Common use of Level of Protection Clause in Contracts

Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they:

Appears in 4 contracts

Samples: Plus Device Interim License Agreement, Plus Device Interim License Agreement, Plus Device Interim License Agreement

AutoNDA by SimpleDocs

Level of Protection. The protection functions of the Specifications ((i) maintaining the confidentiality of Keys, (ii) key generation methods and the cryptographic algorithms, (iii) conformance to the Compliance Rules and Rules, (iv) preventing Controlled Content that has been decrypted, from copying or unauthorized viewingviewing and (v) Overt Watermarking) shall be implemented, at a minimum, in a way that they:

Appears in 3 contracts

Samples: Plus Device Interim License Agreement, Plus Device Interim License Agreement, Plus Device Interim License Agreement

Level of Protection. The protection core encryption functions of the Specifications Referenced Technology (maintaining the confidentiality of Keys, key Key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing compressed Controlled Content that has been decrypted, unencrypted from copying or unauthorized viewing) shall be implemented, at a minimum, implemented in a way that they:

Appears in 1 contract

Samples: License Agreement

AutoNDA by SimpleDocs

Level of Protection. The protection core encryption functions of the Specifications (maintaining the confidentiality of Keys, key Key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, unencrypted from copying or unauthorized viewing) shall be implementedimplemented in accordance with the “Level 2” requirements of the United States Federal Information Processing Standards (see FIPS PUB 140-2 “Security Requirements for Cryptographic Modules,” May 25, 2001), and, at a minimum, in a way that they:

Appears in 1 contract

Samples: Dfast Technology License Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.