Security Technology definition

Security Technology means, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, encryption, Digital Rights management system, copyright management information system or any feature that facilitates or limits compatibility with other hardware, software, or accessories or other peripherals outside of the Territory or on a different video game system.
Security Technology means the highly proprietary security features incorporated by Nintendo into the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, proprietary manufacturing process or any feature which obstructs piracy, limits unlawful, unsafe or unauthorized use or facilitates or limits compatibility with other hardware or software outside of the Territory or on a different video game system.
Security Technology means the highly proprietary security features of the Wii and the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, encryption, digital rights management system, copyright management information system, proprietary manufacturing process or any feature which obstructs piracy, limits unlawful, unsafe or unauthorized use, or facilitates or limits compatibility with other hardware, software, accessories or peripherals, or with respect to a video game system other than the Wii, or limits distribution outside of the Territory.

Examples of Security Technology in a sentence

  • Additionally, Microsoft may add Security Technology that prohibits the play of Software Titles on Xbox units manufactured in a region or country different from the location of manufacture of the respective Finished Product Units.

  • The final release version of the Game, the Game Disc and the Printed Materials shall include such Security Technology as Nintendo, in its sole discretion, deems necessary or appropriate to (a) reduce the risk of unlawful copying or other unlawful, unsafe or unauthorized uses, (b) protect the Proprietary Rights of Nintendo and of the LICENSEE, (c) promote consumer confidence, and (d) increase the quality, reliability or operation of the NINTENDO GAMECUBE system.

  • Additionally, Microsoft may add Security Technology that prohibits the play of Software Titles on Xbox 360 units manufactured in a region or country different from the location of manufacture of the respective FPUs or that have been modified in any manner not authorized by Microsoft.

  • The Department of Defense (DoD) has a similar verification program known as the Environmental Security Technology Certification Program (ESTCP).

  • Approved employee-owned hardware, software, and other equipment must have a configuration that is compatible with the OIT’s information technology infrastructure as outlined in the Commonwealth Information Security Technology Policy, ITP-SEC000, Information Security Policy.

  • The final release version of the Game, Game Cartridges and Printed Materials shall include such Security Technology as Nintendo, in its sole discretion, may deem necessary or appropriate.

  • A cross-sectional study design was used to target prospective blood donors presenting to donate whole blood at Kenyatta National Hospital.

  • Microsoft has the right to add to the final release version of the Software Title delivered by Publisher to Microsoft, and to all FPUs, such digital signature technology and other security technology and copyright management information (collectively, “Security Technology”) as Microsoft may determine to be necessary, and/or Microsoft may modify the signature included in any Security Technology included in the Software Title by Publisher at Microsoft’s discretion.

  • Microsoft, and not Publisher, will provide to the applicable Authorized Replicator the final release version of the Software Title and all specifications required by Microsoft for the manufacture of the FPUs including, without limitation, the Security Technology (as defined in Section 7.9 below).

  • In Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, 23–26 October 2017; pp.


More Definitions of Security Technology

Security Technology means such digital signatures, other security technology, and copyright management information that may be added to an FPU.
Security Technology means digital signatures, other security technology, and copyright management information that may be added to a Software Title by Microsoft.
Security Technology means the highly proprietary security features incorporated by NCL into the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, proprietary manufacturing process or any feature MARCH 20, 2002 CONFIDENTIAL that obstructs piracy, limits unlawful, unsafe or unauthorized use or facilitates or limits compatibility with other hardware or software outside of the Territory or on a different video game system.
Security Technology means, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, encryption, Digital Rights management system, or any feature which facilitates or limits compatibility with other hardware, software, accessories or other peripherals, outside of the Territory or on a different video game system.
Security Technology. We continually develop and implement features to keep your personal information safe - for example, when you enter any information anywhere on the Service, we encrypt the transmission of that information using secure socket layer technology (SSL) by default. • We ensure passwords are stored and transferred securely using encryption and salted hashing. • Employee Access: We use best-effort practices to secure usernames, passwords and any other means of gaining access to users data. All employees sign confidentiality agreements and pass criminal background checks.

Related to Security Technology

  • Licensor Technology means the Licensor Patents, the Licensor Know-How, Licensor Materials, and Non-Patent Rights Controlled by Licensor or its Affiliates embodied in Licensor Know-How or Licensor Materials.

  • Licensee Technology means the Licensee Know-How and Licensee Patents.

  • Licensed Intellectual Property means all Intellectual Property in which the Company holds any rights or interests granted by other Persons, including Seller or any of its Affiliates.

  • Licensed Technology means the Licensed Patents and the Licensed Know-How.

  • Customer Technology means Customer's proprietary technology, including Customer's Internet operations design, content, software tools, hardware designs, algorithms, software (in source and object forms), user interface designs, architecture, class libraries, objects and documentation (both printed and electronic), know-how, trade secrets and any related intellectual property rights throughout the world (whether owned by Customer or licensed to Customer from a third party) and also including any derivatives, improvements, enhancements or extensions of Customer Technology conceived, reduced to practice, or developed during the term of this Agreement by Customer.

  • Third Party Technology means all Intellectual Property and products owned by third parties and licensed pursuant to Third Party Licenses.

  • Licensed Property means the portion of the Software and the Documentation to which Customer has purchased a License as identified on an applicable Order. Licensed Property shall include any updates or upgrades to the Licensed Property that AvePoint may at its discretion deliver to Customer.

  • Software Intellectual Property means:

  • Intellectual Property Security Agreement means a Copyright Security Agreement, a Patent Security Agreement or a Trademark Security Agreement.

  • Company Technology means all Technology used in or necessary for the conduct of the business of the Company or any of its Subsidiaries, or owned or held for use by the Company or any of its Subsidiaries.

  • Proprietary Technology means the technical innovations that are unique and

  • Foreground Intellectual Property means all Intellectual Property developed by either Party pursuant to this Agreement;

  • Background Technology means all Software, data, know-how, ideas, methodologies, specifications, and other technology in which Contractor owns such Intellectual Property Rights as are necessary for Contractor to grant the rights and licenses set forth in Section 14.1, and for the State (including its licensees, successors and assigns) to exercise such rights and licenses, without violating any right of any Third Party or any Law or incurring any payment obligation to any Third Party. Background Technology must: (a) be identified as Background Technology in the Statement of Work; and (b) have been developed or otherwise acquired by Contractor prior to the date of the Statement of Work, or have been developed by Contractor outside of its performance under the Statement of Work. Background Technology will also include any general consulting tool or methodology created by Contractor, which will not be required to be identified in the Statement of Work.

  • New Technology means any invention, discovery, improvement, or innovation that was not available to the District on the effective date of the contract, whether or not patentable, including, but not limited to, new processes, emerging technology, machines, and improvements to or new applications of existing processes, machines, manufactures and software. Also included are new computer programs, and improvements to, or new applications of, existing computer programs, whether or not copyrightable and any new process, machine, including software, and improvements to, or new applications of, existing processes, machines, manufactures and software.

  • Licensed Intellectual Property Rights means any Intellectual Property Rights owned by a third party that a Person has a right to use, exploit or practice by virtue of a license grant, immunity from Legal Action or otherwise.

  • Intellectual Property Rights (IPR) (11/18) means any patent rights, copyrights, trade secrets, trade names, service marks, trademarks, trade dress, moral rights, know-how and any other similar rights or intangible assets to which rights of ownership accrue, and all registrations, applications, disclosures, renewals, extensions, continuations, or reissues of the foregoing now or hereafter in force. “Key Personnel” (11/18) means the specific individuals identified in Section 3.11 to fill Key Positions.

  • Intellectual Property the collective reference to all rights, priorities and privileges relating to intellectual property, whether arising under United States, multinational or foreign laws or otherwise, including copyrights, copyright licenses, patents, patent licenses, trademarks, trademark licenses, technology, know-how and processes, and all rights to xxx at law or in equity for any infringement or other impairment thereof, including the right to receive all proceeds and damages therefrom.

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • Licensed Software includes error corrections, upgrades, enhancements or new releases, and any deliverables due under a maintenance or service contract (e.g., patches, fixes, PTFs, programs, code or data conversion, or custom programming).

  • Technology means all Software, content, websites, technical data, subroutines, tools, materials, invention disclosures, improvements, apparatus, creations, works of authorship and other similar materials, and all recordings, graphs, drawings, reports, analyses, documentation, user manuals and other writings, and other tangible embodiments of the foregoing, in any form whether or not specifically listed herein.

  • Intellectual Property (IP) means all copyright, rights in relation to inventions (including patent rights and unpatented technologies), plant varieties, registered and unregistered trademarks (including service marks), registered designs, confidential information (including trade secrets and know-how), mask-works and integrated circuit layouts, and all other rights resulting from intellectual activity in the industrial, scientific, literary or artistic fields;

  • Intellectual Property Right means any patent, trade mark, service mark, copyright, moral right, right in a design, know-how and any other intellectual or industrial property rights, anywhere in the world whether or not registered.

  • Intellectual Property License Agreement means the intellectual property license agreement substantially in the form attached as Exhibit B to the Contribution and Distribution Agreement.

  • Program Technology means Program Know-How and Program Patents.

  • Intellectual Property License means any license, permit, authorization, approval, contract or consent granted, issued by or with any Person relating to the use of Intellectual Property.

  • Company Licensed Intellectual Property means Intellectual Property Rights owned by any Person (other than a Group Company) that is licensed to any Group Company.