AACS Keys definition

AACS Keys means, collectively, AACS Public Keys, Device Keys, Device Key Sets, MKBs, Media Keys, Sequence Keys, certificates, and all other cryptographic values referenced in the Specifications, other than Evaluation Keys, that are made available only by, or at the direction of and under license by, AACS LA. For clarification, Title Keys are not part of the definition of AACS Keys for the purpose of this Agreement; however requirements apply to the use and protection of Title Keys as otherwise provided in this Agreement and the Compliance and Robustness Rules.

Examples of AACS Keys in a sentence

  • The types of AACS Keys and the procedures applicable for their assignment, use and expiration are set forth in the Compliance Rules and this Section 10.

  • Prior to distributing AACS Keys to Adopter, AACS LA shall use reasonable care to verify, or cause its designee to use reasonable care to verify, that such Device Keys are correct.

  • AACS LA shall keep confidential, and not disclose to third parties, the fact that Adopter was issued erroneous AACS Keys, provided that AACS LA may disclose such information to the Founders without identifying Adopter, and provided further that AACS LA shall be relieved of such confidentiality obligation if Adopter makes such information publicly available or in any of the other circumstances described in Section 6.10.

  • Such report shall further indicate whether such Licensed Components contained any AACS Keys.

  • For so long as Content Participant is an Eligible Content Participant, it shall have the right to seek expiration of certain AACS Keys pursuant to the terms of Section 6.

  • The Specifications include means by which certain AACS Keys may be Expired.

  • In addition, in the event that one or more Fellow Adopters receives such an erroneous AACS Key, AACS LA shall make available to such Fellow Adopters, on a pass-through basis, the benefit of any ability that AACS LA has to recover for such Fellow Adopters’ losses from any third party key generator that makes such AACS Keys under contract with AACS LA.

  • In addition, if AACS LA is not reasonably satisfied that the information set forth in such affidavit rules out the possibility that the Expired AACS Keys were obtained by unauthorized parties from or used for unauthorized purposes in Adopter’s product(s), AACS LA may, either in addition to or instead of such a third party audit, request, and Adopter shall, provide certification of an expert report as set forth in Section 10.6.5 within eighty (80) days of such request.

  • Without limiting the foregoing, AACS LA shall not Expire AACS Keys (a) based on Adopter’s breach of this Agreement, other than where Adopter has caused any of the circumstances set forth in Sections 10.3.1 through 10.3.7 above; or (b) to disable products or devices where the security of the AACS Technology has been compromised by third parties, other than as described in Sections 10.3.1. through 10.3.7 above.

  • In the event such destroyed Licensed Components contained AACS Keys, Authorized Reseller shall provide AACS LA and Adopter the AACS Key numbers of such destroyed Licensed Components.