Common use of Tamper Resistant Software Clause in Contracts

Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.

Appears in 14 contracts

Samples: Subscription Pay Television License Agreement, Subscription Video on Demand License Agreement, Licensing Agreement

AutoNDA by SimpleDocs

Tamper Resistant Software. The Content Protection System shall employ tamper-tamper- resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.:

Appears in 3 contracts

Samples: Vod, Svod & Dhe License Agreement, Supplement License Agreement, Vod & Dhe License Agreement

AutoNDA by SimpleDocs

Tamper Resistant Software. The Content Protection System shall employ tamper-resistant software. Examples of tamper resistant software techniques include, without limitation: Code and data obfuscation: The executable binary dynamically encrypts and decrypts itself in memory so that the algorithm is not unnecessarily exposed to disassembly or reverse engineering.:

Appears in 3 contracts

Samples: International Vod & Dhe License Agreement, Subscription Pay Television License Agreement, Vod Content Distribution Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!