This Agreement
1. This Agreement is for the Cyber Threat Protect service. It is made up of the Residential Standard Terms (as applicable), these Cyber Threat Protect terms, and the Norton Licence & Services Agreement (Norton LSA).
2. You have to agree to the Norton LSA because the Cyber Threat Protect service is powered by software owned by NortonTM. The Norton LSA is available here - License & Services Agreement (nortonlifelock.com)
3. By downloading, activating and using the Cyber Threat Protect service you acknowledge that you have read, understood and agreed to the Norton LSA.
What we provide
4. The service we agree to give you is a suite of security features including Device security on up to 15 devices, Scam Assistant, Dark Web Monitoring*, Social Media Monitoring**, Safe Web, and Norton Password Manager
5. The service is delivered through the Cyber Threat Protect application, which you can download to supported devices (like your laptop or mobile phone). Please see here for a list of compatible devices supported. The list of compatible devices is subject to change.
6. One Cyber Threat Protect Account per BT ID.
* Dark Web Monitoring is not available in all countries outside of the UK. Monitored information varies based on country of residence. We do not search for all personal information on all dark web sites, and we may not find all your exposed personal information with this search.
** Social Media Monitoring is only available on Facebook, Instagram, LinkedIn, Twitter, and YouTube. On Facebook, Instagram, and LinkedIn only account takeover feature is available. Does not include monitoring of chats or direct messages. May not identify cyberbullying, explicit, or illegal content or hate speech. You can link one account per social media type (Facebook, Instagram, Twitter, LinkedIn and YouTube).
When the service starts
7. This agreement will start when we have accepted your order. We will then start the service by making the software available for you to download, or by providing the details required to activate the Cyber Threat Protect mobile application.
8. You'll need to activate the service online at bt.com/mybt for use on desktop computers, laptops, phones and tablets.
9. You'll need to visit your app store and download the Cyber Threat Protect application onto your device.
Quality of Service
10. Although we attempt to provide you with the best possible service, we cannot guarantee that the service will never be faulty. However, we will correct all reported faults as soon as we reasonably can.
11. If there is a fault with the service, you should contact us. Details of how to contact us can be found in the Help section or at bt.com/contact.
Your use of the software
12. Use of the software is at your own risk and in accordance with the Norton LSA as set out in the Norton LSA. Norton LSA will be the Controller of any personal data processed when you use the software. Use of the software is subject to any applicable laws. We have no responsibility for any goods, services, information, software, or other materials you obtain when using the software.
13. We will share information about you with Norton and vice versa. This will happen in circumstances that relate to the administration of your Subscription. We’ll process your information in accordance with BT’s privacy policy, details of which can be found here Privacy Policy | BT.
14. If you share your licences with non-BT end user, we are not obliged to provide any support to them and have no responsibility for any goods, services, information, software, or other materials they obtain when using the software.
15. For personal and non-commercial use only
Changes we may make
16. We may occasionally upgrade and/or make improvements to your service. If we do this, we will give you prior notice of the change and provide you with instructions that you need to follow when a change has taken place.
Monitoring we provide by the social media provider:
| X | YouTube | ||||
|---|---|---|---|---|---|
| Account Takeover Protection | ✔ | ✔ | ✔ | ✔ | ✔ |
| Scam/Phishing | ✔ | ✔ | |||
| Malware | ✔ | ✔ | |||
| Monitor Inappropriate Content | ✔ | ✔ |
Facebook, Instagram, and LinkedIn do not provide API access to user posts, so only Account Takeover alerts for profile setting changes are monitored.
Information Monitored by Norton - 10 gamer tags, 5 email addresses, 5 phone numbers, 5 insurance or identification numbers, 10 credit card numbers, 5 physical addresses, 10 bank or investment account numbers, driver’s license number and mother’s maiden name.