Anti-Piracy Sample Clauses

Anti-Piracy. In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the IPTV Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access system delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) as may be specified (security specifications), in a non-discriminatory manner in writing, from time to time, by ZEEL. The IPTV Operator shall comply with the Anti-Piracy Requirements set out in Clause VI and VII in ANNEXURE XII and also provide full and complete information for conducting Technical Audit by the auditors, empaneled by the Authority for conducting such audit, by furnishing details outlined in Clause I, II, III, IV and V of ANNEXURE XII attached herewith. The IPTV Operator shall deploy finger printing mechanisms to detect any piracy, violation of copyright and unauthorized viewing of the Channels, distributed / transmitted through its Platform at least every 10 minutes on 24 x 7 x 365(6) basis. The IPTV Operator shall not authorize, cause or suffer any portion of any of the Zee Group Channels to be recorded, duplicated, cablecast, exhibited or otherwise used for any purpose other than for distribution by the IPTV Operator at the time these Channels are made available. If the IPTV Operator becomes aware that any unauthorized third party is recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, the IPTV Operator shall within ten minutes of so becoming aware of such recording, duplicating, cablecasting, exhibiting or otherwise using any or all of the Zee Group Channels for any other purpose, notify ZEEL and the IPTV Operator shall also switch off the concerned Set Top Box to prevent such unauthorized use. However, use of a Set Top Box with Personal Video Recorder/ Digital Video Recorder facility which has been supplied by the IPTV Operator shall not be treated as unauthorized use, as long as such Set Top Box is used in accordance with the terms and conditions of the subscription agreement between the IPTV Operator and the subscriber. The IPTV Operator shall comply with the specifications for Set Top Box, Conditiona...
AutoNDA by SimpleDocs
Anti-Piracy. You must not engage in the manufacture, use, distribution or transfer of counterfeit, pirated or illegal software. You may not distribute or transfer Licensed Products to any party that You know is engaged in these activities. You must report to Microsoft any suspected counterfeiting, piracy or other intellectual property infringement in computer programs, manuals, marketing materials or other materials owned by Microsoft, its Affiliates and/or its licensors as soon as You become aware of it. You will cooperate with Microsoft in the investigation of any party suspected of these activities.
Anti-Piracy. 11.1. In order to prevent Piracy, the Operator shall, prior to the commencement of the Term of this Agreement and at all times during such Term, employ, maintain, and enforce fully effective Security Systems as per the security specifications set forth in Schedule 2 of this Agreement and/or as may be specified in a non-discriminatory manner in writing, from time to time, by the Broadcaster.
Anti-Piracy. (a) In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any of the Subscribed Channels, in whole or in part (“Piracy”), the Affiliate shall, prior to the commencement of the Term of the Agreement and at all times during the Term, employ, maintain, and enforce fully effective conditional access delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) & security specifications as are set forth in Annexure G and/or may be specified, in a non-discriminatory manner in writing, from time to time, by the Broadcaster through the Authorized Representative. The Affiliate granting access to the Subscribed Channels to its subscribers outside/beyond the Territory through the Affiliate’s Permitted Digital Distribution Platform shall tantamount to the Affiliate allowing unauthorized access to the Subscribed Channels. With an aim to ensure that Subscribed Channel(s) are not distributed in an unauthorized manner, Affiliate shall ensure all LCN(s) are integrated with CAS and SMS and that no LCN(s) are kept free / left for any other use (including by LCOs). Additionally, if it comes to the Broadcaster’s knowledge (directly or through the Authorized Agent) that any Subscribed Channel(s) is being retransmitted through Affiliate’s Permitted Digital Distribution Platform (directly or through an affiliated local cable operator of the Affiliate) in the Territory on more than one (1) LCN, then the same shall be deemed to be a material breach of this Agreement and Piracy.
Anti-Piracy. (i) In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part (hereinafter collectively referred to as “Piracy”), the Operator shall, prior to the commencement of the Term of the Agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as “Security Systems”) and security specifications as are set forth in Schedule 2 of this Agreement and/or as may be specified, in a non-discriminatory manner in writing, from time to time, by SDSPL. The Operator granting access to the Subscribed Channels to subscribers outside the Area through its digital Addressable System shall tantamount to the Operator allowing unauthorized access to the Subscribed Channels.
Anti-Piracy. Software piracy is illegal and NCSS, LLC and its affiliates reserve the right to take all legal steps to stop piracy of their products and pursue those who take part in these activities. As part of these anti-piracy efforts, the Software may contain security mechanisms intended to detect the installation or use of illegal copies of the Software and collect and transmit data relating to those illegal copies, and installation or use thereof, to NCSS, LLC and/or its affiliates, and/or their agents, contractors, suppliers, successors and assigns. PASS may use your internal network and Internet connection for the purpose of transmitting license-related data at the time of installation, registration, use of or update to the Software, and for validating the authenticity of the license related data in order to register your Software and protect NCSS, LLC against unlicensed or illegal use of the Software. By installing or using the PASS Software, Customer agrees to such detection, collection and transmission, as well as to the use of such data, for the purposes of identifying illegal usage and protecting and enforcing intellectual property rights.
Anti-Piracy. (i) In order to prevent theft, piracy, unauthorized retransmissions, redistribution or exhibition, copying or duplication of any Channel, in whole or in part, (hereinafter collectively referred to as “Piracy”), the Operator shall, prior to the commencement of the Term of the agreement and at all times during such Term, employ, maintain, and enforce fully effective conditional access delivery and content protection and security systems, and related physical security and operational procedures (hereinafter collectively referred to as the “Security Systems”) & security specifications as are set forth in Schedule 2 and/ or may be specified, in a non-discriminatory manner in writing, from time to time, by the XXXXX SATCOM LTD.
AutoNDA by SimpleDocs
Anti-Piracy. Software piracy is illegal and XXX.Xxxxxxxx Corporation and its affiliates reserve the right to take all legal steps to stop piracy of their products and pursue those who take part in these activities. As part of these anti-piracy efforts, the Software may contain security mechanisms intended to detect the installation or use of illegal copies of the Software, and collect and transmit data relating to those illegal copies, and installation or use thereof, to XXX.Xxxxxxxx Corporation and/or its affiliates, and/or their agents, contractors, suppliers, successors and assigns. By installing or using the Software, Customer agrees to such detection, collection and transmission, as well as to the use of such data, for the purposes of identifying illegal usage and protecting and enforcing intellectual property rights.
Anti-Piracy. Refurbisher must not engage in the distribution of counterfeit or pirated Software. If Refurbisher suspects any infringement of Microsoft intellectual property, it must report it to Microsoft as soon as possible. Refurbisher must also cooperate with the investigation.
Anti-Piracy. Customer acknowledges that the Software may contain a security and reporting mechanism (“Security Mechanism”) intended to automatically collect and transmit to Hexagon and its affiliates (and their contractors, representatives, successors and assigns) data relating to the installation and usage of the Software, for purposes of verifying user compliance with the terms of the applicable license agreement, identifying unauthorized use and users, and otherwise protecting and enforcing intellectual property rights. Data collected and transmitted through the Security Mechanism may include, without limitation, user, device, and network identification information such as, but not limited to, email address, username, hostname, MAC address, IP address, Wi-fi SSID, geolocation and organization domain information, as well as information on Software usage, including product name, version, and time and number of uses. For further information on Hexagon’s use and processing of personal data transmitted and collected through the Security Mechanism, see the Hexagon Manufacturing Intelligence privacy statement, as may be updated from time to time, available at xxx.xxxxxxxxxxx.xxx (or successor web pages).
Time is Money Join Law Insider Premium to draft better contracts faster.