Anti-Piracy. In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditiona...
Anti-Piracy. (i) In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part (hereinafter collectively referred to as “Piracy”), the Operator shall, prior to the commencement of the Term of the Agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as “Security Systems”)and security specifications as are set forth in Schedule 2 of this Agreement and/oras may be specified, in a non-discriminatory manner in writing, from time to time, by KMSPL.The Operator granting access to the Subscribed Channels to subscribers outside the Area through itsdigital Addressable Systemshall tantamount tothe Operator allowing unauthorized access to the Subscribed Channels.
(ii) To ensurethe Operator‟s ongoing compliance with the security requirements set out in the Agreement, KMSPLmay require technical audits (“Technical Audit(s)”) conducted by an independent security technology auditor (“Technical Auditor”), approved by KMSPLin writing no more than twice per year during the Term, at KMSPL‟s cost and expense. An indicative scope of audit is laid down in Annexure E to this Agreement. If the results of any Technical Audits are not found to be satisfactory by either the Operator or KMSPL, then KMSPLshall work withthe Operator in resolving such issues in the next fourteen (14) business days. If a solution is not reached at by then, KMSPLmay, in its sole discretion, suspend the Operator‟s right to distribute the Subscribed Channels or take other actions as provided under the Agreement, until such systems, procedures and security measures have been corrected to KMSPL‟s satisfaction.The Operator shall bear the cost and expense of any subsequent Technical Audit to verify that the systems, procedures and security measures have been corrected by the Operator to KMSPL‟s satisfaction.
(iii) The Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed/transmitted through itsdigital Addressable System at least every 10 minutes on 24 x 7 x 365(6) basis.
(iv) The Operator shall not authorize, cause or suffer any portion of any of the Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose ...
Anti-Piracy. You must not engage in the manufacture, use, distribution or transfer of counterfeit, pirated or illegal software. You may not distribute or transfer Licensed Products to any party that You know is engaged in these activities. You must report to Microsoft any suspected counterfeiting, piracy or other intellectual property infringement in computer programs, manuals, marketing materials or other materials owned by Microsoft, its Affiliates and/or its licensors as soon as You become aware of it. You will cooperate with Microsoft in the investigation of any party suspected of these activities.
Anti-Piracy. Software piracy is illegal and NCSS, LLC and its affiliates reserve the right to take all legal steps to stop piracy of their products and pursue those who take part in these activities. As part of these anti-piracy efforts, the Software may contain security mechanisms intended to detect the installation or use of illegal copies of the Software and collect and transmit data relating to those illegal copies, and installation or use thereof, to NCSS, LLC and/or its affiliates, and/or their agents, contractors, suppliers, successors and assigns. PASS may use your internal network and Internet connection for the purpose of transmitting license-related data at the time of installation, registration, use of or update to the Software, and for validating the authenticity of the license related data in order to register your Software and protect NCSS, LLC against unlicensed or illegal use of the Software. By installing or using the PASS Software, Customer agrees to such detection, collection and transmission, as well as to the use of such data, for the purposes of identifying illegal usage and protecting and enforcing intellectual property rights.
Anti-Piracy. Software piracy is illegal and XXX.Xxxxxxxx Corporation and its affiliates reserve the right to take all legal steps to stop piracy of their products and pursue those who take part in these activities. As part of these anti- piracy efforts, the Software may contain security mechanisms intended to detect the installation or use of illegal copies of the Software, and collect and transmit data relating to those illegal copies, and installation or use thereof, to XXX.Xxxxxxxx Corporation and/or its affiliates, and/or their agents, contractors, suppliers, successors and assigns. By installing or using the Software, Customer agrees to such detection, collection and transmission, as well as to the use of such data, for the purposes of identifying illegal usage and protecting and enforcing intellectual property rights.
Anti-Piracy. Refurbisher must not engage in the distribution of counterfeit or pirated Software. If Refurbisher suspects any infringement of Microsoft intellectual property, it must report it to Microsoft as soon as possible. Refurbisher must also cooperate with the investigation.
Anti-Piracy. (a) Executive agrees for the duration of the Severance Period, Executive will not, directly or indirectly, encourage, contact, or attempt to induce any employees of Nucor (i) with whom Executive had regular contact with as of the Effective Date, and (ii) who are employed by Nucor at the time of the encouragement, contact or attempted inducement, to end their employment relationship with Nucor.
(b) Executive further agrees for the duration of the Severance Period not to hire for any reason any employees described in Paragraph 7(a) of this Agreement.
Anti-Piracy. Customer acknowledges that the Software may contain a security and reporting mechanism (“Security Mechanism”) intended to automatically collect and transmit to Hexagon and its affiliates (and their contractors, representatives, successors and assigns) data relating to the installation and usage of the Software, for purposes of verifying user compliance with the terms of the applicable license agreement, identifying unauthorized use and users, and otherwise protecting and enforcing intellectual property rights. Data collected and transmitted through the Security Mechanism may include, without limitation, user, device, and network identification information such as, but not limited to, email address, username, hostname, MAC address, IP address, Wi-fi SSID, geolocation and organization domain information, as well as information on Software usage, including product name, version, and time and number of uses. For further information on Hexagon’s use and processing of personal data transmitted and collected through the Security Mechanism, see the Hexagon Manufacturing Intelligence privacy statement, as may be updated from time to time, available at xxx.xxxxxxxxxxx.xxx (or successor web pages).
Anti-Piracy. JNCAAM shall not engage in the manufacture, use, distribution, supply, marketing, or promotion of any counterfeit, pirated, or illegal Juniper products, including, but not limited to, software or Course Materials, and if suspected or accused of being involved in such activities, will assist Xxxxxxx as reasonably necessary in the investigation and resolution of the matter.
Anti-Piracy. Piracy is a criminal offence under law and reproduction, distribution, publication, copying, downloading or exploitation of any Company Hardware or the content transmitted through the Company Hardware is strictly discouraged by the Company. In furtherance to this intent, Company, with or without notification to the Subscriber, may deploy security measures to detect piracy or any unlawful activity that may be conducted in association to the Services or the Company Hardware provided by the Company. These security measures could include without limitation fingerprinting mechanism and monitoring of all activities connected to the service including usage of the Services or the Company Hardware under this Contract. Company reserves the right to enter the premises to inspect and audit the premises without any prior notification. Company has the right to immediately deactivate, cancel and terminate the Service and/or this Contract and/or repossess the Company Hardware including any connected devices, information or documents. The forgoing rights shall be in addition to all the other rights that the Company may have under the law including without limitation initiating proceedings including legal proceedings, sharing information with the enforcement agencies.