Generic Internet and Mobile Streaming Requirements Sample Clauses

Generic Internet and Mobile Streaming Requirements. The requirements in this section 9 “Generic Internet and Mobile Streaming Requirements”apply in all cases where Internet streaming is supported. Streams shall be encrypted using AES 128 (as specified in NIST FIPS-197) or other robust, industry-accepted algorithm with a cryptographic strength and key length such that it is generally considered computationally infeasible to break. Encryption keys shall not be delivered to clients in a cleartext (un-encrypted) state. The integrity of the streaming client shall be verified before commencing delivery of the stream to the client. Licensee shall use a robust and effective method (for example, short-lived and individualized URLs for the location of streams) to ensure that streams cannot be obtained by unauthorized users. The streaming client shall NOT cache streamed media for later replay but shall delete content once it has been rendered. The requirements in this section “Apple http live streaming” only apply if Apple http live streaming is used to provide the Content Protection System. Use of Approved DRM for HLS key management. Licensee shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules) for protection of Licensor content between Licensee servers and end user devices but shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Licensor under section 2 of this Schedule. Http live streaming on iOS devices may be implemented either using applications or using the provisioned Safari browser, subject to requirement “Use of Approved DRM for HLS Key Management” above. Where the provisioned HLS implementation is used (e.g. so that native media processing can be used), the connection between the approved DRM client and the native HLS implementation shall be robustly and effectively secured (e.g. by mutual authentication of the approved DRM client and the native HLS implementation). The m3u8 manifest file shall only be delivered to requesting clients/applications that have been authenticated as being an authorized client/application. The streams shall be encrypted using AES-128 encryption (that is, the METHOD for EXT-X-KEY shall be ‘AES-128’). The content encryption key shall be delivered via SSL (i.e. the URI for EXT-X-KEY, the URL used to request the content...
AutoNDA by SimpleDocs
Generic Internet and Mobile Streaming Requirements. The requirements in this section “Generic Internet and Mobile Streaming Requirements” apply in all cases where Internet streaming is supported. Except for the first 2 minutes, 13 seconds of consecutive footage, encryption shall be applied to the entirety of A/V data in accordance with this schedule. The streaming client shall NOT store streamed media after the playback session has ended except as set forth in section 3.2 (Instant Playback). Any storage of streamed media shall be under the protection of an Approved Content Protection System.. The requirements in this section “Implementation of an Approved Content Protecton System on iOS” only apply for implementations of an Approved Content Protection System on iOS devices. The connection between the approved DRM client and the native Quicktime player shall be secured via a cryptographically secure mutual authentication. The streams between the approved DRM client and the native Quicktime player shall be encrypted using AES-128.. Output of the stream from the receiving device shall not be permitted unless this is explicitly allowed elsewhere in the schedule. Output of the Licensed Content over AirPlay Streaming is allowed in Standard Definition if AirPlay Link Encryption is used to protect interactions between the iOS device and the Apple TV, provided that Amazon may not output Licensed Content via AirPlay Streaming as set forth in this subsection unless Amazon has approval for such output from three Major Studios with respect to feature films licensed by such Major Studios for distribution on the Service. The client shall NOT cache streamed media for later replay iOS applications shall include functionality which detects if the iOS device on which they execute has been “jailbroken” and shall disable all access to protected content and keys if the device has been jailbroken, provided that Amazon may deliver Included Programs to iOS devices without detecting if iOS devices are jailbroken as set forth in this subsection if Amazon has approval for such delivery from three Major Studios with respect to content licensed from such Major Studios for distribution on the Service. Pre-Approved Hardware Based Streaming Formats: Real Time Messaging Protocol Encrypted (RTMPe) enabled by Flash Media Server version 3.06 or later. Amazon may use RTMPe in connection with Hardware-Based DRM Streaming Devices only that were manufactured on or prior to December 31, 2012, and were either LG Connected TVs or Connected Blu-rays P...
Generic Internet and Mobile Streaming Requirements. The requirements in this Section 2 shall apply in all cases when Included Programs are distributed via Internet Streaming.
Generic Internet and Mobile Streaming Requirements. The requirements in this section 9 “Generic Internet and Mobile Streaming Requirements”apply in all cases where Internet streaming is supported.
Generic Internet and Mobile Streaming Requirements. The requirements in this Section 2 shall apply in all cases when Included Programs are distributed via Internet Streaming. 2.1. Streams shall be encrypted using (a) AES 128 (as specified in NIST FIPS-197) or (b) other robust, industry-accepted algorithm with a cryptographic strength and key length such that it is generally considered at least as robust as AES 128. 2.2. Encryption keys shall not be delivered to clients in a cleartext (un-encrypted) state. 2.3. The integrity of the Streaming client shall be verified before permitting playback functionality for the Streaming of the Included Program. 2.4. Comcast shall use a robust and effective method (for example, short-lived and individualized URLs for the location of streams) to ensure that streams cannot be obtained by unauthorized users for playback in a manner not permitted by this Agreement. 2.5. For Streamed Included Programs, Comcast shall NOT configure the playback client to cache Streamed media for later replay (i.e., playback after the Included Program is complete), but shall configure the playback client to not permit playback of any cached portion of the Included Program once it has been completed.
Generic Internet and Mobile Streaming Requirements. The requirements in this section 9 9 “Generic Internet and Mobile Streaming Requirements”apply in all cases where Internet streaming is supported. Streams shall be encrypted using AES 128 (as specified in NIST FIPS-197) or other robust, industry-accepted algorithm with a cryptographic strength and key length such that it is generally considered computationally infeasible to break. Encryption keys shall not be delivered to clients in a cleartext (un-encrypted) state. The integrity of the streaming client shall be verified before commencing delivery of the stream to the client. Licensee shall use a robust and effective method (for example, short-lived and individualized URLs for the location of streams) to ensure that streams cannot be obtained by unauthorized users. The streaming client shall NOT cache streamed media for later replay but shall delete content once it has been rendered.

Related to Generic Internet and Mobile Streaming Requirements

  • THIRD PARTY WEBSITES AND CONTENT The Website contains (or you may be sent through the Website or the Company Services) links to other websites ("Third Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software and other content or items belonging to or originating from third parties (the "Third Party Content"). Such Third Party Websites and Third Party Content are not investigated, monitored or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third Party Websites accessed through the Website or any Third Party Content posted on, available through or installed from the Website, including the content, accuracy, offensiveness, opinions, reliability, privacy practices or other policies of or contained in the Third Party Websites or the Third Party Content. Inclusion of, linking to or permitting the use or installation of any Third Party Website or any Third Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Website and access the Third Party Websites or to use or install any Third Party Content, you do so at your own risk and you should be aware that our terms and policies no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Website or relating to any applications you use or install from the Website. Any purchases you make through Third Party Websites will be through other websites and from other companies, and Company takes no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. Company reserves the right but does not have the obligation to:

  • PARTY WEBSITES AND CONTENT The Site may contain (or you may be sent via the Site) links to other websites ("Third- Party Websites") as well as articles, photographs, text, graphics, pictures, designs, music, sound, video, information, applications, software, and other content or items belonging to or originating from third parties ("Third-Party Content"). Such Third-Party Websites and Third-Party Content are not investigated, monitored, or checked for accuracy, appropriateness, or completeness by us, and we are not responsible for any Third-Party Websites accessed through the Site or any Third-Party Content posted on, available through, or installed from the Site, including the content, accuracy, offensiveness, opinions, reliability, privacy practices, or other policies of or contained in the Third-Party Websites or the Third-Party Content. Inclusion of, linking to, or permitting the use or installation of any Third-Party Websites or any Third-Party Content does not imply approval or endorsement thereof by us. If you decide to leave the Site and access the Third-Party Websites or to use or install any Third-Party Content, you do so at your own risk, and you should be aware these Terms and Conditions no longer govern. You should review the applicable terms and policies, including privacy and data gathering practices, of any website to which you navigate from the Site or relating to any applications you use or install from the Site. Any purchases you make through Third- Party Websites will be through other websites and from other companies, and we take no responsibility whatsoever in relation to such purchases which are exclusively between you and the applicable third party. You agree and acknowledge that we do not endorse the products or services offered on Third-Party Websites and you shall hold us harmless from any harm caused by your purchase of such products or services. Additionally, you shall hold us harmless from any losses sustained by you or harm caused to you relating to or resulting in any way from any Third-Party Content or any contact with Third-Party Websites.

  • Licensing Requirements (a) Employer and Employee hereby covenant and agree that this Agreement and/or Employee’s employment may be subject to the approval of one or more gaming regulatory authorities (the “Authorities”) pursuant to the provisions of the relevant gaming regulatory statutes (the “Gaming Acts”) and the regulations promulgated thereunder (the “Gaming Regulations”). Employer and Employee hereby covenant and agree to use their best efforts to obtain any and all approvals required by the Gaming Acts and/or Gaming Regulations. In the event that (i) an approval of this Agreement or Employee’s employment by the Authorities is required for Employee to carry out Employee’s duties and responsibilities set forth in Section 3 of this Agreement, (ii) Employer and Employee have used their best efforts to obtain such approval, and (iii) this Agreement or Employee’s employment is not so approved by the Authorities, then this Agreement shall immediately terminate and shall be null and void, thus extinguishing any and all obligations of either party, subject to any surviving obligations of Employee under Sections 9, 10 and 21. (b) If applicable, Employer and Employee hereby covenant and agree that, in order for Employee to discharge the duties required under this Agreement, Employee must apply for or hold a license, registration, permit or other approval (the “License”) as issued by the Authorities pursuant to the terms of the relevant Gaming Act and as otherwise required by this Agreement. In the event Employee fails to apply for and secure, or the Authorities refuse to issue or renew Employee’s License, Employee, at Employer’s sole cost and expense, shall promptly defend such action and shall take such reasonable steps as may be required to either remove the objections or secure or reinstate the Authorities’ approval, respectively. The foregoing notwithstanding, if the source of the objections or the Authorities’ refusal to renew or maintain Employee’s License arise as a result of any of the acts, omissions or events described in Section 1(c) of this Agreement, then Employer’s obligations under this Section 8 also shall not be operative and Employee shall promptly reimburse Employer upon demand for any expenses incurred by Employer pursuant to this Section 8. (c) Employer and Employee hereby covenant and agree that the provisions of this Section 8 shall apply in the event Employee’s duties require that Employee also be licensed by governmental agencies other than the Authorities.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Links to Third Party Sites/Third Party Services xxx.xxxxxxxxxxxxxxxxxx.xxx may contain links to other websites ("Linked Sites"). The Linked Sites are not under the control of Company and Company is not responsible for the contents of any Linked Site, including without limitation any link contained in a Linked Site, or any changes or updates to a Linked Site. Company is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by Company of the site or any association with its operators. Certain services made available via xxx.xxxxxxxxxxxxxxxxxx.xxx are delivered by third party sites and organizations. By using any product, service or functionality originating from the xxx.xxxxxxxxxxxxxxxxxx.xxx domain, you hereby acknowledge and consent that Company may share such information and data with any third party with whom Company has a contractual relationship to provide the requested product, service or functionality on behalf of xxx.xxxxxxxxxxxxxxxxxx.xxx users and customers.

  • Links to Third Party Sites The Bank website may contain links to other websites ("Linked Sites"). Such links are provided solely as a convenience for you. While the Bank will attempt to select and provide links to Linked Sites that it believes may be of interest to its customers, the Bank does not screen, approve, review or otherwise endorse any content or information contained in any Linked Sites. You acknowledge and agree that the Bank, its affiliates and partners are not responsible for the contents of any Linked Sites, including the accuracy or availability of information provided by Linked Sites, and make no representations or warranties regarding the Linked Sites or your use of them.

  • Sublicense Requirements Any Sublicense: (A) is subject to this Agreement; (B) will reflect that any sublicensee will not further sublicense; (C) will prohibit sublicensee from paying royalties to an escrow or other similar account; (D) will expressly include the provisions of Sections 8, 9, and 10 for the benefit of Stanford; and (E) will include the provisions of Section 4.4 and require the transfer of all the sublicensee’s obligations to *****, including the payment of royalties specified in the Sublicense, to Stanford or its designee, if this Agreement is terminated. If the sublicensee is a spin-out from *****, ***** must guarantee the sublicensee’s performance with respect to the payment of Stanford’s share of Sublicense royalties.

  • Staffing Requirements Licensee will be in full compliance with the main studio staff requirements as specified by the FCC.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!