Common use of Protection against Hacking Clause in Contracts

Protection against Hacking. 3.7.1. Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected against tampering, forging, and spoofing. 3.7.2. The Content Protection System shall employ industry accepted tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of techniques included in tamper-resistant technology are: 3.7.2.1. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 3 contracts

Samples: Pay Television License Agreement, Pay Television License Agreement, Pay Television License Agreement

AutoNDA by SimpleDocs

Protection against Hacking. 3.7.11.6.1. Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected against tampering, forging, and spoofing. 3.7.21.6.2. The Content Protection System shall employ industry accepted tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of techniques included in tamper-tamper- resistant technology are: 3.7.2.11.6.2.1. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 2 contracts

Samples: Subscription Video on Demand License Agreement, Subscription Video on Demand License Agreement

Protection against Hacking. 3.7.11.6.1. Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected against tampering, forging, and spoofing. 3.7.21.6.2. The Content Protection System shall employ industry accepted tamper-tamper- resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of techniques included in tamper-resistant technology are: 3.7.2.11.6.2.1. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 2 contracts

Samples: License Agreement, License Agreement

Protection against Hacking. 3.7.11.6.1. Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected and designed to resist against tampering, forging, and spoofing. 3.7.21.6.2. The Content Protection System shall employ industry accepted tamper-tamper- resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of techniques included in tamper-resistant technology are: 3.7.2.11.6.2.1. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 1 contract

Samples: Video on Demand and Pay Per View License Agreement

AutoNDA by SimpleDocs

Protection against Hacking. 3.7.11.6.1. Playback licenses, revocation certificates, and security-critical data shall be cryptographically protected against tampering, forging, and spoofing. 3.7.21.6.2. The Content Protection System shall employ industry accepted tamper-resistant technology on hardware and software components (e.g., technology to prevent such hacks as a clock rollback, spoofing, use of common debugging tools, and intercepting unencrypted content in memory buffers). Examples of techniques included in tamper-resistant technology are: 3.7.2.11.6.2.1. Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 1 contract

Samples: License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!