Session status messages
Session Status

Due to inactivity, your session will end in approximately 2 minutes. Extend your session by clicking OK below.

Due to inactivity, your session has expired. Please sign in again to continue.

Verizon Protect Services Terms & Conditions

Your use of the Verizon Protect mobile app (the "Protect App"), Verizon's Digital Secure ("Digital Secure"), Identity Secure ("Identity Secure") and Call Filter ("Call Filter") services, and related software and application (collectively, the "Protect Services"), is subject to the following terms and conditions. These terms form a legally binding agreement ("Agreement") between you and the Verizon entity through which you purchased the Protect Services, which is either Cellco Partnership d/b/a Verizon Wireless or Verizon Online LLC (in either case, "Verizon", "Verizon Wireless", "We", "Us", or "Our"). By using the Protect Services, you accept this Agreement, which may be modified by Us from time to time.

PLEASE READ THIS AGREEMENT CAREFULLY AND COMPLETELY. IT GOVERNS YOUR USE OF THE PROTECT SERVICES, LIMITS VERIZON'S LIABILITY TO YOU AND REQUIRES YOU TO RESOLVE DISPUTES WITH VERIZON THROUGH BINDING AND INDIVIDUAL ARBITRATION, RATHER THAN THROUGH JURY TRIALS OR CLASS ACTIONS. IF YOU DO NOT AGREE WITH ANY PART OF THIS AGREEMENT, DO NOT CLICK-TO-ACCEPT IT OR USE THE PROTECT SERVICES.

    1. Protect App.

    1. Availability. Eligible users may obtain the Protect App for their mobile device by downloading it from Google Play or the Apple App Store; certain devices may come with the Protect App pre-installed. Please read our Protect App FAQs before using it, they are available at https://www.verizon.com/support/how-to-use-verizon-protect-app/.
    2. License Grant. In connection with the Protect Services, We will provide or make available to you the Protect App, as well as additional software that is owned by Us, Our affiliates or third-party licensors ("software"). Subject to the terms and conditions of this Agreement, We grant you a limited, revocable, non-exclusive, non-transferable license to install and use the Protect App and the Software for personal use on the number of devices and for the number of users specified in your subscription. All rights regarding use of the Protect App and Software not expressly granted in this Agreement are reserved by Us and/or any third-party licensors.

      To ensure that the Protect App and Software on your device includes new features We develop, by agreeing to this Agreement, you give us permission to install updates to the Protect App and/or Software, and, at your request or with your consent, new Software on your devices automatically when available, to the extent it is possible for us to run background installations. Your failure to install any update may affect your Service and/or use of the Software.

      Some third-party materials included with the Protect App or Software may include software source code licensed by third parties under one or more open-source or free-software licenses, including the GNU General Public License, which are considered "Open Source Software." The Open Source Software is licensed under terms and conditions different from this Agreement and may, in some cases, conflict with the terms of this Agreement and will apply instead of the terms of this Agreement. If an Open Source Software license requires us to distribute any source code related to the Protect App or Software or any modifications to the Protect App or Software or Services, We will make the source code available on request.

    2. Digital Secure.

    1. Eligibility; How Digital Secure Works. Please read our Digital Secure FAQs before using it, they are available at https://www.verizon.com/support/digital-secure-faqs/. The premium version of Digital Secure requires the Protect App and is available to eligible Verizon customers as a standalone offering or as part of a service bundle. All customers can use the basic features of Digital Secure without a subscription by using the Protect App.

      Subscriptions extending protection across "all" of your devices in addition to your smartphone are limited to the compatible devices (such as tablets, laptops and computers) you and your account members own; and not all features may be available for such devices. To access the full set of premium features of Digital Secure, a compatible device type, operating system, and browser are required, and not all features are available for all operating systems. Compatibility requirements and available features by operating system are available at https://www.verizon.com/support/digital-secure-faqs/#compatible-devices.
    2. Digital Secure Features:
      1. Basic Features.
        1. Security Scan (Android).* This checks for malware threats and system risks. The malware scanning tool identifies and attempts to remove viruses, malware, spyware, ransomware, adware and other suspicious software in photos, media and other files on your device or in your apps and text messages. Malware scans require your device to be connected to cellular data or Wi-Fi in order to run. You do not need to be plugged into power for scheduled scans to run. The system risks scan verifies that you have configured a screen lock. Device Health (iOS):* The Device Health tool checks if you have the latest system software updates and whether device security settings such as password or passcode have been enabled. If the system software has not been updated or security settings enabled, your personal information may be at risk, although not an immediate threat.

          *Note: Security Scan is not available for iOS devices. Device Health is not available for Android devices.
        2. Secure Connect: Safe browsing. This tool identifies and attempts to block suspicious websites and links on supported browsers and apps.
        3. Secure Connect: Wi-Fi Scan. This tool identifies if you are on a Wi-Fi network that is unsafe or unprotected and recommends you disconnect or use a secure Virtual Private Network (VPN), like Secure VPN. We consider a Wi-Fi network to be unsafe if We have detected an attack in progress at the Internet access point and it's possible your personal information will be compromised. We consider a Wi-Fi network to be unprotected if it is unsecure and does not require a password for connection or does not encrypt the data you send while connected to it, exposing your personal information to risk, although not an immediate threat.
      2. Premium Features (available via subscription).
        1. Malware and System Scan for Desktop. You can extend protection against viruses, malware and risky websites to Mac and Windows laptops and computers. Use the Protect App to send a download link to your laptops and computers. To use the full set of features, a high-speed internet connection of 1Mbps or faster is highly recommended and may be required.
        2. Secure VPN. The Secure VPN feature utilizes proprietary technology to allow users to create a secure Wi-Fi connection with a VPN on their mobile device. If your Service includes a VPN for your laptops and computers, you will be able to access and download the VPN through a web link. Neither Verizon nor its third party licensor(s) or vendors access or collect any information that you send or receive through your VPN connections.
        3. Digital Footprint Manager: Dark Web Monitoring. The following terms apply only if you have activated Digital Secure’s dark web ("ir”) service (the "DW Service”) for your line through the Protect App. The DW Service utilizes proprietary technology to monitor for signs your personal information is compromised or at risk. You represent and warrant to us that you will use the DW Service to monitor information associated with your personal information and to protect against or prevent actual fraud, and not for any other purpose.

          Monitoring is provided for one identity per subscribed line, and is not available for customers outside the United States. To activate your DW Service, you will provide the information you wish to have monitored, which may include the following: email addresses, mobile numbers, credit and debit card numbers, bank account numbers, social security number, passport number, driver’s license number, and medical ID numbers. By activating dark web email search, you are allowing Digital Secure to use your email address to search content on the dark web and collect and store any personal data which is found associated with that email address, which may include information such as your social security number, credit card numbers, age and employment. We rely on the information contained in third party databases and dark web surveillance to provide you the Protect Services. While We make every effort to obtain the most current and reliable data, We cannot guarantee the accuracy or completeness of such third party databases or information on the dark web and We cannot remove your breached information from the dark web.

          The DW Service uses the information you choose to provide solely to search internet websites, online black markets and other forums discussing dark web transactions for any signs that your monitored identity elements have been compromised online or are being bought or sold online. You will be alerted if information matching your monitored information is discovered online.
        4. Identity Restoration Service. The Identity Restoration ("IR") Service ("IR Service") provides dedicated agents who provide guidance, and even act on your behalf in some cases, to help you restore your identity, including notifying law enforcement, contacting the company or government entity that issued the account or credentials, reviewing your credit report, filing fraud alerts and placing credit freezes at the credit bureaus. The IR Service further helps you cancel and re-order your lost or stolen IDs, credit cards, bank cards, medical cards and other types of content. Dedicated agents will assist by participating in three-way calls with your bank or creditor to cancel and re-issue your lost cards.

          The IR Service does not include credit or financial monitoring. Verizon is not a credit repair organization and does not provide credit repair advice or seek to improve your credit rating. We do not monitor all transactions. The IR Service reduces your risk, but cannot protect you against all identity theft, as no identity protection tool can prevent identity theft completely. Verizon does not provide identity theft insurance coverage or reimbursement of stolen funds or costs associated with identity restoration. Neither Verizon nor its third party licensor(s) are responsible for any loss or damages incurred as a result of identity theft. In order for dedicated agents of Iris, a Generali company, to act on your behalf, they will require a revocable power of attorney to allow them to communicate with various agencies on your behalf in efforts to mitigate the effects of identity theft. They will only act on your behalf with your permission.
        5. Security Advisor. Digital Secure includes access to Security Advisor, which provides expert support to help you proactively secure your information and resolve security vulnerabilities to help protect you against online threats. Security Advisor experts are available through click-to-chat to answer questions and provide self-help information and content and tips to help you improve or solve security concerns. Security Advisor does not provide real-time notification of sensitive data exposure; virus/malware removal; home network hacking mitigation; or data loss management. The make and model of your device may limit the scope of support provided by Security Advisor. You are responsible for backing up the software or data stored on your devices. Neither Verizon nor its third party licensor(s) are responsible for any loss, alteration or corruption of any software or data, and We may decline to provide the Protect Services to you if it is determined that you have not taken appropriate back-up measures. To receive Security Advisor services, you may be asked to (i) allow Security Advisor experts to remotely access your devices included in the Protect Services, and any data, videos, pictures, text messages or other content thereon (including content that may be personal, confidential or otherwise sensitive in nature); (ii) expressly authorize Security Advisor experts to effect changes to your devices; and (iii) acknowledge and agree that such changes may be permanent and irreversible. It is your responsibility to remove any sensitive content on your device to the extent you believe necessary to prevent access by Security Advisor experts. If We are unable to resolve your issue after making commercially reasonable efforts, We have the right and discretion to refuse to take further efforts to do so.
        6. Security Center. Explore guides, articles & answers to common questions.

    3. Identity Secure.

    1. Eligibility; How Identity Secure Works. Please read our Identity Secure FAQs before using it, they are available at https://www.verizon.com/support/identity-secure-faqs/. Identity Secure requires the Protect App and is available to eligible Verizon customers as a standalone offering or as part of a service bundle. You represent and warrant to us that you will use Identity Secure to monitor information associated with your personal information and to protect against or prevent actual fraud, and not for any other purpose. Alerts may be sent through in-product notifications and via email to an address that you provide. You are responsible for keeping up to date your personal information for monitoring and your contact information for receiving alerts. It is your responsibility to review the alerts and take any recommended actions.

      Subscriptions extending protection across "all" of your devices in addition to your smartphone are limited to the compatible devices (such as tablets, laptops and computers) you and your account members own; and not all features may be available for such devices. To access the full set of features of Identity Secure, a compatible device type, operating system, and browser are required, and not all features are available for all operating systems. Compatibility requirements and available features by operating system are available at https://www.verizon.com/support/identity-secure-faqs/.
    2. Identity Secure Features:
      1. Digital Footprint: Password & Identity Manager. Identity Secure provides a Password & Identity Manager that lets you store your information and access it securely across multiple devices and browsers. This feature protects both passwords and personal data.
      2. Digital Footprint: Data Broker List Removal. Data Broker List Removal is a service that allows you to request removal of the personal information you provide. You provide the personal information you want to remove through the form in the Verizon Protect App. The service searches for your information on data broker sites and, if found, automatically requests the removal of your information on your behalf. This process is repeated on a monthly basis as data brokers constantly refresh their lists with new information.

        By activating Data Broker List Removal, you are allowing Identity Secure to use the information you provide to search for, collect and store, and request removal any personal data which is found associated with that information. We rely on the information contained in third party databases and dark web surveillance to provide you the Protect Services. While We make every effort to obtain the most current and reliable data, We cannot guarantee the accuracy or completeness of such third party databases or information on the dark web or the removal of your information from data broker sites, and We cannot remove your information from the dark web.
      3. Social Media Monitoring. Social Media Monitoring is a service which allows you to automatically monitor certain social media accounts for signs of hacking, impersonation or other unusual behavior. The service will issue alerts regarding account compromises or exposure of sensitive information.
      4. Locked Folder. Locked Folder utilizes the Verizon Cloud service to provide limited online storage intended for you to store personal data ("Locked Folder Content"), which you can protect with a 6-digit PIN and biometric authentication. In addition to these terms, your use of Locked Folder is subject to, and represents your acceptance of, the Verizon Cloud Terms & Conditions, located at https://www.verizon.com/support/cloud-legal/ (the "Cloud Terms").

        Please review the Verizon Cloud Terms carefully before using Locked Folder. If you cancel Identity Secure and have a subscription to Verizon Cloud, you’’ll be able to access your Locked Folder Content via the Verizon Cloud mobile app.

        If you cancel a subscription to Verizon Cloud but retain a subscription to Identity Secure, you will only be able to access your Locked Folder Content, not other Cloud-stored files, and only via the Protect App. If you terminate your Verizon account or cancel both your Identity Secure and Verizon Cloud account (or your Identity Secure subscription but do not have a Verizon Cloud account), we archive a copy of your Locked Folder Content for a short period in case you would like to restore the Locked Folder Content. To restore, you must maintain/resume your Verizon account, and maintain/resume an Identity Secure account and/or Verizon Cloud, within 30 days of termination, otherwise we cannot guarantee your Locked Folder Content can be recovered.

        You can continue to access the Service and your Locked Folder Content after you are no longer a Verizon customer only if you have created an individual Verizon Cloud profile prior to cancellation of your Verizon account and you reactivate your Cloud account within 30 days of your Verizon disconnect date. You must set up an individual Verizon Cloud profile in the Verizon Cloud App with a valid email address and password so that we can provide you with a reactivation link to sign up for the Service as a non-Verizon customer. Any member on your Verizon account who has the Verizon Cloud Service must follow these same steps in order to continue to access their Locked Folder Content. See Verizon Cloud FAQs for more details on how you can restore Verizon Cloud content to a new Verizon Cloud account after you are no longer a Verizon customer.
      5. Identity Restoration Services. The Identity Restoration ("IR") Service ("IR Service") provides dedicated agents who provide guidance, and even act on your behalf in some cases, to help you restore your identity, including notifying law enforcement, contacting the company or government entity that issued the account or credentials, reviewing your credit report, filing fraud alerts and placing credit freezes at the credit bureaus. The IR Service further helps you cancel and re-order your lost or stolen IDs, credit cards, bank cards, medical cards and other types of content. Dedicated agents will assist by participating in three-way calls with your bank or creditor to cancel and re-issue your lost cards.

        The IR Service does not include credit or financial monitoring. Verizon is not a credit repair organization and does not provide credit repair advice or seek to improve your credit rating. We do not monitor all transactions. The IR Service reduces your risk, but cannot protect you against all identity theft, as no identity protection tool can prevent identity theft completely. Verizon does not provide identity theft insurance coverage or reimbursement of stolen funds or costs associated with identity restoration. Neither Verizon nor its third party licensor(s) are responsible for any loss or damages incurred as a result of identity theft. In order for dedicated agents of Iris, a Generali company, to act on your behalf, they will require a revocable power of attorney to allow them to communicate with various agencies on your behalf in efforts to mitigate the effects of identity theft. They will only act on your behalf with your permission.

    4. Call Filter.

    1. Call Filter Service. The Call Filter service provides network-based and application-based features to help screen unwanted calls and block spam. A limited subset of Call Filter features is available within the Protect App; the complete set of features is accessible via the Call Filter app. For information on Call Filter, see the Call Filter FAQ at https://www.verizon.com/support/call-filter-faqs/, and the Call Filter Terms & Conditions at https://www.verizon.com/support/call-filter-legal/. If you do not wish to be enrolled in the Service, you may turn off the Call Filter Service at any time within the Call Filter app or My Verizon (My Business for business customers) or by contacting Verizon's customer service. As some features are network-based and do not require the Call Filter app, simply deleting the Call Filter app or Protect App off your device will not turn off call blocking and will not cancel the Service.
    2. Call Filter Features. Within the Protect App, Call Filter identifies calls as potential spam or a particular category (when available) on your incoming call screen. If the caller's phone number is stored as your Contact, you may not see a spam or category label. The Service will automatically forward to voicemail high-risk spam (potential fraud) callers by default, but you may review your blocked calls list and adjust your spam filter settings within the Call Filter app or My Verizon (postpaid consumer devices only). To ensure wanted calls are not blocked, add the phone numbers to your Contacts and list of Allowed Numbers. Allowed Numbers may still be blocked by another app or service or your device.  The Call Filter app allows you to report spam callers and provide feedback for calls you believe were mislabeled as spam. Your spam filter settings and list of Allowed Numbers (network-based features) will persist if you change devices or uninstall the Call Filter app, but block lists will be permanently deleted.

    5. Privacy.

    By entering into this Agreement, you agree to the data collection, use and sharing practices described in our Privacy Policy, which is available at www.verizon.com/privacy. You also agree that We can access or use the following information from your device in order to provide the Protect Services to you:

    1. your mobile number to confirm your eligibility to use the Protect Services and for billing purposes;
    2. your IP address and Wi-Fi access point data to identify Wi-Fi security threats and to establish and provide the Secure VPN service;
    3. for Android devices only, your photos, media, and other files stored on your device to scan for viruses and other malware; and
    4. for Android devices only, your text messages to scan for viruses and other malware.

    You can manage these permissions at any time through your device settings.

    6. Restrictions on Use.

    The Software and Protect Service are licensed to you, not sold. The Software and Protect Service are intended for your personal use only. You do not have any right to reproduce or distribute the Software and Protect Service without Our permission. You shall not use the Software or Protect Service in any way that violates any applicable rules, laws or regulations or infringes any copyright, trademark or other intellectual property right or discloses a trade secret or confidential information. You shall not: (a) decompile, reverse engineer, disassemble, derive the source code of or decrypt it; (b) make any modification, adaptation, improvement, enhancement, translation or derivative work from it; (c) rent, lease, sell, redistribute, loan, distribute, sublicense or otherwise transfer it to any third party; (d) remove, obscure, or alter any proprietary notices, including copyright or trademark notices; (e) exploit it for any commercial purposes; or (f) attempt to circumvent its technical protection measures.

    7. Misuse.

    You shall not misuse the Protect Services, including, without limitation, using it in any manner that: (a) interferes with or interrupts it or any hardware, software, system or network connected with it; (b) stalks, harasses, threatens or harms any person or is otherwise invasive of another‘s privacy rights; (c) uses it on a device without permission; (d) tampers with or makes an unauthorized connection to any network, including, without limitation, the network of any wireless carrier; or (e) disseminates viruses or other computer code, files or programs that interrupt, destroy or limit the functionality of it or any other computer software or hardware.

    8. Intellectual Property Rights.

    You agree that all copyrights, patents, trademarks, trade secrets and other intellectual property rights associated with the Protect Services and Software are respectively Verizon's and our third-party licensors’ exclusive property, and all such rights not expressly granted to you herein are reserved and retained by Verizon and our third-party licensor(s), as applicable. If you submit comments or ideas about the Protect Services, including ways to improve the Protect Services or other products or services ("Ideas"), you agree that your submission is gratuitous, unsolicited and without restriction. It does not place Verizon or Verizon's third-party licensor(s) under any fiduciary or other obligation, and We are free to use the Ideas without compensation and/or to disclose the Ideas to Verizon’s third-party licensor(s) on a non-confidential basis. You further acknowledge that neither Verizon nor Verizon's third-party licensor(s), by acceptance of your submission, waive any rights to use similar or related ideas previously known to Us, or developed by Verizon or Verizon’s third-party licensor(s) employees or obtained from sources other than you.

    9. Termination.

    Verizon may limit, suspend, terminate or discontinue the Protect Services, or certain features or functions of the Protect Services, at any time without notice, including if you breach this Agreement. You may also cancel your use of the Protect Services at any time by unsubscribing from the Protect Services and uninstalling the Software.

    10. DISCLAIMER OF WARRANTIES.

    THE FOLLOWING DISCLAIMER SHALL APPLY TO YOU TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. YOU ACKNOWLEDGE AND AGREE THAT THE PROTECT SERVICES AND SOFTWARE IS PROVIDED ON AN "AS IS" AND "AS AVAILABLE" BASIS, AND THAT YOUR USE OF OR RELIANCE UPON THE PROTECT SERVICES IS AT YOUR SOLE RISK AND DISCRETION. WE HEREBY DISCLAIM ANY AND ALL REPRESENTATIONS, WARRANTIES AND GUARANTIES REGARDING THE PROTECT SERVICES, WHETHER EXPRESS, IMPLIED OR STATUTORY, AND INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. FURTHERMORE, VERIZON MAKES NO WARRANTY THAT: (I) THE PROTECT SERVICES WILL MEET YOUR REQUirEMENTS; (II) THE PROTECT SERVICES WILL BE AVAILABLE, TIMELY, CURRENT, ACCURATE, RELIABLE, COMPLETE, SECURE OR ERROR-FREE; (III) THE QUALITY OF ANY PRODUCTS, SERVICES, INFORMATION OR OTHER MATERIAL ACCESSED OR OBTAINED BY YOU THROUGH THE PROTECT SERVICES WILL BE AS REPRESENTED OR MEET YOUR EXPECTATIONS; OR (IV) ANY ERRORS IN THE PROTECT SERVICES WILL BE CORRECTED. NO ADVICE OR INFORMATION, WHETHER ORAL OR WRITTEN, OBTAINED BY YOU FROM VERIZON OR VERIZON's THIRD-PARTY LICENSOR(S) OR ANY THIRD PARTY SHALL CREATE ANY REPRESENTATION, WARRANTY OR GUARANTY. FURTHERMORE, YOU ACKNOWLEDGE AND AGREE THAT VERIZON AND ITS THIRD-PARTY LICENSOR(S) HAVE NO OBLIGATION TO SUPPORT OR MAINTAIN THE PROTECT SERVICES. YOU ACKNOWLEDGE AND AGREE THAT VERIZON AND ITS THIRD-PARTY LICENSOR(S) MIGHT NOT BE ABLE TO OFFER THE PROTECT SERVICES AT ALL, IN THE ABSENCE OF THE FOREGOING DISCLAIMERS AND LIMITATIONS. IN THE EVENT OF ANY FAILURE OF THE PROTECT SERVICES TO CONFORM TO ANY APPLICABLE WARRANTY, YOU MAY NOTIFY VERIZON, AND VERIZON AND ITS THIRD-PARTY LICENSOR(S), AS YOUR SOLE AND EXCLUSIVE REMEDY, WILL USE COMMERCIALLY REASONABLE EFFORTS TO SATISFY THE WARRANTY. VERIZON AND ITS THIRD-PARTY LICENSOR(S) WILL HAVE NO OTHER WARRANTY OBLIGATION WHATSOEVER WITH RESPECT TO THE PROTECT SERVICES, AND ANY OTHER CLAIMS, LOSSES, LIABILITIES, DAMAGES, COSTS OR EXPENSES ATTRIBUTABLE TO ANY FAILURE TO CONFORM TO ANY WARRANTY WILL BE YOUR SOLE RESPONSIBILITY.

    11. LIMITATION OF LIABILITY.

    THE FOLLOWING LIMITATIONS SHALL APPLY TO YOU TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. UNDER NO CIRCUMSTANCES SHALL WE BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL OR EXEMPLARY DAMAGES ARISING OUT OF OR IN CONNECTION WITH YOUR ACCESS OR USE OF OR INABILITY TO ACCESS OR USE THE PROTECT SERVICES, WHETHER OR NOT THE DAMAGES WERE FORESEEABLE AND WHETHER OR NOT WE WERE ADVISED OF THE POSSIBILITY OF SUCH DAMAGES INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS OR REVENUES, FAILURE TO TRANSMIT OR RECEIVE ANY DATA, LOSS, MISUSE OR DISCLOSURE OF CONFIDENTIAL INFORMATION, BUSINESS INTERRUPTION, LOSS OF PRIVACY, CORRUPTION OR LOSS OF DATA, FAILURE TO RECEIVE OR BACK UP YOUR DATA (OR ARCHIVED DATA) OR ANY OTHER PECUNIARY LOSS WHATSOEVER ARISING OUT OF OR IN ANY WAY RELATED TO THE PROTECT SERVICES. THE FOREGOING LIMITATIONS WILL APPLY EVEN IF THE ABOVE STATED REMEDY FAILS OF ITS ESSENTIAL PURPOSE.

    12. DISPUTE RESOLUTION.

    WE HOPE TO MAKE YOU A HAPPY CUSTOMER, BUT IF THERE'S AN ISSUE THAT NEEDS TO BE RESOLVED, THIS SECTION OUTLINES WHAT'S EXPECTED OF BOTH OF US.

    1. BINDING ARBITRATION. YOU UNDERSTAND THAT BY ENTERING INTO THIS AGREEMENT YOU ARE GIVING UP THE RIGHT TO BRING A CLAIM IN COURT OR IN FRONT OF A JURY AGAINST VERIZON. YOU AND VERIZON BOTH AGREE TO RESOLVE DISPUTES ONLY BY ARBITRATION OR IN SMALL CLAIMS COURT AS DISCUSSED BELOW. Dispute means any dispute that in any way relates to or arises out of this Agreement. This includes, but is not limited to, any equipment, products and services you receive from us, any advertising for such products or services, or alleged personal injury or invasion of privacy relating to such products or services, and includes any disputes you have with our employees or agents. This also includes any dispute regarding the validity, enforceability, or scope of any portion of this Agreement (including the Agreement to arbitrate) unless otherwise provided in this Agreement. You can also bring any issues you may have to the attention of federal, state, or local government agencies, and if the law allows, they can seek relief against us for you. This Agreement is governed by the Federal Arbitration Act. This Agreement to arbitrate continues to apply even after you have stopped receiving services from us. While the procedures in arbitration may be different, an arbitrator can award you the same damages and relief, and must honor the same terms in this Agreement, as a court would, subject to the limits on arbitrator authority set forth below. If the law allows for an award of attorneys' fees, an arbitrator can award them too. The same defenses are also available to both parties as would be available in court, including any applicable statute of limitations.
    2. ARBITRATION PROCEDURES. Except as specifically noted below, ANY DISPUTE WILL BE RESOLVED BY ONE OR MORE NEUTRAL ARBITRATORS BEFORE THE AMERICAN ARBITRATION ASSOCIATION ("AAA"). Unless you and Verizon agree otherwise, the arbitration will take place in the county of your billing address, and the AAA's Consumer Arbitration Rules will apply to the arbitration. Unless otherwise provided in this Agreement, you and Verizon agree that the AAA, including a process arbitrator, shall have authority to resolve disputes relating to which version of this Agreement applies. If the AAA cannot or does not administer a dispute under this Agreement, despite the parties' compliance with the terms of this Agreement and the applicable AAA rules, you and Verizon will agree to select another arbitral forum. If both parties cannot agree on an arbitral forum, a court in the county of your billing address will select an arbitral forum to decide the dispute pursuant to Section 5 of the Federal Arbitration Act. Unless otherwise provided in this Agreement, an individual arbitrator appointed to determine the merits of the dispute shall have exclusive authority to arbitrate, including but not limited to any dispute regarding the validity, enforceability, or scope of any portion of this Agreement (including the agreement to arbitrate). You can get procedures, rules, and fee information from the AAA (www.adr.org) or from us. If you have followed the mandatory informal dispute resolution process set forth in Paragraph 4, Verizon will reimburse any filing fee that the AAA charges you for arbitration of the dispute at the conclusion of the arbitration. Verizon will also pay any administrative and arbitrator fees charged by the arbitration tribunal. By submitting an arbitration demand, the party and counsel represent that, as in court, they are complying with the requirements of Federal Rule of Civil Procedure 11(b). The Arbitrator is authorized to impose any sanctions available under Federal Rule of Civil Procedure 11 on represented parties and their counsel. The arbitrator assigned to any arbitration between you and Verizon shall resolve the claims within 120 days of appointment or as swiftly as possible thereafter, consistent with fairness to the parties.

      For claims of $25,000 or less, you can choose whether you'd like the arbitration carried out based only on documents submitted to the arbitrator, or by a hearing in person or by phone. Alternatively, for claims within the jurisdictional limit of the small claims court in the state encompassing your billing address, either you or Verizon can choose to bring an individual action in small claims court instead of proceeding in arbitration. Furthermore, if the claims in any request or demand for arbitration could have been brought in small claims court, then either you or Verizon may choose to have the claims heard in small claims court, rather than in arbitration, at any time before the arbitrator is appointed, by notifying the other party of that choice in writing. If this provision or the limitation on bringing actions to small claims court is found to be invalid, then this provision shall be severable and the matter will proceed in arbitration; in no way will this provision allow for an action to be brought on a class or collective basis.
    3. CLASS AND COLLECTIVE ACTION WAIVER. THIS AGREEMENT DOESN'T ALLOW CLASS OR COLLECTIVE ARBITRATIONS EVEN IF THE AAA PROCEDURES OR RULES WOULD. IF FOR ANY REASON A CLAIM PROCEEDS IN COURT RATHER THAN THROUGH ARBITRATION, INCLUDING IF A CUSTOMER OR VERIZON OPT OUT OF ARBITRATION PURSUANT TO PARAGRAPH (5) BELOW, YOU AND VERIZON AGREE THAT, TO THE FULLEST EXTENT ALLOWED BY APPLICABLE LAW, NO ACTION WILL BE BROUGHT ON A CLASS OR COLLECTIVE BASIS AND YOU AND VERIZON UNCONDITIONALLY WAIVE ANY RIGHT TO TRIAL BY JURY IN ANY ACTION, PROCEEDING, CLAIM OR COUNTERCLAIM ARISING OUT OF OR RELATING TO THIS AGREEMENT IN ANY WAY. In the event of litigation, this paragraph may be filed to show a written consent to a before a judge and not a jury. NO CLASS, REPRESENTATIVE OR PRIVATE ATTORNEY GENERAL OR GENERAL INJUNCTIVE RELIEF THEORIES OF LIABILITY OR PRAYERS FOR RELIEF MAY BE MAINTAINED IN ANY ARBITRATION HELD UNDER THIS AGREEMENT. Any question regarding the enforceability under applicable law or interpretation of this paragraph shall be decided by a court and not the arbitrator. Should a court determine that this paragraph prohibits an individual claimant from seeking public injunctive relief, and the applicable law provides an unwaivable right to pursue such public injunctive relief, you and we agree that any claim or request for public injunctive relief shall be stayed and resolved by the court after arbitration of the remaining claims and requests for relief and the remainder of this agreement will be enforceable.
    4. MANDATORY INFORMAL DISPUTE RESOLUTION PROCESS. If either of us intends to seek arbitration under this agreement, the party seeking arbitration must first notify the other party of the dispute in writing at least 60 days in advance of initiating the arbitration. The notice must be provided on an individual basis and provide sufficient information to allow the other party to assess and attempt to resolve the claim. This includes, at a minimum, enough information to allow the other party to identify the account at issue and include the name of the Verizon wireless account holder, the mobile telephone number at issue, a description of the claim, the specific facts supporting the claim, the damages the party claims to have suffered and the relief the party is seeking. Notice to Verizon should be sent to Verizon wireless dispute resolution manager, using the form available here: verizon.com/about/nod/notice-of-dispute-wireless-form. Notice to you will be sent to the most recent contact information we have for you. This mandatory informal dispute resolution process is designed to allow the parties to make a fair, fact-based offer of settlement if they choose to do so. Neither party can proceed to arbitration unless they provide the information required in this Paragraph. You may choose to be represented by an attorney or other person as part of this process, but if you do you must indicate that you are represented by an attorney on the form available at verizon.com/about/nod/notice-of-dispute-wireless-form and confirm you authorize us to discuss your account information with this attorney or other person. The sufficiency and enforceability of this paragraph is an issue to be decided by a court prior to the filing of any demand for arbitration and the AAA must not accept, administer, assess, or demand fees in connection with any demand that has not satisfied the requirements set forth in this paragraph. The parties acknowledge and agree that AAA's failure to comply with this paragraph will cause the parties irreparable injury and that in such event the parties shall be entitled to injunctive relief in addition to further relief as may be proper. If either party has provided this information and the parties are unable to resolve their dispute within 60 days, either party may then proceed to file a claim for arbitration. ALL APPLICABLE LIMITATIONS PERIODS (INCLUDING STATUTES OF LIMITATIONS) WILL BE TOLLED FROM THE DATE OF RECEIPT OF A NOTICE DESCRIBED IN THIS PARAGRAPH THROUGH CONCLUSION OF THE PROCESS CONTEMPLATED BY THIS PARAGRAPH.
    5. ADDITIONAL PROCEDURES FOR MASS FILINGS. This paragraph sets forth additional procedures that apply to mass filings. A Mass Filing is when 50 or more customers who raise similar claims and are represented by the same or coordinated counsel initiate notices of dispute pursuant to paragraph 4 above, which must be submitted on an individual, claimaint-by-claimant basis, otherwise attempt to commence arbitrations, or file a complaint in court. If a Mass Filing is commenced, the claims shall proceed in arbitration in a coordinated proceeding. You and Verizon understand and agree that these additional procedures shall apply as set forth in this paragraph and that the resolution of your dispute might be delayed if these additional procedures are triggered. The parties agree that as part of these procedures, their counsel shall meet and confer in good faith in an effort to resolve the disputes, streamline procedures, address the exchange of information, modify the number of disputes to be adjudicated, and conserve the parties' and the AAA's resources.

      Stage One. In the first stage, 80 arbitrations will proceed and counsel for the Verizon wireless customers and counsel for Verizon wireless shall each select 40 cases to proceed first in arbitration in individual bellwether proceedings in individual arbitrations. The remaining arbitrations shall not be filed or deemed filed in arbitration nor shall any arbitration fees be assessed or collected in connection with those claims. After the arbitrations in the first stage are completed, the parties must engage in a mediation of all remaining cases, and Verizon will pay the mediation fee.

      If the parties cannot agree how to resolve the remaining arbitrations after mediation, they will move forward to a second stage.

      Stage Two. In the second stage, 100 arbitrations will proceed and counsel for the Verizon customers and counsel for Verizon shall each select 50 cases to proceed in arbitration in individual bellwether proceedings before separate arbitrators. The remaining arbitrations shall not be filed or deemed filed in arbitration nor shall any arbitration fees be assessed or collected in connection with those claims. After the arbitrations in the second stage are completed, the parties must engage in a mediation of all remaining cases, and Verizon will pay the mediation fee.

      After the second stage concludes, if the parties cannot agree how to resolve the remaining claims, any individual customer who is part of this coordinated proceeding, or Verizon, may elect to opt out of arbitration by providing notice to opposing counsel, and if the customer wishes to proceed with the claim, they may file an individual complaint in court.

      For those customers who do not opt out of arbitration, their claims will proceed in arbitration in continued batches of 100 claims as set forth above for the second stage. The remaining arbitrations shall not be filed or deemed filed in arbitration nor shall any arbitration fees be assessed or collected in connection with those claims. THE FILING OF A NOTICE OF DISPUTE BY A CUSTOMER IN ACCORDANCE WITH PARAGRAPH 4 OR FILING OF A COMPLAINT IN COURT WILL TOLL ALL APPLICABLE STATUTES OF LIMITATIONS FOR THAT CUSTOMER'S DISPUTE UNTIL THE COMPLETION OF THE PROCESS DESCRIBED IN THIS PARAGRAPH.

      A court of competent jurisdiction will have authority to enforce these Additional Procedures for Mass Filings, including by entering an injunction to prohibit filings in violation of this paragraph. These Additional Procedures for Mass Filings and each of its requirements are essential parts of this Agreement. If, after exhaustion of all appeals, an arbitrator or court of competent jurisdiction decides that these Additional Procedures for Mass Filings apply to your dispute but are not enforceable, then your dispute shall not proceed in arbitration and shall only proceed in a court of competent jurisdiction consistent with the remainder of this Agreement.
    6. NO BINDING EFFECT. An arbitration award and any judgment confirming it apply only to that specific case. It can't be used in any other case except to enforce the award itself.
    7. WRITTEN SETTLEMENT OFFER. We may, but are not obligated to, make a written settlement offer anytime before the arbitration hearing. The amount or terms of any settlement offer may not be disclosed to the arbitrator until after the arbitrator issues an award on the claim. If you don't accept the offer and the arbitrator awards you an amount of money that's more than our offer but less than $5,000, or if we don't make you an offer, and the arbitrator awards you any amount of money but less than $5,000, then we agree to pay you $5,000 instead of the amount awarded. In that case we also agree to pay any reasonable attorneys' fees and expenses, regardless of whether the law requires it for your case. If the arbitrator awards you more than $5,000, then we will pay you only that amount.

    13. Indemnification.

    You agree to indemnify, defend and hold Us harmless from any claim, proceeding, loss, damage, liability or expense of any kind arising out of or in connection with the following: (a) your use or misuse of the Protect Services; (b) your alleged or actual breach of this Agreement; (c) your alleged or actual violation of applicable rules, laws or regulations; (d) your negligence or willful misconduct; or (e) your alleged or actual infringement of the intellectual property or other rights of third parties. We reserve the right, at your expense, to assume the exclusive defense and control of any matter which you are required to indemnify, and you agree to cooperate in that defense.

    14. Export Control.

    Use of the Protect Services may be subject to the export and import laws of the United States and other countries. You agree to comply with all applicable export and import laws and regulations. By using the Protect Services and/or by downloading the Software, you agree that you are not located in, under the control of, or a resident or national of any country, or person, on the United States Treasury Department's list of Specially Designated Nationals or the United States Commerce Department Table of Deny Orders. You also agree that you are not located in a country that is subject to the U.S. government embargo, or that is designated by the U.S. as a terrorist supporting country and you are not listed on any U.S. government list of prohibited or restricted parties. You agree also not to attempt to export or import any encrypted information, materials, hardware or software.

    15. Additional Terms and Conditions for Mobile Apps Downloaded from the Apple App Store.

    You may only use the Protect App on iOS devices that you own or control, as permitted by the Usage Rules set forth in Apple's App Store Terms of Service. You and We acknowledge that: Apple is not obligated to furnish any maintenance and support services with respect to the Protect App, that Apple and its subsidiaries are third party beneficiaries to this Agreement, and that, upon your acceptance of the terms and conditions of this Agreement, Apple will have the right to enforce this Agreement against you in its capacity as a third party beneficiary to this Agreement. Apple is not responsible for any claims made by you or a third party regarding the Protect App, including intellectual property infringement claims, or your use or possession of the Protect App, including but not limited to (i) product liability claims, (ii) any claim that the Protect App fails to conform to any applicable legal or regulatory requirement, (iii) claims arising under consumer protection or similar legislation, or (iv) claims, losses, liabilities, damages, costs or expenses attributable to any failure of the Protect App to conform to any warranty, express or implied. If the Protect App fails to conform to any warranty, you may notify Apple and Apple may, as your sole and exclusive remedy, refund the amount, if any, that you paid Apple for the Protect App.

Updated April 2026