Secure Content Decryption Sample Clauses

Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g. via decryption in an isolated processing environment.
AutoNDA by SimpleDocs
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment. Decrypted content must be encrypted during transmission to the graphics card for rendering HD Day & Date Requirements In addition to the foregoing requirements, all HD content is subject to the following set of content protection requirements:
Secure Content Decryption. 1.4.7.1. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Clause
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and
Secure Content Decryption. [Changes and deletions are not acceptable. content whilst not protecting the keys used to protect the content when in an unencrypted state.] 1.4.7.1. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place in an isolated processing environment such that decrypted content and CSPs are protected at all times in the device, including during transmission to the graphics card for rendering, from attack from other software processes on the device. “CSPs” shall mean keys, passwords, and any other information that are critical to the security robustness of the Content Protection System.
Secure Content Decryption. Decryption of (i) content protected by the Content Protection System and (ii) CSPs (as defined in Section 2.1 below) related to the Content Protection System shall take place such that it is protected from attack by other software processes on the device, e.g., via decryption in an isolated processing environment. 1. Users must have an active Account (an “Account”) prior to receiving content for VOD rental. All Accounts must be protected via account credentials consisting of at least a userid and password. 2. Licensed Content can be delivered to Approved Devices by both streaming and temporary download. 3. Licensed Content shall not be transferrable between Approved Devices receiving the content by streaming. 4. Licensed Content shall not be transferrable between Approved Devices receiving the content by temporary download, unless this can be done while still enforcing the single viewing device requirement. 5. Licensed Content may be viewed during the Viewing Period, which is defined as the time period commencing at the time a User is technically enabled to view the Licensed Content during the relevant License Period and ending on the earlier of:

Related to Secure Content Decryption

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

  • Contract Database Metadata Elements Title: Xxxxxxx-Xxx Xxxxx Central School District and Xxxxxxx-Xxx Xxxxx Teachers Association (2007)

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!