Examples of Approved DRM in a sentence
DPO shall notify STAR and investigate the matter as soon as reasonably practicable but in no event later than 24 hours after DPO becomes aware of any security breach (e.g. circumvention, breach or failure of its security systems, CAS or copy control systems, the Approved DRM, the usage rules, or DPO’s servers affecting the Channels (a “Security Breach”).
Any proposed changes to an Approved DRM shall require STAR’s prior written consent.
DPO shall notify TVTN’s authorized agent STAR and investigate the matter as soon as reasonably practicable but in no event later than 24 hours after DPO becomes aware of any security breach (e.g. circumvention, breach or failure of its security systems, CAS or copy control systems, the Approved DRM, the usage rules, or DPO’s servers affecting the Channels (a “Security Breach”).
HLS on iOS devices may be implemented either using applications or using the provisioned Safari browser, subject to requirement “Use of Approved DRM for HLS Key Management” above.
Http live streaming on iOS devices may be implemented either using applications or using the provisioned Safari browser, subject to requirement “Use of Approved DRM for HLS Key Management” above.
DPO shall notify TVTN and investigate the matter as soon as reasonably practicable but in no event later than 24 hours after DPO becomes aware of any security breach (e.g. circumvention, breach or failure of its security systems, CAS or copy control systems, the Approved DRM, the usage rules, or DPO‟s servers affecting the Channels (a “Security Breach”).
DPO shall notify TVTN and investigate the matter as soon as reasonably practicable but in no event later than 24 hours after DPO becomes aware of any security breach (e.g. circumvention, breach or failure of its security systems, CAS or copy control systems, the Approved DRM, the usage rules, or DPO’s servers affecting the Channels (a “Security Breach”).
Any proposed changes to an Approved DRM shall require a prior written consent either from TVTN or its authorize agent STAR.
DECE: Executing DRM Provider: By: By: Name: Name: Title: Title: Date: Date: EXHIBIT A CERTIFICATION FOR APPROVED DRM CHANGE MANAGEMENT PROCESS DECE has approved the DRM Provider’s change management process for the DRM by executing this Certification for Approved DRM Change Management Process to which DECE has attached a copy of the DRM’s approved change management process or other documentation reasonably satisfactory to DECE.
In the event that DRM Provider wishes to deploy a Change and either (i) there is no Approved DRM Change Management Process or (ii) such Change is not Covered by the Approved DRM Change Management Process, then the terms of this Section 3.2.3 shall apply with respect to such proposed Change.