Common use of Level of Protection Clause in Contracts

Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authentication, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS Content. The Core Functions of AACS shall be implemented in a reasonable method so that they:

Appears in 2 contracts

Samples: Participant Agreement, Content Provider Agreement

AutoNDA by SimpleDocs

Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authenticationauthentication (including but not limited to authentication in the context of Managed Copy Authorization), use of a Bound Copy Method, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS ContentContent to unauthorized access. The Core Functions of AACS shall be implemented in a reasonable method so that they:: For review only - Not for execution

Appears in 1 contract

Samples: Aacs Content Provider Agreement

AutoNDA by SimpleDocs

Level of Protection. Core Functions. “Core Functions” of AACS include encryption, decryption, authenticationauthentication (including but not limited to authentication in the context of Managed Copy Authorization), use of a Bound Copy Method, maintaining confidentiality of Secrecy Required Values and integrity of Integrity Required Values, and preventing exposure of the video portions of compressed, Decrypted AACS ContentContent to unauthorized access. The Core Functions of AACS shall be implemented in a reasonable method so that they:

Appears in 1 contract

Samples: Aacs Content Provider Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.