Information we collect

McAfee uses the information it collects in ways that serve your security and privacy needs, including the following:

  • Provide threat prediction and protection products and services;
  • Provide security advisories, information and product updates;
  • Conduct research and analysis (for example, market and consumer research, security research and analysis, and trend analysis);
  • Analyze users’ behavior when using McAfee products and services to customize users’ preferences;
  • Establish and manage McAfee accounts;
  • Collect and process payments and complete transactions;
  • Provide customer support, manage subscriptions and respond to requests, questions and comments;
  • Communicate about, and administer participation in, special events, programs, surveys, contests, sweepstakes, and other offers and promotions;
  • Enable posting on our blogs and other communications;
  • Customize, measure, and improve our websites properties and advertising;
  • Analyze and develop new products, services and websites;
  • Perform accounting, auditing, billing, reconciliation and collection activities;
  • Prevent detect, identify, investigate, and protect against potential or actual claims, liabilities, prohibited behavior, and criminal activity;
  • Comply with and enforce applicable legal requirements, agreements and policies; and
  • Perform other activities consistent with this Notice.
Products and Services Data Processing

If you use one of our products or services, software will operate in the background of your computer system or device environment to perform specific security and privacy protections including:

  • Spam protection
  • Virus protection
  • Intrusion protection
  • Threat Prevention and Prediction
  • Home Network Defense
  • Data Encryption
  • Mobile Device Lockdown
Product Updating and Reporting

Our products and services may also process certain data to provide updates and reports. These update functions may check your system to see whether files relating to the services need to be refreshed or modernized.

For example, products and services may transmit report files to McAfee. These files contain information, including the number of checked, suspicious, infected or unwanted files or emails, the number of infections, the date and hash values of the detected infections and the number of false negatives/false positives. The purpose of these reports is to analyze the frequency of particular infections or the prevalence of threats. McAfee will also adapt the product where necessary to user preferences based on actual use of the product.

Personal Information We Share

We may share personal information with:

  • Other members of the McAfee family of companies for the purposes described in this Privacy Notice, such as to (i) provide services and joint content (such as registration, sales, and customer support); (ii) help detect and prevent potentially illegal acts and violations of our policies; and (iii) guide our decisions about our products, services and communications.
  • Service providers and authorized partners who perform services for us (such as data storage, sales, fraud investigations and bill collection) based on our instructions. These third parties are not authorized by us to use or disclose personal information except as necessary to perform services on our behalf or comply with legal requirements.
  • Third parties with your consent. For example, co-marketing with a business partner or sharing limited information as necessary with security research analysts;
  • Other business entities legally related to McAfee, such as our parent company, Intel, Inc. or any third party that may take over all or part of McAfee’s functions in the future (provided that such party agrees to use such personal information in a manner that is consistent with this Privacy Notice). Should a further combination occur, we will require that the new combined entity follow this Privacy Notice with respect to your personal information.

We may also disclose personal information (i) if we are required to do so by law or legal process ; (ii) in response to requests by government agencies, such as law enforcement authorities or other authorized third-parties; (iii) as may be required for purposes of national security; or (iv) when we believe disclosure is necessary and appropriate to prevent physical, financial or other harm, injury or loss or in connection with an investigation of suspected or actual illegal activity or exposure to legal liability.

McAfee will not disclose your personal information to non-affiliate third parties for their own marketing purposes unless you have provided consent.

McAfee family companies may share personal information with each other and use it in a manner that is consistent with this Notice. We may also combine it with other information to provide and improve our products, services, content and advertising.

Where we share this personal information with a third party with a contractual relationship with us (such as a provider of services to McAfee) these entities must comply with standards at least as stringent as McAfee’s processing standards and are limited to those standards unless you wish to create your own independent relationship with that provider.

California Shine the Light Law

McAfee does not share your personal information with third parties for their own marketing use without your permission.

Security

We use administrative, organizational, technical and physical safeguards to protect the personal information we maintain and ensure it is used according to this Notice. Our security controls are designed to restrict access to the information to authorized personnel only. We regularly test our website for security vulnerabilities. When you make a payment on our website using your credit card, we use SSL encryption in the transmission to McAfee of the credit card number. We require Service Providers maintain at least the same level of security we expect of ourselves.

McAfee complies with the Payment Card Industry Data Security Standard that requires merchants to implement security measures for credit card information.

How you can manage and control your personal information

We offer certain choices about how we communicate with our users and what personal information we obtain about them. Many McAfee products allow users to make choices about the personal information collected.

  • You may choose not to receive marketing email communications from us by clicking on the unsubscribe link or other instructions in our marketing emails, visiting the section on our website or contacting us as specified in the “ How to Contact Us” section below.
  • Many McAfee products contain settings that allow users or administrators to control how the products collect information. Please refer to the relevant product manual or contact us through the appropriate technical support channel for assistance.
  • To remove your personal information from a McAfee website testimonial, please contact customer service .

If you chose to no longer receive marketing information, McAfee may still legitimately communicate with you regarding such things as security updates, product functionality, responses to service requests or other transaction related communications.

How you can access and correct inaccuracies

If you wish to contact us in relation to any personal information you may request access to such information so that we can correct or amend the information by contacting us as indicated below. In certain circumstances we may be required to retain data we have about you (such as for tax or other business purposes or if required by law or by authorities).

Data Retention

The time periods for which we retain your personal information depend on the purposes for which we use it. McAfee will keep your personal information for as long as you are a registered subscriber or user of our products and, thereafter, for no longer than is reasonably necessary for internal reporting and reconciliation purposes pursuant to legal requirements and to provide you with any feedback or information you might request or require.

Storage of the information we collect from you

The information we collect may be stored in servers in the United States and wherever McAfee and its service providers have facilities, as well as your web browser (see section on cookies above).

Children’s Privacy

McAfee complies with the Children’s Online Privacy Protection Act of the United States of America where it applies to our information protection activities. McAfee does not knowingly collect personal information from children under the age of 13. If we learn we have collected personal information on a child under the age of 13 without proper consent, we will delete that data from our systems.

Data Transfer

We may transfer the personal information we obtain to countries other than the country in which the information originally was collected. Those countries may not have as comprehensive data protection laws as the country from which McAfee initially obtained the information. When we transfer the information to other countries, we will protect that information as described in this Privacy Notice.

If you are located in the European Economic Area or Switzerland, we comply with applicable legal requirements providing adequate protection for the transfer of personal information to countries outside of the EEA or Switzerland. McAfee is certified under the Safe Harbor privacy framework as set forth by the U.S. Department of Commerce, the European Commission and Switzerland regarding the collection, storage, use, transfer and other processing of personal data transferred from the European Economic Area or Switzerland to the U.S. Click to view our Safe Harbor Certification

Updating the Privacy Notice

We may update this Notice at any time by posting additions or modifications on this web page. If at any point we decide to use personal information in a manner materially different from that stated at the time it was collected, we will notify users by email or via a prominent notice on our website, and where necessary we will seek the prior consent of our users.

Links to Other Websites

Our websites may contain links to other websites for your convenience and information. These websites may be operated by companies not affiliated with McAfee. Linked websites may have their own privacy policies or notices, which we strongly suggest you review if you visit any linked websites. We are not responsible for the content of any websites that are not affiliated with McAfee, any use of those websites, or the privacy practices of those websites.

In certain circumstances, where the information of third parties is collected by us by virtue of the third-party’s interaction with you (such as the information of those individuals who send communications to your computer), we rely on you to provide the relevant third parties with any requisite notice and to obtain any requisite consent.

Your agreement to our Privacy Notice

You expressly consent to McAfee’s processing of information as described in this Privacy Notice when you:

  • Provide information to us through our websites;
  • Buy or license our products or services and accept the terms of user or end-user license; or
  • Sign a contract with McAfee for products and services.

In addition, through these uses and interactions with McAfee Products, Services or Websites, you specifically consent to our collection of personal information by automated means, such as cookies or the intended functionality of a product or service, and to our subsequent processing of the information in accordance with this Privacy Notice and to the storage and transfer of the information to locations wherever McAfee and its service providers have facilities.

Contact Us

If you have questions or concerns regarding this Privacy Notice, or would like to update information we have about you or your preferences, please contact us by:

  • Emailing the Privacy Program Office of McAfee, LLC at [email protected];
  • Calling us at 972-963-7902;
  • Writing to us at:
    Privacy Program Office - McAfee, LLC
    2821 Mission College Blvd.
    Santa Clara, CA 95054

If you do not receive a response, contact the Consumer Privacy Response Team of McAfee, LLC by emailing [email protected] or by writing to Consumer Privacy Response Team, 5000 Headquarters Drive, Plano, Texas 75024.

If you are located in the European Economic Area, please write to:

Privacy Program Office - McAfee Security S.A.R.L.
26, Boulevard Royal
2449 Luxembourg, Luxembourg

In addition to McAfee, LLC the McAfee entity with which you have a business relationship is responsible for ensuring your personal information is collected and processed according to this Notice.

For the U.S., Mexico, Central America, South America, and the Caribbean, this is: McAfee, LLC 2821 Mission College Blvd., Santa Clara, California 95054

For Canada, Europe, the Middle East, Africa, Asia, and the Pacific Rim, this is: McAfee Security S.A.R.L., 26, Boulevard Royal, 2449 Luxembourg, Luxembourg

For Japan, this is: McAfee Co., Ltd., Shibuya Mark City West Building 12-1, Dogenzaka 1-Chrome, Shibuya-ku, Tokyo 150-0043, Japan

Last Modified December 19, 2012.

To view previous version, click here.

End User License Agreement McAfee License Agreement

LAST UPDATED: January 8, 2019

Thank you for choosing McAfee.

This is an agreement ("Agreement") between you as an individual consumer or a small business entity ("you") and McAfee, LLC ("McAfee", "our", "we" or "us"), or depending on where you live or how you obtained the product or service, one of our affiliates listed further below. This Agreement sets out your rights and the conditions upon which you may use our software and services ("Software" or "Services"). You should read the document in its entirety, including any linked terms, because all the terms are important and together create this Agreement that applies to you.PLEASE PAY PARTICULAR ATTENTION TO THE BINDING ARBITRATION PROVISION AND CLASS ACTION WAIVER BELOW THAT AFFECT HOW DISPUTES ARE RESOLVED.

By clicking an acceptance button, indicating assent electronically, loading the Software or otherwise using the Software or Services, you agree to the terms and conditions of this Agreement. If you do not agree to the terms of this Agreement, do not install, access or use the Software or Services. If you have accepted multiple versions of the Agreement, the most current version that you accepted is the Agreement between you and us and supersedes and replaces all prior versions. To the extent any translated version of this Agreement conflicts with the English version, the English version controls..

This Agreement covers:

  • License Terms (Including Restrictions, Ownership, Changes, Termination and Privacy)
  • Payment & Support Terms (Including Automatic Renewal, Cancellation, Refunds, Support and Updates)
  • Terms Specific to Certain Products and Services (Including Free Products)
  • Terms Specific to Identity Protection Services
  • Binding Arbitration and Class Action Waiver
  • General Legal Terms (Including Limited Warranties, Disclaimer of Warranties, Limitation of Liability, Licensing Entities and Local Law Provisions)
  • McAfee Contact Information
  • License Grant For Personal Use. We are pleased to grant you, an individual consumer, a personal, non-transferable, nonexclusive term-limited license to install and use any Software and Services for which you have purchased a subscription for personal use on the number of devices and for the number of users specified in your License Entitlement or Service Entitlement, as applicable, subject to the System Requirements.

    "License Entitlement" means the number and type of devices and users that are permitted to use the Software, as specified in the documents that accompanied your purchase or download, which (depending upon the channel from which you purchased the license) may include: the checkout payment page, a product description page on our website, the email confirmation that we send for the purchase, the package if purchased at a retail store, or another document made available to you when you purchased the product. If no licensed device count or user count was specified, the License Entitlement is for a single device and user.

    "Service Entitlement" means the scope and duration of the Services you purchased, as specified in documents made available to you when you purchased the product. If no scope or duration is specified in the documents, the Service Entitlement is for a single device and user for one year.

    "System Requirements" means the supported devices and operating systems that the particular McAfee product will function properly with, as listed on our website . It is your responsibility to meet System Requirements, such as obtaining updates or upgrades in order to continue using the Software.

    License Grant for Small Business Use. This license permits use of the Software only by personnel employed by the licensed small business entity. Subject to the terms and conditions of this Agreement and subject to registration of the Software, we hereby grant to you a non-exclusive, non-transferable right to use the Software on the number of devices for which you have purchased subscription licenses as set forth in the documents that accompanied your purchase, provided that such use is only for the subscription term purchased by you, solely by personnel employed by you, and solely for internal business operations. (For the purpose of this Agreement, use of the Software means to access, install, download, copy or otherwise benefit from using the Software). You acknowledge that the Software and all related information are proprietary to us and our suppliers. You will be entitled to Updates which are made generally available by us for so long as you maintain your subscription. This license is revocable by us as provided in this Agreement.

    Your use of the Software is limited to devices and operating systems we support and may be affected by the performance and compatibility of your hardware, software and Internet access. Meeting system requirements is your responsibility and you are responsible for the cost of your equipment, which may include obtaining updates or upgrades from time to time in order to continue using the Software. System requirements are set forth on the product description page. (For purposes of this Agreement, product description page means either the webpage describing the product and/or the applicable product data sheet).

    You must register each license to the Software that you purchase. Registration is required in order to obtain technical support, in order to claim any included Virus Removal Service session per year of annual subscription per purchased license, and so that any licenses that you purchase in the future will have the same renewal date as your initially purchased licenses. Unused sessions do not roll-over to the next subscription year. It is your obligation to ensure that someone within your organization has access to your registration account and the email address identified in the account profile in order to obtain support from us and to receive the pro-rata rate on additional license purchases described below.

    If you purchase additional licenses of the Software which you registered to your account in the future and you use the email address identified in your account profile for the new purchases, the initial term of the additional licenses will be automatically reduced so that the renewal date is the same as the renewal date of the Software licenses you initially purchased. In that event, you will be charged a prorated subscription price based on a calendar day basis for the reduced initial term. If you do not register your initial licenses to your account, or you do not use the email associated with the account during checkout, you will receive no pro-rata pricing and the subscription term of such additional licenses will be the term that you purchased.

    If the Agreement terminates for any reason or expires, neither you nor any personnel employed by you will be authorized to use or access the Software, including any online storage or backup services, and we may cancel and/or close your account at our sole discretion. After the termination or expiration date, we will follow our standard policies to delete any of your online stored or backed-up information, text, files, links, images or other materials provided to us ("Content"). It is your responsibility to store or backup your Content elsewhere before this Agreement expires or is terminated. Use of Software, at any time, is governed by the terms of this Agreement.

    Restrictions. The Software and Services are licensed to you, not sold, and they are protected by U.S. and international laws and treaties. You do not have any right to reproduce or distribute the Software and Services without our permission, and if you do so you may be subject to fines or any other penalties allowed by the civil and criminal laws of the relevant jurisdiction. You may not: (i) reverse-engineer or otherwise try to derive source code from the Software and Services, unless allowed by law; (ii) adapt or modify the Software and Services or create derivative works based on the Software and Services; (iii) publish, copy (other than backup copies if permitted by your purchase documents), sell, lend, rent, sublicense, assign or in any other way transfer the Software and Services to anyone else; (iv) exploit the Software and Services for any commercial purposes (unless you are a small business, in which case the License Grant for Small Business Use above will apply); (v) attempt to circumvent technical protection measures in the Software and Services; (vi) use the Software and Services to violate the law; or (vii) engage in any activity that interferes with anyone else’s use of the Software and Services. If you have installed the Software and Services on a device and you transfer ownership of that device to someone else, you must ensure that any Software and Services are deleted from that device and that the device information is removed from your account with us. We have the right to terminate or suspend this Agreement, your account, and your access to the Software and Services if we determine that you have violated this Agreement. The Software and Services may contain enforcement technology that limits the size of content storage, bandwidth consumption, or the number of devices on which the Software and Services may be installed or that allows us to suspend your access to the Software and Services if you have violated this Agreement or if your License has expired or been terminated.

    Ownership. We, along with our suppliers and partners, retain ownership of our respective Software and Services and all rights related to the Software and Services, including all intellectual property rights. The only rights we grant you are those rights expressly stated in this Agreement. Also, if you provide us any comments, information, opinions, or suggestions on the Software and Services, you acknowledge and agree that we may use them without restriction, for any purpose and without compensation to you.

    The Software and Services may include: (A) free versions of the Software, including (i) any features included in a paid subscription for which we no longer charge or which we offer to you at no charge, and (ii) any feature that we give you on a trial, courtesy or evaluation basis or that is labeled as "Pre-Release," "Limited Release," "Beta" or otherwise described as experimental, untested, or not fully functional ("Free Software"); and (B) services that we provide without charge to you as a courtesy, which may be labeled similar to Free Software and may be experimental, untested or not fully functional ("Courtesy Services").

    Paid Subscriptions. Your right to use the software or services is effective for the length of time of the subscription term set forth in the documents that accompanied your purchase ("Subscription Term") and, where applicable, each subsequent renewal term unless terminated. If the documents that accompanied your purchase do not specify the length of time for which you can use the products or services, your Subscription Term is one year from the date that the Software or Services were purchased. Your renewal of the Subscription Term constitutes your acceptance of and agreement to the then-current version of the McAfee License Agreement.

    Free Software and Courtesy Services. Your right to use the McAfee Products or services is effective for as long as the Free Software is installed or we otherwise make the Free Software or Courtesy Services available to you and will remain subject to any limitations set forth in the documents that accompanied your download, as applicable.

    Changes to this Agreement. McAfee may need to update or change its terms and conditions over time. If you have a paid subscription, any new terms and conditions will apply when your subscription renews. If you do not agree to the new terms and conditions, then you must reject the changes by turning off auto renewal and uninstalling the Software and ceasing all use of any Software or Services at the end of the Subscription Term.

    For Free Software and Courtesy Services, you accept change(s) to this Agreement by continuing to use the Free Software or Courtesy Services. If you reject the updated Agreement, your license to the Free Software or Courtesy Services is terminated and you must cease all access to and use of the Courtesy Services or Free Software and uninstall the Free Software.

    Termination. We may terminate this Agreement if you fail to comply with the terms of this Agreement. You may terminate your right to use the software prior to its expiry by permanently erasing the Software and Services from your devices and canceling your account with us. Please refer to our Refund Policy to see if you are eligible for a refund prior to erasing your Software and Services. If this Agreement expires or is terminated, (i) you will no longer be authorized to use or access the Software and Services, including any online storage or backup services, (ii) you must permanently erase the Software and Services from your devices, and (iii) we may cancel or close your account. Upon termination or expiration, we will follow our standard policies to delete any of your online stored or backed-up information, text, files, links, images or other materials provided to us ("Content"). It is your responsibility to store or backup your Content elsewhere before this Agreement expires or is terminated.

    Privacy. For information on how we collect, use, and share your personal data through our website, products, services, and web-based mobile applications, please see our Privacy Notice .

    PAYMENT & SUPPORT TERMS

    PAYMENT AUTHORIZATION.

    YOU AGREE THAT WE OR OUR AUTHORIZED PARTNER MAY CHARGE THE CREDIT OR DEBIT CARD ACCOUNT OR OTHER PAYMENT DEVICE YOU PROVIDED FOR ALL AMOUNTS YOU OWE RELATED TO YOUR PURCHASE , INCLUDING ANY SUBSCRIPTION RENEWALS. YOU AGREE TO NOTIFY US PROMPTLY OF ANY CHANGE IN YOUR CARD ACCOUNT NUMBER OR EXPIRATION DATE OR OTHER PAYMENT INFORMATION. FOR CREDIT AND DEBIT CARDS, YOU AGREE THAT WE MAY UPDATE SUCH INFORMATION WITH UPDATES RECEIVED DIRECTLY OR INDIRECTLY FROM YOUR CARD ISSUER AND THE RELEVANT CARD NETWORK AND WE MAY USE THE UPDATED CARD INFORMATION TO CHARGE AMOUNTS YOU OWE US. THIS WILL SERVE AS YOUR CONSENT FOR YOUR CARD OR PAYMENT DEVICE TO BE CHARGED OR DEBITED.

    Automatic Renewal.

    You agree that your paid subscription will be automatically renewed. You authorize us or our authorized partner to charge your card or payment device on file within 30-days of your subscription expiration date, at the renewal term subscription price in effect at the time the renewal. The subscription price for your auto-renewal is subject to change. Your subscription renewal is ongoing and will continue until you cancel. If you would like additional information or to cancel your subscription or modify your auto-renewal settings, log onto your My Account page or contact Customer Support. Before your Subscription Term expires, we will send a notice to the e-mail address listed in your account profile, informing you of the upcoming renewal. Please note your automatic renewal may fail to process if you used a payment device other than a credit or debit card to purchase your subscription. If, at the time of renewal, your Software and Services have been renamed, upgraded or replaced by a new offering with reasonably comparable features, we may, at our discretion, automatically renew your subscription with the new offering for no more than the undiscounted subscription price of the new offering.

    ANY TIME AFTER PURCHASING A SUBSCRIPTION, YOU MAY TURN OFF AUTOMATIC RENEWAL BY ACCESSING YOUR ONLINE ACCOUNT PAGE OR CONTACTING CUSTOMER SERVICE. IF YOU DO NOT WISH TO BE AUTOMATICALLY RENEWED, YOU MUST TURN OFF AUTOMATIC RENEWAL MORE THAN 30 DAYS BEFORE YOUR SUBSCRIPTION TERM EXPIRES. IF YOU DO NOT TURN OFF AUTOMATIC RENEWAL, YOUR SUBSCRIPTION WILL CONTINUE FOR THE RENEWAL TERM UNDER THE AGREEMENT IN EFFECT AT THE TIME OF EACH RENEWAL UNLESS IT IS CANCELED BY YOU (OR TERMINATED BY US PURSUANT TO THIS AGREEMENT).

    TURNING OFF AUTOMATIC RENEWAL WILL DISCONTINUE ANY PREMIUM FEATURES AND SERVICES THAT WE OFFER EXCLUSIVELY TO SUBSCRIBERS WHO ARE ENROLLED IN AUTOMATIC RENEWAL AND HAVE PAID FOR THEIR SUBSCRIPTION.

    Data Charges. You are responsible for any charges incurred with your data- or mobile-service provider in connection with your use of the Software or Services, including any overage and penalties assessed for exceeding your data or minute allowance, or use of domestic or international short message service.

    Support and Updates. If your Software and Services qualify for technical support and you have a current paid subscription, you will receive technical support in accordance with our current standard-support offerings. Not all Software and Services qualify for technical support. Consult the documents that accompanied your purchase or terms of service, as applicable, for information regarding technical support and additional options. Our standard-support offerings, policies, and procedures may change from time to time and may vary by country. Any obligation we may have to support the previous version of the Software and Services ends when an upgrade, modified or later version, or other update to the Software and Services ("Update") becomes available. For your convenience and to ensure that the Software on your devices includes new features that we develop, by agreeing to this Agreement you give us permission to install Updates, and, at your request or with your consent, new Software on your devices automatically when available, to the extent that it is possible for us to run such background installations. We may also automatically pre-load Software, but will not activate such Software without your consent. Any Updates or technical support provided for Free Software is at our sole discretion and may be discontinued at any time.

    Product & Services Lifecycle. McAfee may, at its sole discretion, discontinue certain Software or Services or particular features of the Software or Services. "End of Sale" refers to the date when we no longer make a particular Software or Service available for purchase, renewal, or download. If a renewal term for your subscription would expire past the End of Sale date, you will not be able to renew your subscription. "End of Support" refers to the date when we no longer provide automatic fixes, Updates or technical support for particular Software or Services.

    TERMS SPECIFIC TO CERTAIN PRODUCTS AND SERVICES

    Services. In addition to this Agreement and applicable purchase documents, some Services that you purchase from us are subject to and governed by additional terms of service, which are posted on our website . Security Services must be updated to address new threats, to improve performance or efficiency, and for other business reasons. You acknowledge and agree that we may modify the features and functionality of the Services during the Subscription Term. Such modifications will not materially decrease the functionality of the Services. Some devices may not be able to receive the Services. To receive the Services, a high-speed Internet connection is required, and your device must meet the applicable System Requirements.

    Safe Family and Multi-User Products. If you are an adult, parent, or legal guardian, you may use the Software or Services to track and monitor only your own children, children for whom you are the legal guardian, or others for whom you have legal authorization to track and monitor. You are responsible for obtaining authorization from any third party to whom you extend access to multi-user Software or Services that track and monitor.

    Free Software. . If the Software and Services that you download or otherwise receive are Free Software, then this section of the Agreement will also apply. To the extent that any provision in this section is in conflict with any other term or condition in this Agreement, this section will supersede such other term(s) and condition(s) with respect to such Free Software, but only to the extent necessary to resolve the conflict. All Free Software is provided "as is", without any warranty (express or implied), indemnity, or maintenance or support obligations (express or implied), subject to any statutory rights that cannot be excluded or limited by law. You acknowledge that Free Software may contain bugs, errors and other problems that could cause system or other failures and data loss. You acknowledge that we have not promised or guaranteed to you that Free Software will be announced or made available to anyone in the future, that we have no express or implied obligation to you to announce or introduce Free Software, and that we are not obligated to introduce a product similar to or compatible with Free Software or any updates to any Free Software. Accordingly, you acknowledge that any use of the Free Software is entirely at your own risk.

    “Life of Your (Device)” Subscription. The McAfee "Life of Your (Device)" subscription can be applied to a single Windows PC or Android mobile device ("Your Device") if included in your purchase of Your Device, or on no more than three of Your Devices if you purchased the McAfee "Life of Your (Device)" subscription separately. Once properly installed onto Your Device, the McAfee "Life of Your (Device)" subscription will be active for the remainder of Your Device’s industry-standard useful life, and you are entitled to English-language telephone and web-based technical support during normal business hours for one year, and English-language web-based technical support, as long as the operating system currently installed on Your Device is not more than two versions older than the most-current version (for example, "Windows 10.x" or "Android 4.x"), for the industry-standard useful life of Your Device (industry standard useful life for a PC is 5-7 years, or 3 years for a tablet or smartphone). The McAfee "Life of Your (Device)" subscription is not transferable or movable to any other person, PC, or device in any event or under any circumstance. If you sell or otherwise transfer Your Device to another person prior to the end of Your Device’s useful life, your McAfee "Life of Your (Device)" subscription will void and terminate, and the subsequent owner of Your Device will not have the right to install, use, or possess the McAfee "Life of Your (Device)" subscription. Any attempt to transfer, move, or reinstall the McAfee "Life of Your (Device)" subscription on another PC or device, or to install the subscription on more than the original PC or device, or original three PCs or devices, as applicable, will terminate your right to install, use, or possess the McAfee "Life of Your (Device)" subscription. In order to stay current and receive support, you must update your McAfee "Life of Your (Device)" Software periodically and upgrade to the latest version of the same McAfee product level of software. If at any time, you decide to upgrade to a different product other than the McAfee "Life of Your (Device)" subscription, that product upgrade: (1) will be subject to payment of that product’s applicable fee; (2) will NOT be a "Life of Your (Device)" license; and (3) your subscription and license to McAfee "Life of Your (Device)" subscription will automatically terminate without notice or refund of money previously paid.

    Virus Removal, TechMaster Services or Virus Protection Pledge. If your subscription includes Virus Removal Service, TechMaster Service or is entitled to our Virus Protection Pledge or a similar services whereby we or one of our partners access your device to attempt removal of malware or perform other specified services, additional terms apply as may be specified in the documents that accompanied your purchase and the terms of service that is available on our website . We will make commercially reasonable efforts to perform malware removal Services. You understand and agree that not all malware can be removed through the Services and we do not guarantee that we can remove all malware from your device(s). To the extent permitted by applicable law, we will have no liability for loss of or recovery of data, software, or loss of use of system(s) or networks arising out of these Services or any act or omission, including negligence, by us or our representatives. If we work with you on any password or other access control issues, we strongly recommend that you reset such password(s) immediately following the completion of the Services. You agree that you are a legal license holder of the Software on your device and your use of the Internet is solely at your own risk. By electing to receive the Services, you confirm that you (i) have full access to your hardware and software for which you are purchasing the Service, and (ii) have completed a back-up onto separate media of any software or data on the hardware that may be impacted by the Services. The Virus Protection Pledge requires active enrollment in our auto-renewal service and is subject to additional terms and restrictions posted on our website .

    Password Management. You are responsible for the security of your password and for all aspects of keeping your account secure. You should keep your master password and encryption key for your account secure because without them you may lose access to your data. You are solely responsible and liable for any activity that occurs under your account, including by anyone who uses your account. If there is any unauthorized use or access to your account, you must let us know immediately. We are not responsible for any loss caused by unauthorized use of or access to your account; however, you may be liable for any losses we or others suffer because of the unauthorized use. WE DO NOT HAVE ACCESS TO MASTER PASSWORDS AND CANNOT RECOVER YOUR ENCRYPTED DATA IF YOU FORGET THE MASTER PASSWORD FOR ANY PASSWORD MANAGEMENT FEATURE OR SOFTWARE. We offer both free and premium versions of our password management Software. The free version limits the maximum number of unique accounts (such as a website or application login) that you can store. The premium version of the Software may be downloaded at no cost during a promotion, however, when the promotional period ends you will not be permitted to add any new unique accounts if you have exceeded the maximum number permitted by the free version. If you download any McAfee password management Software, that download will be subject to all subscription fees that are published in connection with that download, as well as the terms and conditions of this Agreement.

    WebAdvisor. McAfee WebAdvisor is Software (with a corresponding website) that provides users with information to guide users about certain risks that may be associated with a website. The WebAdvisor Software displays color-coded symbols next to links provided by major search engines, and the corresponding websites have dossier pages to provide information on the factors that affect site ratings. The ratings are primarily derived using automated methods; the WebAdvisor Software cannot detect or examine every possible aspect of website design, nor can it determine the intent of the site owner. We do not control or assume responsibility for the content of the third-party sites, and some of the third-party sites may have content that you find objectionable, inappropriate, or offensive. THE SITE RATINGS ARE NOT A GUARANTEE OF ANY PARTICULAR SITE’S SPECIFIC PRACTICES OR TRUSTWORTHINESS, AND IN NO CASE DO THE RATINGS REPRESENT AN ENDORSEMENT BY US OF THE SITE’S CONTENT, SUBJECT MATTER, OVERALL QUALITY, OR USEFULNESS.

    Monitoring of Service Sessions. We and our partners may, but have no obligation to, monitor and record Service sessions, including telephone calls and online sessions for purposes of improving customer service, internal training and internal market research. You hereby grant us permission to monitor and record the Services and to use or disclose any information as necessary or appropriate to satisfy any law, regulation or other governmental request; to provide the Services to you or other users and to enhance the types of Services we may provide to you in the future.

    TERMS SPECIFIC TO IDENTITY PROTECTION SERVICES.

    These terms only apply if you have enrolled in, are entitled to, or use our identity protection services from us or one of our trusted partners (these Services are sometimes referred to as the "Identity Protection Services"). Your entitlement under these Services may be specified in the documents that accompanied your purchase or enrollment and the additional product terms of service that apply and are available on our website

    Some features of the Identity Protection Services are only available to residents of the United States who possess a valid social security number. For a full list of eligibility requirements see . While enrolling for the Services, we will ask you for the following types of information: (i) contact information (such as name, address, phone number, and e-mail address); (ii) identity related information (such as date of birth, driver’s license number and social security number); and (iii) information to verify your identity and financial information (such as credit card number). This information is required in order to verify your identity, charge you the agreed-upon fees for our Services, and to fulfill our obligation to provide our Services to you, including monitoring your identity and communicating with third parties as necessary to provide such Services, such as, for example, identification verification companies, third party service providers, third party data suppliers, consumer reporting agencies, credit bureaus, payment validation companies, law enforcement agencies, or others. McAfee’s Privacy Notice outlines the manner in which we (or others acting on our behalf) collect, use, and share information about you in connection with your use of the Identity Protection Services, and it is your responsibility to review our Privacy Notice prior to agreeing to this License Agreement or before using our Services.

    You understand that by accepting this Agreement and using our Identity Protection Services, you are providing us and our employees, agents, subsidiaries, affiliates, contractors, third-party service providers and data providers, and all other credit reporting agencies under the Fair Credit Reporting Act ("FCRA"), as amended, including Experian, TransUnion, Equifax, and affiliated entities, written instructions (as described in these terms), consent and authorization to access and use consumer reports, including credit reports, about you (or about any children you have enrolled, if applicable) from each national credit or consumer reporting agency and to exchange information about you with third party data providers and each such national credit reporting agency in order to verify and monitor your identity and to provide the Identity Protection Services to you.

    Fair Credit Reporting Act in the USA. The Fair Credit Reporting Act allows you to obtain from each consumer reporting agency a disclosure of all the information in your consumer file at the time of the request. Full disclosure of information in your file at a consumer reporting agency must be obtained directly from such consumer reporting agency. The consumer reports provided by or requested from McAfee Identity Protection are not intended to constitute the disclosure of information by a consumer reporting agency as required by the FCRA or similar laws.

    Under the FCRA you are entitled to receive an annual free disclosure of your credit report from each of the national credit reporting agencies. You may request your free annual report under the FCRA, at www.annualcreditreport.com .

    You are also entitled to receive a free copy of your credit report from a consumer reporting agency if:

    You have been denied or were otherwise notified of an adverse action related to consumer, insurance, employment, or a government granted license or other government granted benefit within the past 60 days based on information in a consumer report provided by such agency.

    You have been denied house/apartment rental or were required to pay a higher deposit than usually required within the past 60 days based on information in a consumer report provided by such agency

    You certify in writing that you are unemployed and intend to apply for employment during the 60 day period beginning on the date on which you made such certification.

    You certify in writing that you are a recipient of public welfare assistance.

    You certify in writing that you have reason to believe that your file at such consumer reporting agency contains inaccurate information due to fraud.

    In addition, if you reside in the state of Colorado, Maine, Maryland, Massachusetts, New Jersey, or Vermont, you are entitled to receive a free copy of your consumer report once a year and if you reside in the state of Georgia, you are entitled to receive a free copy of your consumer report twice a year. For Illinois residents, consumer reporting agencies are required by law to give you a copy of your consumer record upon request at no charge or for a nominal fee. Otherwise, a consumer reporting agency may impose a reasonable charge for providing you with a copy of your consumer report.

    The Fair Consumer Reporting Act provides that you may dispute inaccurate or incomplete information in your consumer report. YOU ARE NOT REQUIRED TO PURCHASE YOUR CONSUMER REPORT FROM ANY OF THE CONSUMER REPORTING AGENCIES IN ORDER TO DISPUTE INACCURATE OR INCOMPLETE INFORMATION IN YOUR REPORT OR TO RECEIVE A COPY OF YOUR REPORT FROM EQUIFAX, EXPERIAN OR TRANSUNION, THE THREE NATIONAL CONSUMER REPORTING AGENCIES, OR FROM ANY OTHER CONSUMER REPORTING AGENCY.

    It may be the policies of Equifax, Experian and/or TransUnion to provide a complimentary copy of the consumer report under circumstances other than those described above. If you wish to contact Equifax, Experian or TransUnion to obtain a copy of your consumer report directly from such agency or if you wish to dispute information contained in an Equifax, Experian or TransUnion credit report file, please contact such entities as follows:

    Experian: 1-800-EXPERIAN (1-888-397-3742)

    Equifax: 1-800-685-1111

    Transunion: 1-800-916-8800

    For a full summary of your rights under the FCRA, click .

    Additional Disclaimers of Warranties and Limitation of Liability. Below are additional warranties and limitations of liability applicable to our Identity Protection Services:

    NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM US, OR THROUGH OR FROM THE SERVICES, WILL CREATE ANY WARRANTY NOT EXPRESSLY STATED IN THIS AGREEMENT. THE IDENTITY PROTECTION SERVICES ARE PROVIDED ON AN "AS IS" AND "AS AVAILABLE" BASIS. MCAFEE, LLC AND ITS THIRD PARTY SERVICE PROVIDERS AND THEIR DATA PROVIDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, WITH RESPECT TO THE SERVICES AND DISCLAIM ANY EXPRESS OR IMPLIED WARRANTIES WITH RESPECT THERETO. WITHOUT LIMITING THE FOREGOING, MCAFEE, LLC AND ITS THIRD PARTY SERVICE PROVIDERS AND THEIR DATA PROVIDERS DO NOT GUARANTEE OR WARRANT THE ACCURACY, TIMELINESS, COMPLETENESS, CURRENTNESS, MERCHANTABILITY, NON-INFRINGEMENT, OR FITNESS FOR A PARTICULAR PURPOSE OF THE IDENTIFY PROTECTION SERVICES AND WILL NOT BE LIABLE FOR ANY LOSS OR INJURY ARISING OUT OF OR CAUSED IN WHOLE OR IN PART BY USE OF THE IDENTITY PROTECTION SERVICES OR THE DATA THEREIN.

    We are not a credit repair organization, or similarly regulated organization under other applicable laws, and do not provide credit repair advice.

    Our credit monitoring offerings monitor only the credit file associated with the purchasing consumer, and do not monitor, compare or cross-reference the credit file associated with the purchasing consumer to any other credit file(s) maintained by the applicable credit bureau(s).

    We do not monitor all transactions at all businesses.

    Credit scores, reports, and credit monitoring may require an additional verification process and credit services will be withheld until such process is complete. A reduced service fee will be charged until you verify your identity.

    The Vantage Score credit scores are Vantage Score 3.0 credit scores based on data from Equifax, Experian and TransUnion respectively. Third parties may use a different Vantage Score or a different type of credit score to assess your creditworthiness.

    For the McAfee® Identity Theft ProtectionPlus and Premium services, credit monitoring by Experian and TransUnion may take several days to begin.

    You represent and warrant to us that you will use Identity Protection Services (and any of the information therein) to protect against or prevent actual fraud, unauthorized transactions, claims or other liabilities, and not for any other purpose.

    We are not responsible for delay or failure to perform due to causes beyond our reasonable control.

    A free subscription to Identity Protection Services is valid for one year from the date of sign-up.

    BINDING ARBITRATION AND CLASS ACTION WAIVER

    For all non-European Union customers.

    Agreement to Arbitrate Disputes. . Subject only to the Small Claims Court Option described below in this section, any claim, dispute or controversy of any kind, regardless of the type of claim or legal theory or remedy ("Claim") by either you or us against the other arising from, relating to or in any way concerning the Agreement, the Software, or Services shall be resolved by confidential binding arbitration. This agreement to arbitrate includes, but is not limited to: (i) Claims relating to the enforceability or interpretation of this Agreement, including any of these arbitration provisions; (ii) Claims by you, and also Claims made on your behalf or connected with you, such as an employee, representative, agent, predecessor, successor, heir, assignee, or trustee in bankruptcy; (iii) Claims that relate directly to us, and/or to our parent, affiliates, subsidiaries, successors, assignees, employees, and agents; and (iv) Claims that could have been asserted as part of a class action, private attorney general or other collective, consolidated, or representative action, it being expressly understood and agreed to that the arbitration of such claims must proceed solely on an individual (non-class and non-representative) basis and the arbitrator shall have the authority to award relief only on an individual (non-class and non-representative) basis. YOU AND WE AGREE THAT NO CLASS ACTION, COLLECTIVE ACTION, CONSOLIDATED ACTION, PRIVATE ATTORNEY GENERAL OR OTHER REPRESENTATIVE CLAIMS MAY BE PURSUED IN ARBITRATION, NOR MAY SUCH ACTIONS BE PURSUED IN COURT. BY ACCEPTING THIS ARBITRATION AGREEMENT, YOU AND WE AGREE TO WAIVE THE RIGHT TO INITIATE OR PARTICIPATE IN A CLASS ACTION, REPRESENTATIVE ACTION, PRIVATE ATTORNEY GENERAL ACTION OR COLLECTIVE OR CONSOLIDATED ACTION OF ANY KIND.

    Notice of Dispute. The party seeking arbitration must first notify the other party of the dispute in writing at least 60 days in advance of initiating arbitration. When sent to us, notice should be sent to McAfee, 5000 Headquarters Drive, Plano, TX 75024, Attention: Legal Department. The notice must include your name, address, and contact information, the facts giving rise to the dispute, and the relief requested. You and we will use reasonable efforts to resolve any dispute through informal negotiation within 60 days from the date the notice of dispute is sent. After 60 days, you or we may commence arbitration. Notwithstanding these notice obligations, any demand for arbitration must be made by you or us within the statute of limitations that is applicable to the Claim(s) upon which arbitration is sought or required. These notice obligations do not modify the statute of limitations that is applicable to any Claim(s).

    Administration of Arbitration. If any dispute is not resolved by informal negotiation, any claim, dispute, or controversy will be, at the demand of either party, conducted exclusively by binding arbitration governed by the Federal Arbitration Act ("FAA"), and not state law. Subject only to the Small Claims Court Option for individual consumers described below, YOU AND WE ARE GIVING UP THE RIGHT TO LITIGATE (OR PARTICIPATE IN AS A PARTY OR CLASS MEMBER) ALL DISPUTES IN COURT BEFORE A JUDGE OR JURY . Instead, all disputes will be resolved on an individual basis before a single, neutral arbitrator and the proceeding will be confidential. The arbitrator will be either a lawyer admitted to practice law in his or her jurisdiction and with at least ten years’ experience or a retired or former judge selected in accordance with the rules of the AAA. The arbitrator is bound by the terms of this Agreement, and the arbitration will be governed by the Commercial Arbitration Rules or Consumer Arbitration Rules of the AAA, as applicable, as modified by this Agreement (the "Arbitration Rules"). For more information, see adr.org or call 1-800-778-7879. Except with respect to any claims or counterclaims seeking less than $25,000, the arbitrator will issue a reasoned, written decision sufficient to explain the essential findings and conclusions on which the award is based. All arbitration proceedings will be conducted in English, and the United States FAA will govern the interpretation, enforcement, and proceedings pursuant to the binding arbitration clause in this Agreement. The award will be confidential and only disclosed as is necessary to obtain judgment or as otherwise required by law. You and we further agree that a judgment may be entered upon the award by any court having jurisdiction. The arbitration award will determine the rights and obligations between the named parties only, and only in respect to the claims in arbitration, and will not have any bearing on the rights and obligations of any other dispute.

    Costs. The party initiating the arbitration will pay the initial filing fee. If you file the arbitration and an award is rendered in your favor, we will reimburse your filing fee. We will pay the fees and costs for the first day of any hearing. All other fees and costs will be allocated in accordance with the arbitration rules. However, we will advance or reimburse filing and other fees if the arbitrator rules that you cannot afford to pay them or if you ask us and we determine there is a good reason for doing so. Each party will bear the expense of their respective attorneys, experts, and witnesses and other expenses, regardless of who prevails, but a party may recover any or all expenses from another party if the arbitrator, applying applicable law, so determines.

    Small Claims Court Option. If you are an individual consumer, you may choose to sue us in small claims court in your county of residence or in Santa Clara County, California if you meet the court’s requirements.

    Right to Resort to Provisional Remedies Preserved by McAfee. Nothing herein will be deemed to limit or constrain our right to resort to self-help remedies or to comply with legal process, or to obtain provisional remedies such as injunctive relief, attachment, or garnishment by a court having appropriate jurisdiction; provided, however, that we may elect to arbitrate any dispute related to such provisional remedies.

    Conflicting Terms. In the event of a conflict between the Arbitration Rules and this arbitration agreement, this arbitration agreement will govern. If any portion of this arbitration agreement is deemed invalid or unenforceable, it will not invalidate the other provisions of the arbitration agreement; provided, however, that (a) if the prohibition on class-wide arbitration is deemed invalid, then this entire arbitration agreement will be null and void; and (b) if the prohibition on arbitration of representative claims brought in a private attorney general capacity is deemed invalid, then the arbitration agreement will be null and void as to such claims only. This arbitration agreement will survive the termination or cancellation of this Agreement. In the event of a conflict between this arbitration agreement and any other applicable arbitration provision, this arbitration agreement will control.

    WAIVER OF JURY TRIAL. IF FOR ANY REASON A CLAIM PROCEEDS IN COURT RATHER THAN THROUGH ARBITRATION, YOU AND WE AGREE THAT THERE WILL NOT BE A JURY TRIAL. YOU AND WE UNCONDITIONALLY WAIVE ANY RIGHT TO TRIAL BY JURY IN ANY DISPUTE THAT IN ANY WAY RELATES TO OR ARISES OUT OF THE AGREEMENT OR FROM ANY SOFTWARE OR SERVICES. IN THE EVENT OF LITIGATION, THIS PARAGRAPH MAY BE FILED TO SHOW A WRITTEN CONSENT TO A TRIAL BY THE COURT. This paragraph in no way invalidates the Agreement to Arbitrate Disputes.

    For European Union Customers – Online Dispute Resolution Service ("ODR") & Alternative Dispute Resolution ("ADR"). We are required by law to provide a link from our website to the EU ODR Platform: https://ec.europa.eu/info/live-work-travel-eu/consumers/resolve-your-consumer-complaint. We are not obligated to use ADR should you have a complaint with us. If you do have a complaint with us which we cannot resolve using our internal complaints handling procedures, we will contact you by letter or email about whether we are prepared to submit to ADR. You may contact us through our website.

    GENERAL LEGAL TERMS

    Law Covering This Agreement. Except as provided in the Local Law Section below, this Agreement, the use of the Software and Services, the relationship of the parties, and any disputes arising out of, concerning, or relating to the Agreement, including any disputes between you and us, will be governed by and construed in accordance with the laws of the state of New York, excluding its conflict of law principles, except that the FAA governs all provisions relating to arbitration. If for any reason, the laws of the state of New York are found not to apply, then, except as provided in the Local Law Section below, this Agreement, the use of the Software, Services, the relationship of the parties, and any disputes arising out of, concerning, or relating to the Agreement, including any disputes between you and us, will be governed by and construed in accordance with the laws of the state of Delaware, excluding its conflict of law principles, except that the FAA governs all provisions relating to arbitration. The United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transactions Act do not apply to the Software or Services

    Attacks on Data. You acknowledge that some security breaches involve attacks on data. For example, there are viruses and other malware that: (i) delete or destroy your data (sometimes individual files, but sometimes even an entire disk by corrupting a master boot record or other key element); (ii) modify your files (such as parasitic malware that attaches itself to a file and modifies the file to enable its own execution and/or propagation); and (iii) encrypt files on your drive (such as ransomware that uses asymmetric encryption). The best way for you to protect yourself from these types of attacks is frequent back-ups of your data to another device or location. That way, you have another copy of the data that the attacking software has deleted, modified, or destroyed. While we will use commercially reasonable efforts to remove the attacking malware or virus, it is your sole and exclusive responsibility to back-up all data and files on your device so that they can be restored in the event of an attack on your data. Without such a back-up, it may not be possible to restore the deleted, destroyed, or modified data. We will have no liability for loss of or recovery of data, or files or loss of use of systems or networks arising from attacks on data.

    Limited Warranty. For 30 days after the purchase date ("Warranty Period"), for paid versions of the Software only, we warrant that the Software licensed under this Agreement (including updates provided during the Warranty Period but not for updates provided outside of the Warranty Period) will perform substantially in accordance with the documentation provided by us in connection with that Software at the time of purchase, and that any tangible medium (such as a CD-ROM, but excluding devices manufactured by other companies) on which the Software is contained and provided to you will be free from defects in materials and workmanship. We do not warrant or guarantee that any particular mobile device or computer will be compatible with or function with the Software or Service, nor do we warrant or accept any liability for the operation of your personal equipment that is used to access the Software or Service. Your sole remedy, and our and our suppliers’ entire liability, in case of any breach of this limited warranty is that we will, at our option, refund the price you paid for the license, replace the defective medium that contains the Software, re-perform the Service, or provide an alternative remedy as required by local consumer law in your jurisdiction. These remedies may not be available in some countries to the extent that we are subject to restrictions under applicable export-control laws and regulations. If the tangible medium is defective, you must return it at your expense to the place where you bought it and provide a copy of your receipt. Any replacement medium will be warranted for the remainder of the original Warranty Period.

    DISCLAIMER. THE ABOVE WARRANTIES ARE YOUR EXCLUSIVE WARRANTIES. THEY REPLACE ALL OTHER WARRANTIES, REPRESENTATIONS, TERMS OR CONDITIONS, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OR CONDITIONS OF MERCHANTABILITY, PERFORMANCE, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT. EXCEPT FOR THE LIMITED WARRANTY IN THIS SECTION, THE SOFTWARE AND SERVICES ARE PROVIDED "AS IS". YOU ARE RESPONSIBLE FOR SELECTING THE SOFTWARE AND SERVICES TO ACHIEVE YOUR INTENDED RESULTS, FOR INSTALLING AND USING THE SOFTWARE OR SERVICE, AND FOR THE RESULTS OBTAINED. WE DO NOT WARRANT OR GUARANTEE THE SOFTWARE’S OR SERVICE’S USE OR PERFORMANCE. WE DO NOT WARRANT OR GUARANTEE THAT THE SOFTWARE’S OR SERVICE’S OPERATION WILL BE FAILSAFE, UNINTERRUPTED, OR FREE FROM ERRORS OR DEFECTS, OR THAT THE SOFTWARE OR SERVICES WILL PROTECT AGAINST ALL POSSIBLE SECURITY THREATS (INCLUDING INTENTIONAL MISCONDUCT BY THIRD PARTIES), THAT THERE WILL BE NO MALFUNCTIONS OR OTHER ERRORS IN THE SOFTWARE OR SERVICES CAUSED BY VIRUS, INFECTION, WORM OR SIMILAR MALICIOUS CODE NOT INTRODUCED OR DEVELOPED BY US, OR THAT THE SOFTWARE OR SERVICES WILL MEET YOUR REQUIREMENTS. WE ARE NOT LIABLE FOR ANY DOWNTIME OR SERVICE INTERRUPTION, FOR ANY LOST OR STOLEN DATA OR SYSTEMS, OR FOR ANY OTHER DAMAGES ARISING OUT OF OR RELATING TO ANY ACTIONS OR INTRUSIONS.

    High Risk Activities. The Software and Services are not fault-tolerant and are not designed or intended for high-risk activities such as use in hazardous environments requiring failsafe performance, including nuclear-facilities operations, air traffic communication systems, weapons systems, direct life-support machines, or any other application in which the failure of the Software or Services could lead directly to death, personal injury, or severe physical or property damage. We expressly disclaim any express or implied warranty of fitness for high-risk activities.

    Limitation of Liability. UNDER NO CIRCUMSTANCES ARE WE OR OUR SUPPLIERS, LICENSORS OR OTHER THIRD-PARTY SERVICE PROVIDERS LIABLE TO YOU FOR ANY: (I) INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES; (II) THEFT OF PERSONALLY IDENTIFIABLE INFORMATION OR COST OF PROCURING SUBSTITUTE SOFTWARE OR SERVICES, AND (III) DAMAGES FOR LOSS OF PROFITS, LOSS OF GOODWILL, LOSS OF PERSONNEL SALARIES, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, LOSS OF DATA, OR NEGLIGENCE OF ANY KIND, OR FOR ANY OTHER INDIRECT DAMAGE OR LOSS. IN NO EVENT WILL OUR, OUR AFFILIATES’ OR OUR SUPPLIERS’, LICENSORS’ OR OTHER THIRD-PARTY SERVICE PROVIDERS’ AGGREGATE LIABILITY TO YOU FOR DIRECT DAMAGES UNDER THIS AGREEMENT EXCEED THE PRICE YOU PAID FOR THE APPLICABLE SOFTWARE, OR USD $100 (OR THE EQUIVALENT AMOUNT IN NATIONAL CURRENCY) IF YOU USED FREE SOFTWARE. You agree to the limitations of liability in this Section and acknowledge that without your agreement to this term, the fee charged for the Software would be higher. Nothing in this Agreement limits any rights you may have under existing consumer-protection statutes or other applicable laws that may not be waived by contract in your jurisdiction.

    Export Control. The Software is subject to export controls under the U.S. Export Administration Regulations ("EAR") and implementing regulations. You agree that you will not directly or indirectly export, transmit, permit access or use the Software or Services and its related documentation, including technical data, in any country to which export, transmission or access is restricted by regulation, statute, or other law, without any required authorization of the Bureau of Industry and Security of the U.S. Department of Commerce or any other governmental entity that may have jurisdiction over export or transmission. Export to a particular individual, entity, or country may be prohibited by law. If McAfee receives notice that a user is or becomes identified as a sanctioned or restricted party under applicable law, McAfee will not be obligated to perform any of its obligations under this Agreement if such performance would result in violation of the sanctions or restrictions. Additional Information about restricted parties can be found at the following websites: Consolidated Screening List and OFAC Sanctions Programs . Additional information regarding exporting and importing McAfee Products may be found on the McAfee "Export Compliance" webpage, https://www.mcafee.com/enterprise/en-us/about/export-compliance.html , as updated from time to time.

    Third Party Programs. Some third-party materials included with the Software or Services may be subject to other terms and conditions, which are typically found in a "Read Me" or an "About" file accompanying the Software or Services. Those third-party materials may include software source code licensed by third parties under one or more open-source or free-software licenses, including the GNU General Public License, which are considered "Open Source Software." The Open Source Software is licensed under terms and conditions different from this Agreement and may, in some cases, conflict with the terms of this Agreement and will apply instead of the terms of this Agreement. If an Open Source Software license requires us to distribute any source code related to the Software or Services or any modifications to the Software or Services, we will make the source code available on request.

    No Waiver. We do not waive any provision of this Agreement unless we waive it in a signed writing.

    Severability. If any part of this Agreement is for any reason held to be unenforceable, that part is, to that extent, deemed omitted, and the rest of it remains fully enforceable; PROVIDED HOWEVER, THAT THE ARBITRATION AGREEMENT WILL NOT APPLY TO ANY CLAIMS AS TO WHICH THE LIMITATIONS ON CLASS ACTIONS OR CONSOLIDATED ARBITRATION ARE NOT PERMITTED BY APPLICABLE LAW.

    Complete Agreement. This Agreement constitutes the entire agreement between you and us and governs your use of the Software and Services acquired hereunder. This Agreement supersedes any prior agreements between you and us in relation to the Software and any Services, and any other communications, representations, or advertising relating to the Software or Services.

    Licensing Entities. The Software and Services are licensed to you by one of these legal entities:

    McAfee, LLC, a Delaware limited liability company, with offices located at 2821 Mission College Blvd., Santa Clara, California 95054, USA, if the Software is downloaded in the United States, Mexico, Central America, South America, or the Caribbean;

    McAfee Consumer Affairs North, LLC, a Delaware limited liability company, with offices located at 2821 Mission College Blvd., Santa Clara, California 95054, USA, if the Software is downloaded in Canada;

    McAfee Ireland Limited, with offices located at Building 2000 City Gate, Mahon, Cork, Ireland if the Software is downloaded in Europe, the Middle East, Africa, the Pacific Rim, or Australia; or

    McAfee Co., Ltd. with offices located at Shibuya Mark City West Building 12-1, Dougenzaka 1-Chome, Shibuya-ku, Tokyo 150-0043, Japan, if the Software is downloaded in Japan.

    Local Law. The subsections below contain information regarding the local laws of certain jurisdictions that will apply to this Agreement and may supersede certain provisions as referenced herein.

    Australia. For consumers in Australia:

    The benefits to you under the limited warranties are in addition to other rights and remedies you may have under a law in relation to the goods or services to which the warranty relates. Our goods come with guarantees that cannot be excluded under Schedule 2 of the Competition and Consumer Act 2010 (Cth) ("Australian Consumer Law"). You are entitled to a replacement or refund for a major failure and compensation for any other reasonably foreseeable loss or damage. You are also entitled to have the goods repaired or replaced if the goods fail to be of acceptable quality and the failure does not amount to a major failure. This warranty is made by McAfee Ireland Limited, with offices located at Building 2000 City Gate, Mahon, Cork, Ireland, but you may call 1800 998 887 with questions regarding our warranty for Australian customers. Any claims made under this warranty must be sent, at your expense, to the following address:

    Legal Department
    McAfee Australia Pty Ltd
    Level 20
    201 Miller Street
    North Sydney NSW 2060

    For customers located in Australia, if a tangible medium on which Software was delivered is defective, you must return the defective medium to us at your expense, with a copy of your receipt, within 14 days of discovering the defect. We will notify you of receipt within 14 days of receiving it.

    THE DISCLAIMERS IN THIS SECTION DO NOT APPLY TO YOU TO THE EXTENT THAT AUSTRALIAN LAW DOES NOT ALLOW THE EXCLUSION OR LIMITATION OF ANY APPLICABLE STATUTORY GUARANTEES, EXPRESS OR IMPLIED WARRANTIES, CONDITIONS, REPRESENTATIONS OR TERMS. IN THAT CASE, THE EXPRESS OR IMPLIED WARRANTIES ARE LIMITED TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW.

    THE LIMITATIONS ON LIABILITY SET FORTH IN THIS SECTION DO NOT APPLY TO CONSUMERS IN AUSTRALIA.

    NOTHING IN THIS AGREEMENT LIMITS ANY RIGHTS YOU MAY HAVE UNDER EXISTING CONSUMER-PROTECTION STATUTES OR OTHER APPLICABLE LAWS, INCLUDING AUSTRALIAN CONSUMER LAW, THAT MAY NOT BE WAIVED BY CONTRACT IN YOUR JURISDICTION.

    Canada. If you acquired the Software or Services in Canada, unless expressly prohibited by local law, then this Agreement, the use of the Software and Services, the relationship of the parties, and any disputes arising out of, concerning, or relating to the Agreement, including any disputes between you and us, will be governed by and construed in accordance with the laws in force in the Province of Ontario, Canada.

    If you acquired the Software or Services in the European Union, Iceland, Norway, or Switzerland, then national law of the country where you downloaded the Software applies.

    Japan. If you acquired the Software or Services in Japan, then this Agreement, the use of the Software and Services, the relationship of the parties, and any disputes arising out of, concerning, or relating to the Agreement, including any disputes between you and us, will be governed by and construed in accordance with Japanese law without regard to its choice-of-law rules.

    Netherlands. For customers in the Netherlands, any automatic renewal of your original subscription will be for an indefinite term, billed in accordance with the terms of your subscription. You may terminate your renewed subscription any time after renewal by contacting Customer Service and providing at least 30 days’ notice of your intent to terminate and we will provide a prorated refund in accordance with local law. If you do not want your subscription to renew automatically you must turn off auto-renewal in your account settings 30 days before the expiration of your initial subscription.

    MCAFEE CONTACT INFORMATION

  • Customer Service & Technical Support: https://service.mcafee.com
  • Attn: McAfee Legal Department

    5000 Headquarters Drive

    Plano, Texas 75024

    MFECONSUMER.EULA.2019.01.08.GENERAL

  • I Agree I Disagree

    (79,99 долларов в год) позволяет устанавливать антивирусное ПО на каждый компьютер на Windows и Mac и на Android-смарфтон. Это очень выгодное предложение на рынке!

    Официальные ограничения на количество подключаемых устройств отсутствуют, но McAfee оставляет за собой право отслеживать возможные злоупотребления подпиской. Если Вы решили, что ваше домашнее хозяйство включает 50 различных устройств, которые принадлежат многочисленным внучатым племянникам, вероятно, представители вендора отправят вежливое замечание, что Вы зашли слишком далеко.

    Добавление устройств

    Во-первых, пользователю нужно настроить учетную запись LiveSafe либо с помощью онлайн заказа, либо погашая ключ, полученный в розничной торговой точке. Если у Вас нет аккаунта McAfee, Вы сможете создать его за считанные минуты. Владельцам учетных записей будет предложено авторизоваться. Наконец, Вы устанавливаете McAfee на устройство, которое используется в данный момент. Для установки продукта на другое устройство нужно отправить письмо, содержащий ссылку на файл загрузки, и открыть эту ссылку на защищаемом девайсе. В скачиваемый дистрибутив уже зашит ваш уникальный лицензионный ключ, поэтому при установке ничего вводить не требуется. Norton Security от Symantec и F-Secure SAFE имеют аналогичную механику установки.

    Доступные для установки решения зависят от типа используемой платформы. Для Windows и Mac пользователи могут установить комплексный антивирус McAfee, а также менеджер паролей McAfee SafeKey. Вы можете устанавливать мобильный антивирус McAfee на смартфоны под управлением Android и iOS (версия для iOS ограничена), усилив защиту SafeKey и защищенным облачным пространством Personal Lock. McAfee имеет мобильную версию антивируса для смартфонов BlackBerry. На планшетах Kindle Fire пользователи могут устанавливать мобильный антивирус и менеджер паролей SafeKey.

    Защита ПК

    На компьютеры Windows пользователи McAfee LiveSafe 2015 могут установить LiveSafe Internet Security, который является эквивалентом McAfee Internet Security 2015 (49,99 долларов в год). Единственным отличием версии LiveSafe является отсутствие инструмента резервного копирования на базе Mozy. Это не является большой проблемой, ведь практически идентичный функционал Вы сможете получить в бесплатной версии Mozy, скачанной с официального сайта системы. По итогам тестирования PC Magazine комплексный антивирус McAfee не получил звание “Выбор редакции”, но он неплохо справляется с основными задачами защиты.

    В целом, независимые антивирусные лаборатории присваивают McAfee очень хорошие рейтинги, и продукт показал наивысший результат в собственном тесте на блокировку вредоносных программ. McAfee, Norton и смогли заработать 10 баллов из 10 возможных каждый при противостоянии текущей коллекции вредоносных образцов.

    Спам-фильтр McAfee подтвердил высокую эффективность в тестировании, и он имеет необычную способность блокировать спам в аккаунтах почтовых сервисов. Фаервол показал достойную защиту, но он лишен расширенных функций, которые можно найти у конкурентов, например в Norton или Kaspersky Internet Security. Защита от фишинга в McAfee является более надежной, чем у большинства протестированных решений. Родительский контроль позволяет решать только базовые задачи: фильтрацию контента и планирование использования Интернета.

    Сервис веб-репутации SiteAdvisor помечает ссылки в результатах поисковой выдачи специальными иконками, которые сигнализируют о степени опасности. Другие полезные функции включают защищенное удаление конфиденциальных файлов, сканер уязвимостей с автоматической установкой недостающих обновлений и инструмент для удаления следов посещения в браузере и очистки мусорных системных файлов.

    Защита компьютеров Mac

    McAfee LiveSafe Internet Security является переименованной версией McAfee Internet Security для Mac.

    McAfee защищает компьютеры Apple от различных видов угроз, включая вирусы, трояны, сетевые черви, боты и руткиты. Антивирус сканирует все загрузки и файлы, передаваемые с помощью электронной почты или клиентов мгновенного обмена сообщениями. Кроме того, продукт предлагает проверять каждый подключаемый переносной накопитель.

    Пользователи Mac-версии также получают полнофункциональную систему веб-репутации SiteAdvisor, которая умеет гораздо больше, чем просто идентифицировать потенциальную опасность ссылок. В Mac данный инструмент помечает ссылки в социальных сетях и может быть настроен на блокировку сайтов, которые помечены как небезопасные. Похожую функцию SiteAdvisor LIVE можно встретить также в McAfee Total Protection 2015 . Браузерный плагин McAfee поддерживает только Safari и Firefox, интеграция в Chrome на данный момент отсутствует.

    Инструмент NetGuard защищает компьютеры Mac от подключения к подозрительным серверам, ботнетам и другим опасным ресурсам. Встроенная функция программного контроля точно определяет, какие виды сетевой активности нужно разрешить для каждой программы. Mac-версия антивируса не имеет спам-фильтра и родительского контроля, а потому является более ограниченной, чем версия для Windows-устройств.

    Расширенная защита Android

    Мобильный антивирус McAfee LiveSafe для Android под названием McAfee Mobile Security претерпел значительные изменения с момента последнего обзора PC Magazine. Приложение сканирует устройство на предмет вредоносного кода, а также проверяет новые приложения при их установке. При обнаружении потенциально опасного приложения McAfee LiveSafe для Android предоставляет подробную информацию о возможной угрозе. При тестировании антивируса полное сканирование выполнялось не дольше конкурентов.

    Если ваше устройство потеряно или украдено, Вы можете авторизоваться на портале LiveSafe и удаленно заблокировать устройство, определить его местоположение или очистить все данные на нем. В отличие от похожих продуктов, при выполнении очистки McAfee инициализирует сброс до заводских настроек. Функция сирены поможет найти устройство в условиях беспорядка, с помощью пронзительного звукового сигнала. Пользователь может вызывать различные функции защиты от кражи с помощью СМС-сообщений или онлайн портала.

    McAfee умеет делать резервные копии и восстанавливать все данные на телефоне, включая фотографии и видео. Надо признать, многие мобильные антивирусы ограничиваются копированием контактов, а McAfee в данном аспекте очень щедр. Кроме того, все резервные копии доступны посредством онлайн портала.

    Для защиты приватных данных McAfee уведомляет пользователя о приложениях, которые имеют доступ к персональной информации. На смартфонах Android McAfee может блокировать нежелательные звонки и сообщения. Пользователи могут настроить запуск отдельных приложений по паролю - это уникальный способ предотвращения отслеживания электронной почты, социальных сетей и т.д.

    Новая функция захвата изображений с камеры позволяет делать фотографии с фронтальной камеры устройства, отправлять их владельцу устройства с добавлением данных географической привязки. Инструмент защиты Wi-Fi уведомляет пользователей о подключении к незашифрованной беспроводной сети и незамедлительно разрывает соединение при обнаружении сетевых атак ARP-spoofing. Вы сможете отправить ссылку для защиты других ваших устройств прямо из гаджета на Android.

    Версия LiveSafe для устройств Kindle Fire аналогична версии для Android. Единственным отличием является отсутствие поддержки функции Personal Lock для платформы Kindle Fire.

    Защита iOS

    Операционная система Apple изначально неплохо защищена от вредоносных атак, что затрудняет работу разработчикам вредоносного ПО. По этой же причине разработка антвиирусов для iOS также является непростой задачей. Версия LiveSafe для iPhone и iPad более функционально ограничена, чем версия для Android.

    LiveSafe для iOS не имеет антивирусного компонента, что закономерно, учитывая малую распространенность и ограниченные способности зловредов для Apple-устройств. Пользователь может использовать веб-консоль LiveSafe для определения местоположения устройства. Приложение может отправлять геоданные прежде чем, аккумулятор устройства полностью разрядится. LiveSafe не позволяет блокировать устройство, но может удалить все ваши контакты и активировать сигнал тревоги.

    Вы можете скопировать важные фотографии и видеозаписи в защищенное хранилище Secure Vault, вход в которое защищен паролем. LiveSafe не умеет автоматически удалять оригиналы файлов, но выводит напоминание пользователю о данном действии. При неправильном вводе пароля в течение трех попыток, активируется функция Capture Cam. LifeSafe отправляет владельцу устройства фото на электронную почту вместе с геометками.

    На этом функциональность версии LiveSafe для iOS заканчивается. Если бы Вы платили за фиксированное количество устройств, использование защиты для iOS было бы экономически нецелесообразно. К счастью, McAfee не ограничивается количество защищаемых устройств, поэтому Вы смело можете воспользоваться предлагаемой защитой для мобильной платформы от Apple.

    Менеджер паролей SafeKey

    LiveSafe это непросто служба для управления защитой ваших устройств. Продукт включает несколько очень полезных функций, которые нельзя найти в автономных антивирусных решениях McAfee. В частности, менеджер паролей SafeKey, разработанный на базе LastPass , защищает и помогает управлять всеми вашими паролями, а также заполнять веб-формы персональной информацией.

    Судя по всему, в McAfee используются технологии LastPass 2-ой версии, т.к. функции 3-ей версии в SafeKey недоступны. Webroot также использует менеджер паролей на платформе LastPass.

    SafeKey имеет две важные функции, которые отсутствуют в Webroot. Во-первых, пользователи могут активировать двухэтапную аутентификацию с помощью сервиса Google Authenticator , который отправляет специальный код на смарфтон каждый раз при авторизации. Во-вторых, SafeKey помечает степень риска для каждого пароля, помогая заменить слабые и повторяющиеся пароли.

    SafeKey захватывает и автоматически заполняет пароли. Компонент запоминает учетные данные каждый раз при регистрации на новом сервисе или сайте, а встроенный генератор паролей поможет убедиться, что Вы используете сложный пароль. Обработка старых полей ввода происходит в ручном режиме - SafeKey позволяют пользователю самостоятельно выбрать содержимое полей на странице, которое нужно запомнить.

    Пользователь может создавать несколько профилей для заполнения веб-форм. Каждый профиль содержит персональную информацию, контактные данные и финансовые реквизиты. В SafeKey Вы не сможете создать несколько образцов заполнения любого поля методом используемым в RoboForm EveryWhere, но вы можете добавить дополнительные поля в случае необходимости. При тестировании SafeKey заполнял формы очень точно.

    Чтобы ограничить вероятность кражи мастер-пароля, Вы можете настроить авторизацию из конкретной страны или настроить вход в защищенное хранилище только с одного устройства одновременно.

    Все сохраненные пароли автоматически синхронизируются между всеми компьютерами Windows и Mac, устройствами Android и iOS. Кроме того, доступ к данным SafeKay можно получить из веб-консоли онлайн. На портале Вы сможете просматривать, редактировать и сортировать пароли с любого устройства, подключенного к Всемирной сети.

    Хотя SafeKey не имеет всех функций, представленных в последнем LastPass 3.0 , инструмент является эффективным и более гибким средством для защиты паролей, чем большинство других менеджеров паролей.

    При установке на Android или iOS SafeKey предоставляет полный доступ к сохраненным паролям. Для входа на сайт, просто нажмите на него, и он откроется во встроенном браузере SafeKey.

    Функция Personal Locker

    McAfee Personal Locker («личный сейф») доступен только для устройств на платформе Android и iOS. Сервис предлагает 1 гигабайт высокозащищенного хранилища для хранения важных документов, изображений и заметок. Ваши данные защищены тремя уровнями аутентификации.

    Для начала работы с Personal Locker, Вам нужно задать пароль, состоящий как минимум из шести символов. Затем, Вы снимаете ваше лицо с помощью камеры устройства. Также как и в случае с паспортом, Вам не нужно улыбаться при настройке функции. Наконец, Вы должны прочитать заготовленную цитату 4 раза для распознавания голоса.

    Теперь Вы можете добавлять заметки или файлы в Personal Locker и сохранять фотограии прямо в хранилище. По умолчанию, каждый объект защищается с высоким уровнем безопасности. это означает, что для доступа к объекту Вам нужно будет ввести пароли и пройти идентификации лица и голоса. Пользователь может настроить более низкий уровень безопасности в случае необходимости, ограничившись, например, просто вводом пароля.

    При испытании Personal Locker был установлен на устройстве Android, в хранилище были скопированы файлы, а уровень безопасности остался высоким. При установке инструмента на iPhone 6 доступ к файлам осуществлялся без проблем. Распознавание лица и голоса работало отлично, даже несмотря на другую платформу.

    Очень выгодное предложение

    Все большее число вендоров антивирусного ПО переходят на кросс-платформенные решения. Norton был полностью перенесен на кросс-платформенную базу, а девять отдельных продуктов Symantec были объединены в один сервис. За 79,99 долларов Вы можете получить подписку на неограниченное количество лицензий McAfee LiveSafe или 5 лицензий Norton. Добавив 10 долларов, Вы сможете себе позволить подключить Norton на 10 устройств, получив еще 25 гигабайт облачного хранилища. Сложно представить семьи, для которых 10 лицензий будет мало. F-Secure поставляется в 3 вариантах: на 3 лицензии, 5 лицензий и 10 лицензий за 69,99, 89,99 и 129,99 долларов соответственно.

    Каждое кросс-платформенное решение предлагает защиту для ПК, Mac и Android. F-Secure и McAfee включают также защиту для iOS, хотя приложение F-Secure очень ограничено и поэтому не тратит одну лицензию. F-Secure и Kaspersky Internet Security для всех устройств имеют поддержку Windows Phone, в то время как Kaspersky и McAfee защищают устройства Blackberry.

    Сочетание неограниченных лицензий и расширенной поддержки различных платформ позволяет McAfee LiveSafe 2015 получить звание “Выбор редакции” интернет-портала PC Magazine в категории кросс-платформенных решений для защиты нескольких устройств. Это звание McAfee разделяет с Symantec Norton Security, который превосходит McAfee во многих базовых задачах защиты и щедро предлагает 25 гигабайт защищенного облачного пространства. Ваше финальное решение будет зависеть от требуемых задач, но оба продукта будут удачным выбором.

    Обзор McAfee LiveSafe 2015:

    Достоинства

    • подписка позволяет устанавливать защиту на все домашние устройства;
    • кросс-платформенность: поддержка ПК, Mac, Android, iOS, BlackBerry и Kindle Fire;
    • простой процесс добавления новых устройств;
    • менеджер паролей SafeKey синхронизирует данные между всеми подключенными устройствами;
    • модуль Personal Locker («личный сейф») предлагает защищенное облачное хранилище, доступ к которому предоставляется после идентификации лица или голоса.

    Недостатки

    • защита ПК отстает от уровня конкурентов;
    • версия для Mac является более ограниченна в функциональных возможностях, чем ПК-версия.

    Общая оценка

    McAfee LiveSafe 2015 предлагает расширить защиту на все ваши устройства на платформах ПК, Mac, Android, iOS, BlackBerry и даже Kindle Fire, заплатив при этом только за одну подписку. Продукт получил звание “Выбор редакции” в категории кросс-платформенных решений для защиты нескольких устройств.



    © 2024 beasthackerz.ru - Браузеры. Аудио. Жесткий диск. Программы. Локальная сеть. Windows