Integrity detection Sample Clauses

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime.
AutoNDA by SimpleDocs
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. Licensor deems the Content Protection System to sufficiently meet the foregoing requirements. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). Licensor deems the Content Protection System to sufficiently meet the foregoing requirements.
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine is designed to prevent the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels designed to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall be designed to prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. No High Definition Feature Films may be output over compressed video outputs on Approved Devices. With respect to the output of High Definition Feature Films over uncompressed video outputs on Approved Devices, Amazon shall require thatwill signal for HDCP isto be enabled. Notwithstanding the foregoing, with respect to the output of High Definition Feature Films over uncompressed outputs on Approved Devices that are personal computers, if the Customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied), Amazon must ensure that the playback of High Definition Features Films over such outputs is in a resolution no greater than Standard Definition (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)); provided that Amazon may implement Digital Video Interface version 1.0 (“DVI”) without HDCP and allow High Definition Feature Films to be output in High Definition on such interface on personal computer platforms until December 31, 2011, after which date Amazon shall down-res High Definition Feature Films to a resolution no greater than Standard Definition for playback over DVI (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)). Amazon will discuss with CDD in good faith a sunset date for the output of High Definition Feature Films over analog outputs on Approved Devices. CDD authorizes Amazon to format and encode the Source Copies and other materials delivered by CDD in the formats established by Amazon for the Service (any such encoded copy of an Included Program, an “Encoded File”), provided that Amazon may not create Encoded Files in an up-converted or analogous format in which the Encoded File has a higher resolution than the Source Copy from which it was created. Standard Definition Encoded Files created from a High Definition Source Copy must maintain the aspect ratio of the Source Copy. No Encoded File of an Included Pr...

Related to Integrity detection

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Vaccination and Inoculation ‌ (a) The Employer agrees to take all reasonable precautions to limit the spread of infectious diseases among employees, including in-service seminars for employees. Where the Employer or Occupational Health and Safety Committee identifies high risk areas which expose employees to infectious or communicable diseases for which there are protective immunizations available, such immunizations shall be provided at no cost to the employee. The Committee may consult with the Medical Health Officer. Where the Medical Health Officer identifies such a risk, the immunization shall also be provided at no cost. The Employer shall provide Hepatitis B vaccine, free of charge, to those employees who may be exposed to bodily fluids or other sources of infection. (b) An employee may be required by the Employer, at the request of and at the expense of the Employer, to take a medical examination by a physician of the employee's choice. Employees may be required to take skin tests, x-ray examination, vaccination, and other immunization (with the exception of a rubella vaccination when the employee is of the opinion that a pregnancy is possible), unless the employee's physician has advised in writing that such a procedure may have an adverse effect on the employee's health.

  • TREE TRIMMING Grantee or its designee shall have the authority to trim trees on public property at its own expense as may be necessary to protect its wires and facilities.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Independence from Material Breach Determination Except as set forth in Section X.E.1.d, these provisions for payment of Stipulated Penalties shall not affect or otherwise set a standard for OIG’s decision that UHS has materially breached this CIA, which decision shall be made at OIG’s discretion and shall be governed by the provisions in Section X.E, below.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!