Enhanced Security. In addition to the requirement of 3.4(a) above, confidentiality of Device Keys shall be protected via (a) implementation of Proactive Renewal or (b) a method that is clearly designed to prevent attempts to discover or reveal such values solely using electronically distributable means.
Appears in 3 contracts
Samples: Interim Content Participant Agreement, Aacs Interim Adopter Agreement, Interim Content Provider Agreement
Enhanced Security. In addition to the requirement of 3.4(a7.4 (a) above, confidentiality of Device Keys shall be protected via via
(a) implementation of Proactive Renewal or or,
(b) a method that is clearly designed to prevent attempts to discover or reveal such values in each case solely using electronically distributable means.
Appears in 1 contract
Samples: Aacs Content Provider Agreement
Enhanced Security. In addition to the requirement of 3.4(a7.4 (a) above, confidentiality of Device Keys shall be protected via via
(a) implementation of Proactive Renewal or or, Not for execution
(b) a method that is clearly designed to prevent attempts to discover or reveal such values in each case solely using electronically distributable means.
Appears in 1 contract
Samples: Aacs Content Provider Agreement