Postpaid Plans
Looking for the best postpaid plan in Malaysia? Explore ULTRA Postpaid with unbeatable data, global roaming, ULTRA5G Priority Pass and ULTRA Security.
These Specific Terms and Conditions of Service apply to users who have subscribed to and/or use the services listed below (collectively referred to as the “Service”) as part of the Online Security Program (hereinafter referred to as “Device Security”). The Service is provided by U Mobile Sdn Bhd (“U Mobile”) as part of the ULTRA Security Pro. U Mobile has appointed Bolttech Device Protection Malaysia Sdn Bhd (“Bolttech”) to act as U Mobile’s technology and services partner to facilitate provisioning, access and administration of the Service. The Service includes third-party software and services provided by NortonLifeLock Singapore Pte Ltd (“Norton”) and is made available to you by U Mobile as part of your subscription of ULTRA Security Pro. Certain Norton features are governed by Norton’s License and Services Agreement (“Norton LSA”), which you will accept when activating your Norton account.
For full details of Norton LSA, please refer to the https://be.norton.com/legal/lsa?lsar=apj&lsal=en.
These Specific Terms and Conditions form part of, and shall be read together with, the Terms and Conditions of U Mobile ULTRA Security Pro. In the event of any inconsistency, these Specific Terms and Conditions shall prevail. These Specific Terms and Conditions govern only the individual cyber service described below and operate in addition to, and not in substitution of, the general Terms and Conditions applying to the ULTRA Security Pro.
1. USER AGREEMENT AND ACCESS TO THE SERVICES
1.1 These Specific Terms and Conditions of the Device Security Service (hereinafter the “Terms”) define the terms and conditions governing the User’s use of the Device Security Services (hereinafter the “User”). By using Device Security, you acknowledge and agree that these Terms constitute a legally binding contract between you and U Mobile, except that Norton services are additionally governed by the Norton LSA.
The Service is made available to you by U Mobile as part of the ULTRA Security Pro. You are not required to pay any fees to use the Service, subject to the conditions set out below.
1.2 Eligibility. In addition to any other requirements that U Mobile may define in writing from time to time, you must have an active ULTRA Postpaid Plan, ULTRA Security Pro and must be of legal age in order to subscribe to the Services.
1.3 Enrollment in the Device Security service. Once the subscription of the ULTRA Security Pro has been successfully completed, you must access your account on the U Mobile ULTRA Security Pro hub platform in order to use the Device Security service. With regard to Norton 360 Standard (see below), after activating and installing the application, you will be required to grant the necessary permissions for the performance of the subscribed services. To begin using Device Security, manual activation and installation are required.
1.4 Which products and services can you access? You may use the Services only if you are in possession of a valid and effective Device Security account. As a User, you will have access to the Services and/or ancillary services included in your Device Security account, as listed below.
1.5 Activation of the Device Security Product. To use certain Services included in Device Security, you must first activate the indicated services by providing additional personal information to Norton or to our authorised third-party service providers. The provision of such information is entirely optional; however, if you choose not to provide the requested information or permissions, some of the included Services may not be available and/or you may not be able to benefit from all the features of the Services included in Device Security. Certain packages allow you to register multiple devices, up to the limit specified for your selected Pack, through which you may access the relevant functionalities. By subscribing to the service, you confirm that the information you provide is true and accurate, declare that you are duly authorised to provide such information and to allow monitoring of your accounts, and accept these Terms.
1.6 Unauthorised Access to Your Account. You shall bear sole responsibility for ensuring the security of your access credentials (username and password). You must not share them with third parties and must promptly inform Norton in the event of any unauthorised use thereof. You are also responsible for all activities carried out through your account. You are therefore encouraged to use the Internet safely and to remain vigilant against phishing attempts or other means used by third parties to access your personal data available online.
1.7 Use of the Services and Ancillary Services. You undertake not to use the Services or ancillary services for external commercial purposes or for resale.
1.8 Customer Service. If you have a complaint, please contact our appointed service provider, Bolttech, using the email address and chat available in the U Mobile ULTRA Security Pro hub, indicating that you wish to submit a complaint. Bolttech will receive and handle complaints on our behalf, and we will endeavour to ensure that your complaint is reviewed and resolved as soon as reasonably practicable. Where necessary, your complaint may be referred to other relevant third parties, acting on our behalf, where the complaint concerns a matter outside Bolttech’s direct control. You may also contact Norton customer support directly through the Norton application.
1.9 Governing Law and Jurisdiction. These Terms are governed by Malaysian law. Any dispute arising out of or in connection with this Agreement shall be subject to the exclusive jurisdiction of the Malaysia courts.
2. PREVENTION AND DETECTION PRODUCT SERVICES
2.1 Device Security, provides comprehensive protection for smartphones against malware, ransomware, spyware, and other cyber threats. It includes real-time antivirus, firewall protection, and proactive threat monitoring. It checks your device for malicious software (malware) and viruses. It ensures that no harmful files are allowed to be downloaded or installed on the device.
2.2 Password Manager. In order to use Norton Password Manager, you must create a password-protected vault. We do not retain or store vault passwords; accordingly, if such passwords are lost, they cannot be recovered. Sole responsibility for remembering and safeguarding the vault password rests with you. You may use the vault to store your login credentials, passwords, and login URLs for other websites you visit.
2.3 Safe Search, Safe Search Enhanced, and Safe Web. Safe Search and Safe Web enable you to conduct web or Internet searches in a secure manner. The Safe Search feature may also be accessed via a Norton search bar. For the purpose of ensuring safe browsing and searching, you declare that you authorise the service to access your web content, your email, and other third-party services.
2.4 Safe SMS, protects users from text message-based threats such as phishing links, malicious attachments, and scam messages. It scans incoming SMS for suspicious content and warns users before they interact with harmful links.
2.5 Wifi Security, is focused on protecting your internet connection when you’re on Wi-Fi networks — especially public or unsecured ones. Get notified about Wifi networks under attack by cybercriminals who might eavesdrop on your connection to steal personal data or infect your device with malware.
3. CANCELLATION POLICY
3.1 The Device Security Service shall terminate in the event of cancellation, for any reason, of ULTRA Security Pro. Access to the Device Security Service shall cease immediately upon closure of your ULTRA Security Pro. Your account may also be terminated if U Mobile decides, for any reason, to discontinue offering the Service to its customers.
4. TERM OF THE SERVICE
4.1 Device Security is provided to you for as long as you maintain an active ULTRA Security Pro with U Mobile and for as long as the Device Security is included in the ULTRA Security Pro.
5. SOFTWARE LICENCE TERMS
5.1 Ownership of the Software. The Software (including any versions, revisions, updates, or enhancements thereof) and all accompanying documentation or materials made available in connection with it (including information relating to subscriptions or purchases and product packaging) (collectively, the “Documentation”) are the property of Norton. This includes all Intellectual Property Rights relating to the Software and the Documentation. Any Software provided by Norton is licensed, not sold, and Norton reserves all rights in the Software not expressly granted under these Software License Terms.
5.2 License Grant. Subject to compliance with these Terms, Norton grants you a limited, non-exclusive, non-transferable license, without the right to sublicense, allowing you to download and install one copy of the Software on a mobile device, computer, or tablet owned or controlled by you, and to run such copy of the Software solely for the purpose of accessing and using the Services where the relevant Consumer Services are available for personal, non-commercial use during the applicable Subscription Period.
5.3 Restrictions. You are not authorised to:
i. copy, modify, or create derivative works based on the Software;
ii. distribute, transfer, sublicense, lease, lend, or rent the Software to third parties;
iii. reverse engineer, decompile, or disassemble the Software;
iv. or make the functionality of the Software available to third parties, except and only to the extent expressly permitted by applicable law.
5.4 Single-Device Licence; Authorisation to Make One Archival or Backup Copy. These Terms permit you to install one copy of the Software for use on a single computer, mobile device, or tablet, unless your subscription to the Services expressly provides for use on multiple devices. You may create one copy of the Software for backup or archival purposes, or copy the Software to your computer’s hard drive, provided that the original is retained solely for such purposes.
5.5 Termination. Upon expiration or termination of these Terms, you must cease using and destroy all copies of the Software and the Documentation in your possession.
5.6 Anti-Piracy Measures. The Software may incorporate technological measures designed to prevent unauthorised or unlawful use. You agree that Norton may employ such measures to protect against software piracy (for example, the Software may contain control technologies that limit the number of times it may be installed and uninstalled on a device and/or the number of devices on which it may be installed). If such technological measures are triggered, the Software will function only for a limited period following activation.
During the activation process, you may be required to enter a unique activation code supplied with the Software and the device configuration, in the form of an alphanumeric code transmitted via the Internet, in order to verify the authenticity of the Software. If activation is not completed within the time period specified or within the terms indicated by the Software, the Software will cease to function until activation is completed; once activation is successfully completed, the Software’s functionality will be restored.
If you are unable to activate the Software during the activation process, you may contact Norton User Support Services through the contact details provided during activation or by the Software provider.
5.7 Prohibited Uses of the Services
5.7.1 You may not use the Services for any illegal or fraudulent purposes, including, by way of example and without limitation: port scanning, spam distribution, opt-in email distribution, open relay or open proxy scanning, transmission of unsolicited emails or any version or type of bulk email, even if relayed through third-party servers; pop-ups; use of stolen credit cards; credit card fraud; financial fraud; cryptocurrency fraud; cloaking; extortion; blackmail; kidnapping; rape; murder; sale of stolen credit cards; sale of stolen goods; offering or selling prohibited, military, or dual-use materials; offering or selling controlled substances; identity theft; hacking; pharming; scraping in any form or at any scale; digital piracy; infringement of intellectual property rights or similar activities; or to harass, stalk, threaten, harm, or monitor other individuals, or to exploit children in any way, in particular through audio, video, photographs, digital content, or other media.
You agree to use the Services in compliance with all applicable laws and regulations.
5.7.2 You may not use or access Consumer Services for commercial purposes, but only for personal or household use. You may not use or access Business Services other than exclusively for internal business purposes. Unless otherwise expressly permitted below, you may not access, use, or share Consumer Services with family members, persons outside your household, or any third parties who do not reside with you, nor may you access, use, or share Business Services with persons other than your employees or members of your small business.
You may not share data or other content with an unreasonably large number of persons, including, by way of example and without limitation, sending mass communications to multiple recipients or sharing content with individuals you do not know or who do not know you.
5.7.3 You may not distribute, publish, copy, use, or sell, nor permit others to distribute, publish, copy, use, or sell the Software or the Services. You may not reverse engineer, decompile, disassemble, modify, or create derivative works from the Software or the Services, except and solely to the extent expressly permitted by applicable law. You must comply with any technical limitations of the Software and the Services. You may not make more copies of the Software than permitted under these Terms or by applicable law.
5.7.4 You may not sublicense, rent, lease, or lend the Software or the Services. You may not, nor are you authorised to permit others to, provide, offer, or make available the Services under facility management agreements, timesharing arrangements, service bureau arrangements, or third-party service provision agreements.
5.7.5 You may not transmit or store material that infringes intellectual property rights or other rights of third parties, nor material that is illegal, unlawful, defamatory, libellous, or invasive of others’ privacy. You may not transmit any material containing viruses or other harmful computer code, files, or programs, including Trojan horses, worms, or time bombs.
5.7.6 You may not attack, interfere with, or otherwise deny service to any other network, computer, or node through the Services, nor attempt to gain unauthorised access to any Service, other users’ accounts, computer systems, or networks connected to the Services, nor circumvent measures implemented to prevent or restrict access to such Services. You may not interfere with or disrupt the operation of servers or networks connected to the Services.
5.7.7 You may not use the Services for military purposes, including cyber warfare, weapons development, or the design, manufacture, or production of missile systems or nuclear, chemical, or biological weapons.
6. OUR LIABILITY FOR ANY LOSSES OR DAMAGES SUFFERED BY THE USER
6.1 Exclusion of Liability for Losses. We shall not be liable to you for any loss of profits or revenues, loss of use, loss of business opportunities, or for any indirect loss or damage and/or loss that was not reasonably foreseeable at the time these Terms were entered into. We shall also not be liable for any loss of Data, including Personal Data or any other information contained in databases, physical storage media, or devices for which assistance is requested.
6.2 Exclusion of Liability for Delays Beyond Our Reasonable Control. Despite our commercially reasonable efforts to provide the Services and ancillary services, delays or periods of unavailability may occur due to events beyond our reasonable control. In the event of delay in the performance of the Services or ancillary services due to such events, we will promptly inform you and take reasonable steps to minimize their impact. Under no circumstances shall we be liable for delays caused by events beyond our reasonable control.
6.3 Reasonable Efforts Obligation. We are bound by an obligation to use reasonable efforts in relation to the performance of the Services. We cannot guarantee absolute protection of data or protected devices, nor the systematic detection of harmful events. In no event is the definitive resolution of a reported incident guaranteed. By accepting these Terms, you acknowledge that we are not responsible for any losses, direct or indirect, relating to your data or devices.
6.4 Limitation of Liability. Under no circumstances shall this Agreement extend to include liability for personal injury or property damage, loss of profit, incidental, contingent, special, or consequential damages, nor for direct or indirect losses, including, by way of example and without limitation, those arising from delays in the provision of any of the Services governed by these Terms.
6.5 Content Updates. Certain Services rely on content that is subject to periodic updates, such as virus definitions, anti-spyware definitions, anti-spam rules, URL lists, firewall rules, vulnerability data, and updated lists of authenticated web pages (collectively, “Content Updates”). You will have access to the Content Updates applicable to the Services for the duration of your subscription period.
We reserve the right to modify or discontinue, in whole or in part, the Services at any time, with or without notice. We also reserve the right to establish and amend eligibility criteria for the Services at any time.
6.6 Intellectual Property Rights
6.6.1 With reference to the agreement in force between you and Norton, Norton owns and retains all right, title, and interest in and to the Services (including the Software), including all Intellectual Property Rights. For the purposes of these Terms, “Intellectual Property Rights” means rights in patents (including, by way of example and without limitation, patent applications and disclosures), inventions, copyrights, trade secrets, moral rights, know-how, data and database rights, as well as any other intellectual property rights recognised in any country or jurisdiction worldwide.
6.6.2 Norton’s policy provides for responding to notices of alleged infringement of Intellectual Property Rights, which may result, depending on the circumstances and at our discretion, in the suspension of the user’s authorisation to transmit and/or store materials deemed to be related to unlawful activities and/or the permanent disabling of access to the application. You are encouraged to consult the policy related to the Digital Millennium Copyright Act of 1998 (the “DMCA”) at the following link.
6.7 Suspension. Without prejudice to the foregoing, Norton may, without prior notice, suspend your account or prevent access to and use of the Services if it reasonably believes that you have failed to comply with any of the provisions of these Terms.
7. DATA PROTECTION
7.1 Your Personal Data, or the Personal Data of third parties provided by you, will be processed in the course of using the Program. You are responsible for ensuring that you have obtained the necessary consent before providing the Personal Data of third parties when using the Program. It is prohibited to enter another individual’s personal information into the Device Security Service or into other Products without their authorisation.
8. DEFINITIONS
Consumer Services: the elements of the Device Security Service intended solely for personal and household use, including but not limited to device security features, safe browsing tools, password management, and other Norton‑powered functionalities provided for non‑commercial purposes.
Data: all information and documents, whether or not containing Personal Data, stored on computer equipment.
Personal Data: the term has the meaning attributed to “personal data” under the Personal Data Protection Act 2010 and all applicable Malaysian data protection laws and regulations.
Physical Storage Media: hardware storage media, such as hard drives, USB flash drives, or memory cards.
Program: the combination of Device Security Service included in your Device Security subscription.
Software: the Norton security software (including any versions, updates, revisions, patches, enhancements, and associated modules) made available to you as part of the Device Security Service, together with any related documentation or materials.
Subscription Period: the continuous period during which you maintain an active ULTRA Security Pro subscription that includes the Device Security Service, starting from the date you successfully activate the Device Security Service and ending upon cancellation or expiry of your subscription of ULTRA Security Pro and/or discontinuation of the Device Security Service by U Mobile.
U Mobile Ultra Security Pro hub: the digital platform provided by U Mobile which Subscribers may access, manage, and receive ancillary services relating to U Mobile ULTRA Security Pro.
User: a customer who meets the relevant eligibility requirements, has successfully completed the subscription of ULTRA Security Pro with U Mobile, and has enrolled in the Device Security Program.
We: Any reference to “we”, “us” or “our” in relation to the provision of services means U Mobile, acting directly or through its appointed Service Providers.
Version: 14 April 2026
Whether it’s through the MyUMobile App or social media, getting in touch is quick and easy.
Enjoy a better, faster and safer experience today!
Drop us your message on Messenger.
Have questions? Feel free to DM us!
{{deviceBrand}}
{{deviceModel}}
{{deviceBrand}}
{{deviceModel}}