Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they: (i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); and (ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.
Appears in 2 contracts
Samples: Ci Plus Device Interim License Agreement, Ci Plus Device Interim License Agreement
Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they:
(i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); andprotection
(ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysersanalyzers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.
Appears in 2 contracts
Samples: Ci Plus Device Interim License Agreement, Ci Plus / Most Device Interim License Agreement