Integrity detection Sample Clauses

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime.
AutoNDA by SimpleDocs
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. Licensor deems the Content Protection System to sufficiently meet the foregoing requirements. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). Licensor deems the Content Protection System to sufficiently meet the foregoing requirements.
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. Output Protections No High Definition Feature Films may be output over compressed outputs on Approved Devices. With respect to the output of High Definition Feature Films over uncompressed outputs on Approved Devices, Licensee shall require that HDCP is enabled. Notwithstanding the foregoing, with respect to the output of High Definition Feature Films over uncompressed outputs on Approved Devices that are Personal Computers, if the customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied), Licensee must ensure that the playback of High Definition Features Films over such outputs is in a resolution no greater than Standard Definition (which playback must be in accordance with the output requirements specified in Schedule C of the this Agreement); provided that Licensee may implement Digital Video Interface version 1.0 (“DVI”) without HDCP and allow High Definition Feature Films to be output in High Definition on such interface on Personal Computer platforms until December 31, 2011, after which date Licensee shall down-res High Definition Feature Films to a resolution no greater than Standard Definition for playback over DVI (which playback must be in accordance with the output requirements specified in Schedule C of this Agreement).
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. Output Protections No High Definition Feature Films may be output over compressed video outputs on Approved Devices. With respect to the output of High Definition Feature Films over uncompressed video outputs on Approved Devices, Amazon shall require thatwill signal for HDCP isto be enabled. Notwithstanding the foregoing, with respect to the output of High Definition Feature Films over uncompressed outputs on Approved Devices that are personal computers, if the Customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied), Amazon must ensure that the playback of High Definition Features Films over such outputs is in a resolution no greater than Standard Definition (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)); provided that Amazon may implement Digital Video Interface version 1.0 (“DVI”) without HDCP and allow High Definition Feature Films to be output in High Definition on such interface on personal computer platforms until December 31, 2011, after which date Amazon shall down-res High Definition Feature Films to a resolution no greater than Standard Definition for playback over DVI (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)). Amazon will discuss with CDD in good faith a sunset date for the output of High Definition Feature Films over analog outputs on Approved Devices. Schedule C Specifications for Encoded Files CDD authorizes Amazon to format and encode the Source Copies and other materials delivered by CDD in the formats established by Amazon for the Service (any such encoded copy of an Included Program, an “Encoded File”), provided that Amazon may not create Encoded Files in an up-converted or analogous format in which the Encoded File has a higher resolution than the Source Copy from which it was created. Standard Definition Encoded Files created from a High Definition Source Copy must maintain the asp...

Related to Integrity detection

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Tuberculosis Examination The examination shall consist of an approved intradermal tuberculosis test, which, if positive, shall be followed by an X-ray of the lungs. Nothing in Sections 5163 to 5163.2, inclusive, shall prevent the governing body of any city or county, upon recommendation of the local health officer, from establishing a rule requiring a more extensive or more frequent examination than required by Section 5163 and this section. § 5163.2. Technician taking X-ray film; Interpretation of X-ray The X-ray film may be taken by a competent and qualified X-ray technician if the X-ray film is subsequently interpreted by a licensed physician and surgeon.

  • Prevention IP shall take all appropriate measures to prevent sexual exploitation and abuse, and child safeguarding violations, by its employees, personnel or subcontractors. IP shall, inter alia, ensure that its employees, personnel or subcontractors shall have undertaken and successfully completed appropriate training with regard to the prevention of sexual exploitation and abuse, and training on safeguarding children. Such training shall include but not be limited to: reference to definitions of sexual exploitation and sexual abuse, and child safeguarding violations; a clear and unambiguous statement that any form of sexual exploitation and abuse, and any conduct that undermines the safeguarding of children, is prohibited; the requirement that any allegations of sexual exploitation and abuse, or child safeguarding violations be promptly reported as provided for in Article 14.4; and the requirement that alleged victims of sexual exploitation and abuse or child safeguarding violations, be promptly informed of and referred to available professional assistance, upon her or his consent.

  • Disturbance Analysis Data Exchange The Parties will cooperate with one another and the NYISO in the analysis of disturbances to either the Large Generating Facility or the New York State Transmission System by gathering and providing access to any information relating to any disturbance, including information from disturbance recording equipment, protective relay targets, breaker operations and sequence of events records, and any disturbance information required by Good Utility Practice.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Reasonable Suspicion Testing The Employer may, but does not have a legal duty to, request or require an employee to undergo drug and alcohol testing if the Employer or any supervisor of the employee has a reasonable suspicion (a belief based on specific facts and rational inferences drawn from those facts) related to the performance of the job that the employee:

  • How to Request an External Appeal If you remain dissatisfied with our medical appeal determination, you may request an external review by an outside review agency. In accordance with §27-18.9-8, your external appeal will be reviewed by one of the external independent review organizations (IRO) approved by the Office of the Health Insurance Commissioner. The IRO is selected using a rotational method. Your claim does not have to meet a minimum dollar threshold in order for you to be able to request an external appeal. To request an external appeal, submit a written request to us within four (4) months of your receipt of the medical appeal denial letter. We will forward your request to the outside review agency within five (5) business days, unless it is an urgent appeal, and then we will send it within two (2) business days. We may charge you a filing fee up to $25.00 per external appeal, not to exceed $75.00 per plan year. We will refund you if the denial is reversed and will waive the fee if it imposes an undue hardship for you. Upon receipt of the information, the outside review agency will notify you of its determination within ten (10) calendar days, unless it is an urgent appeal, and then you will be notified within seventy-two (72) hours. The determination by the outside review agency is binding on us. Filing an external appeal is voluntary. You may choose to participate in this level of appeal or you may file suit in an appropriate court of law (see Legal Action, below). Once a member or provider receives a decision at one of the several levels of appeals noted above, (reconsideration, appeal, external), the member or provider may not ask for an appeal at the same level again, unless additional information that could affect such decisions can be provided.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!