Use of Approved DRM for HLS Key Management Sample Clauses

Use of Approved DRM for HLS Key Management. The protection of Studio content between Comcast servers and end user devices shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”).
AutoNDA by SimpleDocs
Use of Approved DRM for HLS Key Management. The protection of Studio content between Comcast servers and end user devices shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Studio under Section 1 of this Exhibit C (for the avoidance of doubt, the Content Protection Systems listed in Section 1 are deemed “approved”). HLS on iOS devices may be implemented either using applications or using the provisioned Safari browser, subject to requirement “Use of Approved DRM for HLS Key Management” above. Where the provisioned HLS implementation is used (e.g. so that native media processing can be used), the connection between the approved DRM client and the native HLS implementation shall be robustly and effectively secured (e.g. by mutual authentication of the approved DRM client and the native HLS implementation). Streams of Included Programs shall be encrypted as required pursuant to Section 2.1 of this Exhibit C. The decryption key for the Included Programs shall be encrypted when delivered to any Approved Device. Output of the Stream from the receiving device shall not be permitted except in compliance with the provisions of this Exhibit C. For Streamed Included Programs, Comcast shall NOT configure the playback client to cache streamed media for later replay (i.e., playback after the Included Program is complete), but shall configure the playback client to not permit playback of any cached portion of the Included Program once it has been completed.
Use of Approved DRM for HLS Key Management. Licensee shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules) for protection of Licensor content between Licensee servers and end user devices but shall use (for the protection of keys used to encrypt HLS streams) an industry accepted DRM or secure streaming method approved by Licensor under section 2 of this Schedule.
Use of Approved DRM for HLS Key Management. Comcast shall NOT use the Apple-provisioned key management and storage for http live streaming (“HLS”) (implementations of which are not governed by any compliance and robustness rules nor any legal framework ensuring implementations meet these rules)

Related to Use of Approved DRM for HLS Key Management

  • Certification Regarding Prohibition of Boycotting Israel (Tex Gov. Code 2271)

  • Provisions governing staff and subcontractors A. To require any subcontractor to execute documents that binds the subcontractor to comply with the provisions of this Contract. Subcontractor means an individual or entity to which the Contractor has contracted with or delegated some of its management functions or responsibilities of providing all or a part of the services required of the Contractor under this Contract. B. That it is responsible for the behavior of its staff and subcontractors to ensure a violence-free contractual relationship. The Contractor understands that any remarks, gestures or actions toward HHSC employees, volunteers or clients that carry an implied threat of any kind, even if intended to be in jest, will be taken seriously and may lead to corrective action, up to and including terminating this contractor. C. To comply with the requirements of the Immigration Reform and Control Act of 1986 regarding employment verification and retention of verification forms for an individual hired on or after November 6, 1986, who will perform any labor or services under this Contract. D. To certify and ensure that it utilizes and will continue to utilize, for the term of this Contract, the U. S. Department of Homeland Security's e- Verify system to determine the eligibility of: 1. all people employed during the Contract term to perform duties within Texas; and 2. all people (including subcontractors). E. That representatives of HHSC, AG-MFCU and HHS may conduct interviews of Contractor personnel, subcontractors and their personnel, witnesses, and clients without a Contractor's representative present unless the person interviewed voluntarily requests that the representative be present. The Contractor must not coerce its personnel, subcontractors and their personnel, witnesses, or clients to accept representation by the Contractor, and the Contractor agrees that no retaliation will occur to a person who denies the Contractor's offer of representation. Nothing in the Contract limits a person's right to counsel of his or her choice. Requests for interviews are to be complied with in the form and the manner requested. The Contractor must ensure by contract or other means that its personnel and subcontractors cooperate fully in any investigation conducted by representatives of HHSC, AG-MFCU and HHS. F. That if it is a Home and Community Support Services agency ("HCSSA"), the Contractor will hire Personal Assistance Services and Community Support Services providers chosen by the client or the client's legally authorized representative, if requested, and provided the individual who will provide the services: 1. meets minimum qualifications for the service; 2. is willing to be employed as an attendant by the Contractor; and 3. is willing, and determined competent by the Contractor, to deliver the service(s) according to the client's individual service plan.

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Replacement of Key Personnel The Engineer must notify the State in writing as soon as possible, but no later than three business days after a project manager or other key personnel is removed from association with this contract, giving the reason for removal.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • Contractor Licensing, etc. Notwithstanding Section 14.c, District may terminate this Contract immediately by written notice to Contractor upon denial, suspension, revocation, or non-renewal of any license, permit, or certificate that Contractor must hold to provide services under this Contract.

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • State Approval of Replacement Personnel The Engineer may not replace the project manager or key personnel without prior consent of the State. The State must be satisfied that the new project manager or other key personnel is qualified to provide the authorized services. If the State determines that the new project manager or key personnel is not acceptable, the Engineer may not use that person in that capacity and shall replace him or her with one satisfactory to the State within forty-five (45) days.

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!