Software terms of service and privacy policies explained
Authored by a Symantec employee
If you’re like most people, you don’t read the Terms of Service when you get a new app or buy a new device. That’s a big mistake, because a lot of apps on the market that are less-than-ideal, known as “grayware,” count on you allowing them access to your information. They know most people don’t read the Terms of Service, so their Terms of Service include language authorizing a massive invasion of your privacy. At the same time, you might have noticed that most Terms of Service is just boilerplate. How do you read the Terms of Service and find out what you need to know about privacy without wasting a bunch of time reading standard terminology?
Safety for every device.
Security is no longer a one-machine affair. You need a security suite that helps protect all your devices – your Windows PC, Mac, Android smartphone or your iPad.
Try for 30 days before you buy with Norton Security Deluxe – helps protect up to 5 of your devices for one low price.
- The “security” section is also important, as it tells you what the company is doing to secure the data it obtains from you.
- “Access” and “onward transfer” clauses will explain who can access your data and who, if anyone and under what circumstances the data is shared with.
- An explicit list of what data is being collected from you. Companies generally have to collect some kind of data from you in order for their products to work. They should say exactly what data they are collecting.
- A list of who they are sharing your information with and why. The language here will generally be vague -- i.e., “third parties.” That’s fine, but under what circumstances do they share your data? Do they only share with companies that have security policies and under the course of normal business? If there aren’t any clauses explaining who these third parties are and when they share your data, that can be a huge red flag.
When in doubt, don’t be afraid to email customer service and start asking questions. Companies that are more reputable are more likely to answer your questions promptly.
The problem in a lot of cases isn’t that that company in question wants to do anything nefarious with your data. It’s just that they’re not taking your Internet security and privacy seriously enough. That can be just the kind of lax security that sets them -- and you -- up for a major breach.
Isn't it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 5 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
Disclaimers and references:
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.
Copyright © 2019 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, the Checkmark logo, Norton, Norton by Symantec, LifeLock and the LockMan logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the United States and other countries. App Store is a service mark of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution Licence. Other names may be trademarks of their respective owners.