Use of Approved DRM for HLS key management Sample Clauses

Use of Approved DRM for HLS key management. Licensee shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules) for protection of Licensor content between Licensee servers and end user devices but shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Licensor under section 2 of this Schedule.
AutoNDA by SimpleDocs
Use of Approved DRM for HLS key management. The protection of Studio content between Comcast servers and end user devices shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”).
Use of Approved DRM for HLS key management. Comcast shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules)
Use of Approved DRM for HLS key management. The protection of Studio content between Comcast servers and end user devices shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”). HLS on iOS devices may be implemented either using applications or using the provisioned Safari browser, subject to requirement “Use of Approved DRM for HLS Key Management” above. Where the provisioned HLS implementation is used (e.g. so that native media processing can be used), the connection between the approved DRM client and the native HLS implementation shall be robustly and effectively secured (e.g. by mutual authentication of the approved DRM client and the native HLS implementation). Streams of Included Programs shall be encrypted as required pursuant to Section 2.1 of this Exhibit C. The decryption key for the Included Programs shall be encrypted when delivered to any Approved Device. Output of the Stream from the receiving device shall not be permitted except in compliance with the provisions of this Exhibit C. For Streamed Included Programs, Comcast shall NOT configure the playback client to cache streamed media for later replay (i.e., playback after the Included Program is complete), but shall configure the playback client to not permit playback of any cached portion of the Included Program once it has been completed.
Use of Approved DRM for HLS key management. Comcast shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules) xxxXxx Management. The protection of Studio content between Comcast servers and end user devices but shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under section 2 of this Schedule.Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”).

Related to Use of Approved DRM for HLS key management

  • Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271) If (a) Vendor is not a sole proprietorship; (b) Vendor has ten (10) or more full-time employees; and (c) this Agreement or any agreement with a TIPS Member under this procurement has value of $100,000 or more, the following certification shall apply; otherwise, this certification is not required. Vendor certifies, where applicable, that neither the Vendor, nor any affiliate, subsidiary, or parent company of Vendor, if any, boycotts Israel, and Vendor agrees that Vendor and Vendor Companies will not boycott Israel during the term of this Agreement. For purposes of this Agreement, the term “boycott” shall mean and include refusing to deal with, terminating business activities with, or otherwise taking any action that is intended to penalize, inflict economic harm on, or limit commercial relations with Israel, or with a person or entity doing business in Israel or in an Israeli-controlled territory but does not include an action made for ordinary business purposes. When applicable, does Vendor certify? Yes

Time is Money Join Law Insider Premium to draft better contracts faster.