Protection Key definition

Protection Key means the USB-type software security and license enforcement protection key. The Protection Key, with the FLIP Consortium software license and other proprietary information embedded, enables the Customer to run the Product as a computer program on the Customer’s computer or similar device.
Protection Key means the hardware device delivered with the copy of a Software and intended to protect Software against illegal copying and unauthorized use besides User’s. The Protection Key is used to store the configuration of the License purchased by User as well as other information required to provide access to (run) Software and manage the License’s usage. Software means the copy of a software solution created and made available by Famic, in machine readable form, supplied as part of the License purchased by User and identified by copy number(s) listed in the registration form. Software includes programs, libraries or files in machine readable form (and expressly excludes any source code, whatsoever), parameters, configuration data, instruction manuals, Documentation and other information relevant to such Software developed by Famic and any improved, modified or corrected versions of them. Software may designate Automation Studio™, Automation Studio™ Live, Andon Studio™, Online Tools, Web Catalogues, etc. Trial License means a license made available to User for a limited time to allow for testing the capabilities of the Products before purchasing them. Trial Licenses are usually valid for a period of 3 to 4 weeks. URI is defined by Wikipedia as a Uniform Resource Identifier, formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical resource, such as resources on a webpage, mail address, phone number, books, real-world objects such as people and places, concepts. User designates either:
Protection Key means the hardware device delivered with the copy of Software and intended to protect Software against illegal copying and unauthorized use besides Licensee’s. The Protection Key is used to store the configuration of the License purchased by Licensee as well as other information required to provide access to (run) Software and manage the License’s usage.

Examples of Protection Key in a sentence

  • The module supports option 1a from section 5.4 of [SP800-132], in which the Master Key (MK) or a segment of it is used directly as the Data Protection Key (DPK).In accordance to [SP800-132] and IG D.6, the following requirements shall be met.• Derived keys shall only be used in storage applications.

  • Should the Protection Key get lost, Licensee must purchase a new License.

  • If in Famic’s opinion the failure of the Physical Memory Media or the Protection Key has resulted from accident, abuse, or misapplication, Famic shall have no responsibility whatsoever.

  • Such information may include: screenshots, data files, log files, dumps, Protection Key content, etc.

  • Famic will replace the defective Physical Memory Media and/or the Protection Key and Licensee agrees to pay the applicable charges for such service.

  • Licensee agrees to diligently return to Famic any Protection Key found after being declared lost.

  • The replaced Physical Memory Media and/or Protection Key will be warranted for a period of thirty (30) days, from the date of shipment.

  • If CIMS personnel private keys are stored in encrypted form, the encryption shall be performed by the FIPS 140-2 validated cryptographic module.FDP_ACF_CIMC.2.2 If certificate subject private keys are stored in the TOE, they shall be encrypted using a Long Term Private Key Protection Key.

  • The title to the Protection Key and the ID/PW Notification shall pass to the Overseas Member when the Protection Key and the ID/PW Notification have been delivered to the Overseas Member.

  • Both options presented in NIST SP 800-132 for deriving the Data Protection Key from the Master Key are supported.


More Definitions of Protection Key

Protection Key means a software-based or hardware-based activation method issued to Licensee by Licensor that authorises the use of the Software;

Related to Protection Key

  • Protection and "Protective Services" means necessary actions taken as soon as possible to prevent subsequent abuse or exploitation of the individual, to prevent self-destructive acts, and to safeguard an individual's person, property, and funds.

  • Affordable means, a sales price or rent level that is within the means of a low- or moderate- income household as defined within N.J.A.C. 5:93-7.4, and, in the case of an ownership unit, that the sales price for the unit conforms to the standards set forth in N.J.A.C. 5:80-26.6, as may be amended and supplemented, and, in the case of a rental unit, that the rent for the unit conforms to the standards set forth in N.J.A.C. 5:80-26.12, as may be amended and supplemented.

  • Protection Legislation means (i) the GDPR; (ii) the Data Protection Act 2018 to the extent that it relates to the processing of Personal Data and privacy; and (iii) all applicable Law relating to the processing of Personal Data and privacy, including where applicable the guidance and codes of practice issued by the Information Commissioner, in each case as amended, supplemented or substituted from time to time; Domestic Successor means, as the context requires, either:

  • Cathodic protection means a technique designed to prevent the corrosion of a metal surface by making that surface the cathode of an electrochemical cell. For example, protection can be accomplished with an impressed current system or a galvanic anode system.

  • Data Protection means the implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification, or destruction of data.

  • Procurement Code means §§ 13-1-28 to 13-1-199 NMSA 1978. “Public School Finance Act” means §§ 22-8-1 to 22-8-49 NMSA 1978. “Secretary” means the cabinet secretary of the Department.

  • Applicable Data Protection Law means all data privacy or data protection laws or regulations globally that apply to the Processing of Personal Information under this Data Processing Agreement, which may include Applicable European Data Protection Law.

  • Applicable Data Protection Laws means all national, international and local laws, regulations and rules by any government, agency or authority relating to data protection and privacy which are applicable to CPA Global or the Customer, including but not limited to The General Data Protection Regulation (Regulation (EU) 2016/679), (GDPR);

  • Fire Protection means all aspects of fire safety including but not limited to fire prevention, firefighting or Fire Suppression, pre-fire planning, fire investigation, public education and information, training or other staff development;

  • Paycheck Protection Program means loan program created by Section 1102 of the CARES Act.

  • Continuity of Care means care provided to a Member by the same PCP or specialty provider to ensure that the delivery of care to the Member remains stable, and services are consistent and unduplicated. Contract or Agreement means this formal, written, and legally enforceable contract and amendments thereto between the Parties. Contract Period or Contract Term means the Initial Contract Period plus any and all Contract extensions.

  • Applicable Data Protection Legislation means any national or internationally binding data protection laws or regulations (including but not limited to the GDPR and the Austrian Data Protection Act (“DSG”)) including any requirements, guidelines and recommendations of the competent data protection authorities applicable at any time during the term of this DPA to, as the case may be, the Data Controller or the Data Processor;

  • Homecare Worker means a provider, as described in OAR 411-031- 0040, that is directly employed by a consumer to provide either hourly or live-in services to the eligible consumer.

  • UK Data Protection Laws means the Data Protection Xxx 0000 (incorporating the UK GDPR) and the Privacy and Electronic Communications (EC Directive) Regulations 2003, and the laws implementing or supplementing them;

  • Firearm trade association means any person, corporation, unincorporated association, federation, business league, or business organization that:

  • Information Technology means computers, software, databases, firmware, middleware, servers, workstations, networks, systems, routers, hubs, switches, data communications lines, and all other information technology equipment and associated documentation.

  • Fire protection system means any device or system designed and installed to:

  • Community protection zone means the area within eight

  • Cathodic protection tester means a person who can demonstrate an understanding of the principles and measurements of all common types of cathodic protection systems as applied to buried or submerged metal piping and tank systems. At a minimum, such persons must have education and experience in soil resistivity, stray current, structure-to-soil potential, and component electrical isolation measurements of buried metal piping and tank systems.

  • Data Protection Act means Act CXII of 2011 on Informational Self-Determination and Freedom of Information.

  • Source Protection Plan means a drinking water source protection plan prepared under the Clean Water Act, 2006;

  • the applicable data protection law means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established;

  • outworker means a person to whom articles or materials are given out to be made up, cleaned, washed, altered, ornamented, finished or repaired, or adapted for sale in his own home or on other premises not under the control or management of the person who gave out the materials or articles;

  • Uniformed services means the armed forces, the army national guard, and the air national guard of any state, territory, commonwealth, possession, or district when engaged in active duty for training, inactive duty training, full-time national guard duty, or state active duty, the commissioned corps of the public health service, the coast guard, and any other category of persons designated by the President of the United States in time of war or national emergency.

  • EU Data Protection Laws means EU Directive 95/46/EC, as transposed into domestic legislation of each Member State and as amended, replaced or superseded from time to time, including by the GDPR and laws implementing or supplementing the GDPR;

  • Department of Information Technology means the New Mexico Department of Information Technology which is responsible for operating the data center and all communications related items.