Outputs for Copying Sample Clauses

Outputs for Copying. A Licensed Copier shall not pass, or direct to be passed, Decrypted AACS Content to an output, except for the purpose of making a copy of such content to an AACS Authorized Copying Method or a Content Owner Authorized Copying Method pursuant to and as permitted by this Section 3, where such content is protected by the corresponding AACS Authorized Copy Method or Content Owner Authorized Copying Method permitted under this Section 3. For avoidance of doubt regarding the making of an authorized copy, processing of Decrypted AACS Content prior to protection by the AACS Authorized Copying Method or Content Owner Authorized Copying Method is subject to the AACS Robustness and Compliance Rules. Examples of such processing include transcoding or decimation to constrained image that occur prior to protection by the Authorized Copying Methods, and the proper setting of the parameters as required in Table C1. Once protected by the Authorized Copying Methods, processing of the content becomes subject to the Authorized Copying Method’s compliance and robustness rules (note: content protected by a Bound Copy Method remains subject to AACS Compliance and Robustness Rules). For the further avoidance of doubt, where the three_d_only element or the three_d_full_frame_only element is set in AACS Content, a Licensed Copier shall not pass, or direct to be passed, Decrypted AACS Content to an output for the purpose of making a copy of such content to an AACS Authorized Copying Method pursuant to and as permitted by this Section 3 only if the AACS Authorized Copying is authorized specifically to make a copy of Decrypted AACS Content containing such an element.
AutoNDA by SimpleDocs
Outputs for Copying. A Licensed Copier shall not pass, or direct to be passed, Decrypted AACS Content to an output, except for the purpose of making a copy of such content to an AACS Authorized Copying Method or a Content Owner Authorized Copying Method pursuant to and as permitted by this Section 3, where such content is protected by the corresponding AACS Authorized Copy Method or Content Owner Authorized Copying Method permitted under this Section 3. For avoidance of doubt regarding the making of an authorized copy, processing of Decrypted AACS Content prior to protection by the AACS Authorized Copying Method or Content Owner Authorized Copying Method is subject to the AACS Robustness and Compliance Rules. Examples of such processing include transcoding or decimation to constrained image that occur prior to protection by the Authorized Copying Methods, and the proper setting of the parameters as required in Table C1. Once protected by the Authorized Copying Methods, processing of the content becomes subject to the Authorized Copying Method’s compliance and robustness rules (note: content protected by a Bound Copy Method remains subject to AACS Compliance and Robustness Rules).

Related to Outputs for Copying

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Mechanisms for Cooperation 1. Pursuant to Article 149 (Objectives), the Parties hereby establish a Committee on Cooperation comprising representatives of each Party. 2. The Parties will designate nationals contact points to facilitate communication on possible cooperation activities. The contact points will work with government agencies, business sector representatives and educational and research institutions for the operation of this Chapter. 3. The Parties shall use diplomatic channels to promote dialogue and cooperation consistent with this Agreement. 4. The Committee shall have the following functions: (a) to monitor and assess the progress in implementing of the cooperation projects agreed by the Parties; (b) to establish rules and procedures for the conduct of its work; (c) to make recommendations of the cooperation activities under this Chapter, in accordance with the strategic priorities of the Parties; and (d) to review through regular reporting from the Parties, the operation of this Chapter and the application and fulfillment of its objectives between the relevant institutions of the Parties.

  • Requests For Samples By Authorized Users Requests for samples by Authorized Users require the consent of the Contractor. Where Contractor refuses to furnish a sample, Authorized User may, in its sole discretion, make a determination on the performance capability of the Product or on the issue in question. BID EVALUATION

  • Requests for Flexible Working Arrangements 49.1 Employee may request change in working arrangements Clause 49 applies where an Employee has made a request for a change in working arrangements under s.65 of the Act. Note 1: Section 65 of the Act provides for certain Employees to request a change in their working arrangements because of their circumstances, as set out in s.65(1A).

  • Public Contracts for Services [Not applicable to agreements relating to the offer, issuance, or sale of securities, investment advisory services or fund management services, sponsored projects, intergovernmental agreements, or information technology services or products and services] Contractor certifies, warrants, and agrees that it does not knowingly employ or contract with a worker without authorization who will perform work under this Agreement and will confirm the employment eligibility of all employees who are newly hired for employment in the United States to perform work under this Agreement, through participation in the E-Verify Program or the Department program established pursuant to C.R.S. §8-17.5-102(5)(c). Contractor shall not knowingly employ or contract with a worker without authorization to perform work under this Agreement or enter into a contract with a subcontractor that fails to certify to Contractor that the subcontractor shall not knowingly employ or contract with a worker without authorization to perform work under this Agreement. Contractor (a) shall not use E-Verify Program or Department program procedures to undertake pre-employment screening of job applicants while this Agreement is being performed, (b) shall notify the subcontractor and County within three days if Contractor has actual knowledge that a subcontractor is employing or contracting with a worker without authorization for work under this Agreement, (c) shall terminate the subcontract if a subcontractor does not stop employing or contracting with the worker without authorization within three days of receiving the notice, and (d) shall comply with reasonable requests made in the course of an investigation, undertaken pursuant to C.R.S. §8-17.5-102(5), by the Colorado Department of Labor and Employment. If Contractor participates in the Department program, Contractor shall deliver to County a written, notarized affirmation, affirming that Contractor has examined the legal work status of such employee, and shall comply with all of the other requirements of the Department program. If Contractor fails to comply with any requirement of this provision or C.R.S. §8-17.5-102 et seq., County may terminate this Agreement for breach and, if so terminated, Contractor shall be liable for damages.

  • Contract Monitoring The criminal background checks required by this rule shall be national in scope, and must be conducted at least once every three (3) years. Contractor shall make the criminal background checks required by Paragraph IV.G.1 available for inspection and copying by DRS personnel upon request of DRS.

  • Solicitations for Subcontracts, Including Procurement of Materials and Equipment In all solicitation, either by competitive bidding or negotiation, made by the Contractor for work to be performed under a subcontract, including procurement of materials or leases of equipment, each potential Subcontractor or supplier shall be notified by the Contractor of the Contractor’s obligations under this Agreement and the Regulations relative to non-discrimination on the grounds of race, color, or national origin.

  • Packing Materials and Containers for Shipment Packing materials and containers in which a good is packed for shipment shall be disregarded in determining whether:

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Solicitations for Subcontracts, Including Procurements of Materials and Equipment In all solicitations either by competitive bidding or negotiation made by the Engineer for work to be performed under a subcontract, including procurements of materials or leases of equipment, each potential subcontractor or supplier shall be notified by the Engineer of the Engineer's obligations under this contract and the Regulations relative to nondiscrimination on the grounds of race, color, or national origin.

Time is Money Join Law Insider Premium to draft better contracts faster.