Content Protection Security Sample Clauses

Content Protection Security. Comcast shall, and shall require each System to, put in place secure and effective security systems, procedures and technologies designed to prevent theft, pirating and unauthorized exhibition (including, without limitation, exhibition to persons who are not Authorized Subscribers and exhibition outside the Territory), unauthorized copying or duplication of any video reproduction or compressed digitized copy of any Included Program. Without limiting the foregoing, Comcast shall, and shall require each System to, at a minimum, meet the Content Protection Requirements and Obligations set forth in Exhibit C. Comcast shall, at Comcast’s expense, and shall require each System to, at each System’s expense, maintain and upgrade such security systems, procedures and technologies (including, without limitation, encryption methods) as are necessary to ensure continued compliance with the Content Protection Requirements and Obligations set forth in Exhibit C.
AutoNDA by SimpleDocs
Content Protection Security. [Sony Reviewing]
Content Protection Security. Comcast will provide the same content protection and security for the Included Programs on each applicable System and Licensed Service that is then distributing Included Programs on a DHE basis as that provided for the theatrical new releases provided for distribution on a DHE basis by other major studios, which, as of the Effective Date, include but may not be limited to Twentieth Century Fox, Lions Gate Entertainment and Universal Studios. Notwithstanding the foregoing, in the event that a content provider pays for, or provides additional consideration to Comcast, in exchange for additional content protection, Comcast shall offer such additional content protection to Studio on the same terms and conditions applicable to such other content provider.
Content Protection Security. Licensee shall at all times strictly comply with the Content Protection Requirements and Obligations attached hereto as Exhibit B and incorporated herein by this reference.
Content Protection Security 

Related to Content Protection Security

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes: a. Systems containing DSHS Data must have all security patches or hotfixes applied within 3 months of being made available. b. The Contractor will have a method of ensuring that the requisite patches and hotfixes have been applied within the required timeframes. c. Systems containing DSHS Data shall have an Anti-Malware application, if available, installed. d. Anti-Malware software shall be kept up to date. The product, its anti-virus engine, and any malware database the system uses, will be no more than one update behind current.

  • Eye Protection Where an employee is required by the College or by legislation, in order to perform his/her duties, to acquire and wear prescription eye protection, the employee shall provide the College with proof of purchase by March 1 each year and the College shall reimburse to such employee, on the first pay day of April in each year, up to a maximum of twenty dollars ($20.00); in situations other than the foregoing, the College, may in its discretion, (which discretion shall not be unreasonably exercised) reimburse such expense where it is recommended by the health and safety committee constituted under the Occupational Health and Safety Act.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Agreement. Contractor shall be responsible to ascertain from the District the rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

  • Aviation Security 1. In accordance with their rights and obligations under international law, the Parties reaffirm that their obligation to each other to protect the security of civil aviation against acts of unlawful interference forms an integral part of this Agreement. Without limiting the generality of their rights and obligations under international law, the Parties shall in particular act in conformity with the provisions of the Convention on Offenses and Certain Other Acts Committed on Board Aircraft, done at Tokyo September 14, 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, done at The Hague December 16, 1970, the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, done at Montreal September 23, 1971, and the Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation, done at Montreal February 24, 1988. 2. The Parties shall provide upon request all necessary assistance to each other to prevent acts of unlawful seizure of civil aircraft and other unlawful acts against the safety of such aircraft, of their passengers and crew, and of airports and air navigation facilities, and to address any other threat to the security of civil air navigation. 3. The Parties shall, in their mutual relations, act in conformity with the aviation security standards and appropriate recommended practices established by the International Civil Aviation Organization and designated as Annexes to the Convention; they shall require that operators of aircraft of their registry, operators of aircraft who have their principal place of business or permanent residence in their territory, and the operators of airports in their territory act in conformity with such aviation security provisions. 4. Each Party agrees to observe the security provisions required by the other Party for entry into, for departure from, and while within the territory of that other Party and to take adequate measures to protect aircraft and to inspect passengers, crew, and their baggage and carry-on items, as well as cargo and aircraft stores, prior to and during boarding or loading. Each Party shall also give positive consideration to any request from the other Party for special security measures to meet a particular threat. 5. When an incident or threat of an incident of unlawful seizure of aircraft or other unlawful acts against the safety of passengers, crew, aircraft, airports or air navigation facilities occurs, the Parties shall assist each other by facilitating communications and other appropriate measures intended to terminate rapidly and safely such incident or threat. 6. When a Party has reasonable grounds to believe that the other Party has departed from the aviation security provisions of this Article, the aeronautical authorities of that Party may request immediate consultations with the aeronautical authorities of the other Party. Failure to reach a satisfactory agreement within 15 days from the date of such request shall constitute grounds to withhold, revoke, limit, or impose conditions on the operating authorization and technical permissions of an airline or airlines of that Party. When required by an emergency, a Party may take interim action prior to the expiry of 15 days.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • OVERDRAFT PROTECTION To the extent permitted by law, You authorize Us to transfer funds from other Accounts You may have with Us in necessary multiples (or in such increments as We may from time to time determine) to Your Account to cover any overdraft. If You have a line of credit with Us, transfers will be made first from Your primary share Account, provided You have enough available funds in that Account, then from Your line of credit up to Your available credit limit, and then We may elect to pay such overdraft, subject to any preference You have indicated to Us for clearing any overdraft(s). Overdraft transfers are subject to a transfer fee. You hold Us harmless from any and all liability which might otherwise exist if a transfer does not occur.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!