Content Protection. (a) Apple shall protect materials furnished by Publisher in a manner no less restrictive than Apple protects materials furnished by any other book publisher, including the use of the Security Solution, and the implementation and enforcement of Content Usage Rules, as set forth in Exhibit E, except as otherwise agreed by Publisher and Apple. Notwithstanding the foregoing, on a title-by-title and country-by-country basis, using iTunes Connect or via other technical means provided and approved by Apple, Publisher may instruct Apple to make eBooks available hereunder without the Security Solution. If the Security Solution is compromised such that eBooks are being made widely available without restriction, having a material adverse effect on the commercial purpose of the appointment and this Agreement, then Apple shall use commercially reasonable efforts to cure such compromise. If the breach is not substantially cured within thirty (30) days, then Publisher may stop providing additional New Releases to Apple, and if the breach is not substantially cured within sixty (60) days, then Publisher may suspend Apple’s appointment until cured.
(b) In the event of a security breach of the Online Store servers such that unauthorized access to Publisher Content becomes available, then Apple will disable all access to such servers or destroy content on such servers within twenty-four (24) hours.
(c) Publisher Materials in Apple’s control or possession shall reside only on secure network servers or equivalent devices owned or controlled by Apple or its contractors with restricted access.
Content Protection. 52 6.11.1 Content Protection (Esafe) Administration .............. 52 6.12
Content Protection. AND USAGE RULES Licensee shall at all times comply with the Content Protection Requirements and Usage Rules with respect to all Programs. The Programs designated as SEL Programs in Exhibit A (the “SEL Programs”) shall be made available to Eligible Consumers who validate/authenticate their Approved Devices with Licensee’s service for no additional charge by the delivery from Licensee or its vendors of a decryption key to such Eligible Consumers after they have completed such validation/authentication. All other Programs (“SEN Programs”) shall only be viewable by Eligible Consumers who purchase a decryption key for an additional charge per Program per transaction through Sony Entertainment Network (“SEN”), which transaction shall be subject to the terms and conditions of another agreement between Licensor and SEN. The Content Protection Requirements and Usage Rules shall be non-precedential with respect to any future agreement between the parties that permits programs to be delivered via other means of delivery. LICENSE FEE Licensee shall pay to Licensor a wholesale fee of $25.50 for each SEL Program per Approved Device distributed to an Eligible Consumer and not returned (collectively for all SEL Programs on all Approved Devices, the “License Fees”). The License Fees shall be payable regardless of whether decryption keys are sent to or used by Eligible Consumers or whether Programs are viewed by Eligible Consumers. By way of example, if Licensee distributes 400 Approved Devices with all SEL Programs loaded thereon and no Approved Devices are returned, Licensee will owe Licensor a total of $102,000 (i.e., $25.50 multiplied by 10 SEL Programs, multiplied by 400 Units). No deductions of any kind are permitted before remitting payment to Licensor (including any tax, levy or charge, the payment of which shall be the responsibility of Licensee). For the avoidance of doubt, the price charged by Licensee for each Approved Device shall be established by Licensee in its sole and absolute discretion; provided that Licensee shall not charge any per transaction or per program fee for any Programs. AGREED TO AND ACCEPTED: Sony Electronics Inc. Sony Pictures Home Entertainment Inc. By Title By Title
Content Protection. HP-OMS will provide Full Support for content protection of the Customer with proactive, multi-tiered Internet Content Security for gateway and mail servers, protecting the entire IT Environment from: o Viruses, Trojans, worms, blended threats, and other malicious code that destroys or steals digital assets o Security exploits in corporate email servers and email clients HP-OMS will provide content protection Services according to the Customer Security Policy that will be defined by the customer. In addition HP-OMS will make changes to the content protection Services according to changes that will be approved by the Change Management process.
Content Protection. Schedule C - Content Protection Requirements and Obligations - of the Agreement shall be deleted in its entirety and replaced with the attached Schedule C – Content Protection Requirements and Obligations.
Content Protection. (a) APPLE shall use the Security Solution, which shall : (i) be no less protective than, and the same as, the protection system used to protect any similar third party content Sold on the Online Store, and (ii) offer a level of protection not less than the level of protection afforded by Fairplay as of the Effective Date. If the Security Solution, including the keys that form components thereof, is compromised such that Videos have been unencrypted and are being widely made available without restriction, or such keys have been cloned and are being widely made available, causing an adverse material effect on the commercial intent of this Agreement or on the integrity or security of the SUPPLIER Content, then APPLE shall use commercially reasonable efforts, taking into account the severity of the breach, to remedy the breach and, at a minimum, restore the level of content protection afforded by the Security Solution to the level existing prior to such compromise of the Security Solution, within a reasonable period of time following APPLE’s receipt of notice thereof, not to exceed thirty (30) days (“Cure Period”), and shall notify SUPPLIER of such restoration of security. If the level of content protection by the Security Solution is not restored during the Cure Period to the reasonable satisfaction of SUPPLIER, then SUPPLIER shall provide notice thereof to APPLE. As soon as practicable after receipt of such notice, APPLE shall temporarily suspend selling Videos until such level of content protection is restored. Notwithstanding anything to the contrary, except as provided in Section 12(d) below, the foregoing shall constitute APPLE’s sole obligation and SUPPLIER’s sole remedy from APPLE in the event of such a security breach affecting the Security Solution.
(b) Notwithstanding anything to the contrary, in the event that APPLE receives notice of a security breach of the servers or network components that store SUPPLIER Content on the Online Store such that unauthorized access to SUPPLIER Content becomes available via the Online Store, then APPLE will disable the ability to purchase, and offer the Sale of, Videos embodying SUPPLIER Content via the Online Store within twenty-four (24) hours following APPLE’s receipt of notice thereof, which shall be APPLE’s sole obligation and, except as provided in Section 12(d) below, SUPPLIER’s sole remedy from APPLE in the event of such a security breach of such servers or network.
(c) SUPPLIER Content in APPLE’s control or...
Content Protection. (a) If the Security Solution is compromised such that COMPANY’s Concert Films have been unencrypted and are being widely used without restriction, having an adverse material effect on the commercial intent of this Exhibit H, then ITUNES shall use commercially reasonable efforts to return the level of content protection by the Security Solution to the level existing prior to such compromise of the Security Solution within a reasonable period of time following ITUNES’ receipt of notice thereof, not to exceed 30 days (“Cure Period”). If the level of content protection by the Security Solution is not restored during the Cure Period, then ITUNES shall temporarily suspend selling COMPANY’s Concert Films until such level of content protection is restored. The foregoing shall constitute ITUNES’ sole obligation and COMPANY’s sole remedy from ITUNES in the event of such a security breach.
(b) In the event that ITUNES receives notice of a security breach of the servers or network components that store COMPANY’s Concert Films on the Online Store such that unauthorized access to COMPANY’s Concert Films becomes available via the Online Store, then ITUNES will temporarily disable the availability of COMPANY’s Concert Films via the Online Store within 24 hours following ITUNES’ receipt of notice thereof until such time as ITUNES restores the level of content protection to the level existing prior to the security breach. The foregoing shall constitute ITUNES’ sole obligation and COMPANY’s sole remedy from ITUNES in the event of such a security breach.
Content Protection. 12.1. Podcaster Content that You provide to Apple hereunder shall not include any digital rights management solution. For the avoidance of doubt, the RSS Content that you make available in Apple Podcasts is not subject to this Section 12.
12.2. Apple shall protect materials You furnish pursuant to Section 12.1 in a manner no less restrictive than Apple protects materials furnished by any other podcast content provider, including the use of the Security Solution, except as otherwise agreed by You and Apple. If the Security Solution is compromised such that Podcaster Content is being made widely available without restriction, having a material adverse effect on the commercial purpose of the appointment hereunder, then Apple shall use commercially reasonable efforts to cure such compromise. If the compromise is not substantially cured within thirty (30) days, then You may stop providing additional Podcaster Content, and if the compromise is not substantially cured within sixty (60) days, then You may suspend Apple’s appointment until cured.
12.3. Podcaster Content in Apple's control or possession shall reside only on secure network servers or equivalent devices owned or controlled by Apple or its contractors with restricted access.
12.4. In the event of a security breach of the Apple Podcasts’ servers such that unauthorized access to Podcaster Content becomes available, then Apple will disable all access to such servers or destroy content on such servers within twenty-four (24) hours.
Content Protection. 8.1 These Clauses 8.1 to 8.8 (inclusive) shall only apply in the circumstances where a Content Schedule provides that Vodafone is responsible for providing the agreed level of protection for the Content.
8.2 Vodafone shall put in place the agreed DRM specified in the DRM Guidelines.
8.3 Nothing in this Master Agreement or any Content Schedule or Contract shall affect any rights of action that the Content Provider or any Vodafone Group Company may have under any applicable law in the Territory against:
8.3.1 the circumvention of the DRM put in place by Vodafone pursuant to Clause 8.2 or other technological measures put in place by the Content Provider pursuant to Clause 9.6;
8.3.2 any device, product or component or the provision of services for circumvention of such DRM or other technological measures;
8.3.3 removal or alteration of any Rights associated with Protected Content; or
8.3.4 distribution, importation, broadcasting, communication or making available to the public of Protected Content from which Rights have been removed or altered without authority (collectively, the "Anti-Circumvention Rights").
8.4 For the avoidance of doubt, neither VGSL, nor any Vodafone Group Company is obliged to exercise its Anti-Circumvention Rights in relation to the Protected Content.
8.5 The Content Provider acknowledges that in order to carry out its obligations under this Clause 8, Vodafone may need to:
8.5.1 substantially adapt any Protected Content distributed via the Vodafone Network to make it or a part of it deliverable to the recipient's Mobile Device; or
8.5.2 override any copy protection or similar measures incorporated into the Content delivered to VGSL or Vodafone (including without limitation copy protection measures supported by SMAF formats) to make such Content deliverable to Customers as Protected Content.
8.6 The Content Provider provides its irrevocable consent to any such adaptation or overriding undertaken as Vodafone may reasonably determine is necessary for the purpose of transmission or delivery of the Content and to any transient copying undertaken in the process of transmission or delivery. The Content Provider agrees that the existence and validity of this Master Agreement shall be conditional upon such consent. For the purposes of this Clause 8.6 and Clause 8.5.1 the term “adaptation” includes, without limitation, the conversion of a video message into a series of still images, the removal of all or part of the Content and the insertion of a...
Content Protection. A Placeshifting-Enabled STB that outputs a Licensed Picture in the Approved Format pursuant to this Amendment #2 must:
2.4.1 Protect and encrypt the Licensed Picture using the Widevine digital rights management that Widevine represents is Ultraviolet certified (or that a comparable digital rights management provider has represented is certified to a comparable level of security)DRM with the settings set forth in Schedule A attached hereto and meeting the compliance and robustness rules associated with the Widevine DRM as approved by the Digital Entertainment Content Ecosystem (DECE);. and
2.4.2 Map the copy control information associated with each Licensed Picture; the copy control information (CCI) shall be set to “copy never”.;
2.4.3 Deliver to the Approved Placeshifting Device system renewability messages from time to time obtained from Widevine Technologies, Inc. in a protected manner (to the extent Widevine has the means to deliver such system renewability messages in such manner); and
2.4.4 Perform such additional functions as may be reasonably required by Licensor to effectuate the appropriate content protection functions of the Approved Delivery Means in accordance with 2.4.1 through 2.4.3 above.