Security Technology definition

Security Technology means, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, encryption, Digital Rights management system, copyright management information system or any feature that facilitates or limits compatibility with other hardware, software, or accessories or other peripherals outside of the Territory or on a different video game system.
Security Technology means the highly proprietary security features incorporated by Nintendo into the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, proprietary manufacturing process or any feature which obstructs piracy, limits unlawful, unsafe or unauthorized use or facilitates or limits compatibility with other hardware or software outside of the Territory or on a different video game system.
Security Technology means the highly proprietary security features of the Wii and the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, encryption, digital rights management system, copyright management information system, proprietary manufacturing process or any feature which obstructs piracy, limits unlawful, unsafe or unauthorized use, or facilitates or limits compatibility with other hardware, software, accessories or peripherals, or with respect to a video game system other than the Wii, or limits distribution outside of the Territory.

Examples of Security Technology in a sentence

  • Additionally, Microsoft may add Security Technology that prohibits the play of Software Titles on Xbox units manufactured in a region or country different from the location of manufacture of the respective Finished Product Units.

  • Additionally, Microsoft may add Security Technology that prohibits the play of Software Titles on Xbox 360 units manufactured in a region or country different from the location of manufacture of the respective FPUs or that have been modified in any manner not authorized by Microsoft.

  • The final release version of the Game, the Game Disc and the Printed Materials shall include such Security Technology as Nintendo, in its sole discretion, deems necessary or appropriate to (a) reduce the risk of unlawful copying or other unlawful, unsafe or unauthorized uses, (b) protect the Proprietary Rights of Nintendo and of the LICENSEE, (c) promote consumer confidence, and (d) increase the quality, reliability or operation of the NINTENDO GAMECUBE system.

  • Approved employee-owned hardware, software, and other equipment must have a configuration that is compatible with the OIT’s information technology infrastructure as outlined in the Commonwealth Information Security Technology Policy, ITP-SEC000, Information Security Policy.

  • Microsoft will have the right to add to the final release version of the Software Title delivered by Licensee to Microsoft, and to all Finished Product Units, such digital signature technology and other security technology and copyright management information (collectively, "Security Technology") as Microsoft may determine to be necessary, and/or Microsoft may modify the signature included in any Security Technology included in the Software Title by Licensee at Microsoft's direction.

  • The final release version of the Game, Game Cartridges and Printed Materials shall include such Security Technology as Nintendo, in its sole discretion, may deem necessary or appropriate.

  • Microsoft has the right to add to the final release version of the Software Title delivered by Publisher to Microsoft, and to all FPUs, such digital signature technology and other security technology and copyright management information (collectively, “Security Technology”) as Microsoft may determine to be necessary, and/or Microsoft may modify the signature included in any Security Technology included in the Software Title by Publisher at Microsoft’s discretion.

  • Microsoft, and not Publisher, will provide to the applicable Authorized Replicator the final release version of the Software Title and all specifications required by Microsoft for the manufacture of the FPUs including, without limitation, the Security Technology (as defined in Section 7.9 below).

  • The final release version of the Game, Game Cards and Printed Materials shall include such Security Technology as Nintendo, in its sole discretion and at its sole expense, may deem necessary or appropriate.

  • Vacation will be scheduled at such times as shall be mutually agreeable to the Bargaining Unit member and the Director of Communications and Security Technology Division (or designee).


More Definitions of Security Technology

Security Technology means such digital signatures, other security technology, and copyright management information that may be added to an FPU.
Security Technology means digital signatures, other security technology, and copyright management information that may be added to a Software Title by Microsoft.
Security Technology means the highly proprietary security features incorporated by NCL into the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, proprietary manufacturing process, encryption, Digital Rights management status, or any feature that obstructs piracy, limits unlawful, unsafe or unauthorized use or facilitates or limits compatibility with other hardware, software, or accessories or other peripherals outside of the Territory or on a different video game system.
Security Technology. We continually develop and implement features to keep your personal information safe - for example, when you enter any information anywhere on the Service, we encrypt the transmission of that information using secure socket layer technology (SSL) by default. • We ensure passwords are stored and transferred securely using encryption and salted hashing. • Employee Access: We use best-effort practices to secure usernames, passwords and any other means of gaining access to users data. All employees sign confidentiality agreements and pass criminal background checks.
Security Technology means, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, encryption, Digital Rights management system, or any feature which facilitates or limits compatibility with other hardware, software, accessories or other peripherals, outside of the Territory or on a different video game system.
Security Technology means the highly proprietary security features incorporated by NCL into the Licensed Products to minimize the risk of unlawful copying and other unauthorized or unsafe usage, including, without limitation, any security signature, bios, data scrambling, password, hardware security apparatus, watermark, hologram, copyright management information system, proprietary manufacturing process or any feature

Related to Security Technology

  • Licensor Technology means the Licensor Patents and the Licensor Know-How.

  • Licensee Technology means the Licensee Know-How and Licensee Patents.

  • Licensed Intellectual Property means Intellectual Property licensed to the Company or any Subsidiary pursuant to the Company IP Agreements.

  • Licensed Technology means the Licensed Patents and Licensed Know-How.

  • Customer Technology means Customer's proprietary technology, including Customer's Internet operations design, content, software tools, hardware designs, algorithms, software (in source and object forms), user interface designs, architecture, class libraries, objects and documentation (both printed and electronic), know-how, trade secrets and any related intellectual property rights throughout the world (whether owned by Customer or licensed to Customer from a third party) and also including any derivatives, improvements, enhancements or extensions of Customer Technology conceived, reduced to practice, or developed during the term of this Agreement by Customer.