The Content Protection definition

The Content Protection. System shall maintain the integrity of all protected content. The Content Protection System shall detect any tampering with or modifications to the protected content from its originally encrypted form. Each installation of the Content Protection System on an end user device shall be individualized and thus uniquely identifiable. [For example, if the Content Protection System is in the form of client software, and is copied or transferred from one device to another device, it will not work on such other device without being uniquely individualized.] The Licensed Service shall prevent the unauthorized delivery and distribution of Licensor’s content (for example, user-generated / user-uploaded content) and shall use reasonable efforts to filter and prevent such occurrences. Digital Rights Management Any Digital Rights Management used to protect Licensed Content must support the following: A valid license, containing the unique cryptographic key/keys, other necessary decryption information, and the set of approved usage rules, shall be required in order to decrypt and play each piece of content. Each license shall bound to either a (i) specific individual end user device or (ii) domain of registered end user devices in accordance with the approved usage rules. Licenses bound to individual end user devices shall be incapable of being transferred between such devices. Licenses bound to a domain of registered end user devices shall ensure that such devices are only registered to a single domain at a time. An online registration service shall maintain an accurate count of the number of devices in the domain (which number shall not exceed the limit specified in the usage rules for such domain). Each domain must be associated with a unique domain ID value. If a license is deleted, removed, or transferred from a registered end user device, it must not be possible to recover or restore such license except from an authorized source.
The Content Protection. System shall prohibit analog outputs. The Content Protection System shall prohibit digital output of decrypted protected content. Notwithstanding the foregoing, a digital signal may be output if it is protected and encrypted by High Definition Copy Protection (“HDCP”). Defined terms used but not otherwise defined in this Section 3.2 shall have the meanings given them in the HDCP license agreements, as applicable. A device that outputs decrypted protected content provided pursuant to the Agreement using HDCP shall: This is unnecessary as the conditional access authenticates the devices by its unique address. If requested by Licensor, deliver a file associated with the protected content named “HDCP.SRM” and, if present, pass such file to the HDCP source function in the set-top box as a System Renewability Message; and Verify that the HDCP Source Function is fully engaged and able to deliver the protected content in a protected form, which means: HDCP encryption is operational on such output, Processing of the System Renewability Message associated with the protected content, if any, has occurred as defined in the HDCP Specification, and There is no HDCP Display Device or Repeater on such output whose Key Selection Vector is in such System Renewability Message. The Content Protection System shall prohibit recording, transfer or copying of protected content onto recordable or removable media except as explicated stated in the usage rules. The Content Protection System shall prohibit recording, transfer or copying of protected content onto external devices (for example Portable Media Players) except as explicitly stated in the usage rules..
The Content Protection. System shall maintain the integrity of all protected content. The Content Protection System shall detect any tampering with or modifications to the protected content from its originally encrypted form.

Examples of The Content Protection in a sentence

  • The Content Protection System shall take affirmative, reasonable measures to restrict access to Licensor’s content to within the territory in which the content has been licensed.

  • The Content Protection System shall prohibit recording of protected content onto recordable or removable media, except as such recording is explicitly allowed elsewhere in this agreement.

  • The Content Protection System shall prohibit digital output of decrypted protected content.

  • The Content Protection System shall be renewable and securely updateable in event of a breach of security or improvement to the Content Protection System.

  • The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System.

  • The Content Protection System or playback device must not intentionally remove or interfere with any embedded watermarks or embedded copy control information in licensed content.

  • The Content Protection System shall provide mechanisms that revoke, upon written notice from Licensor of its exercise of its right to require such revocation in the event any CSPs are compromised, (a) the instance of the Content Protection System with the compromised CSPs, and (b) any and all playback licenses issued to (i) specific individual end user device or (ii) domain of registered end user devices.

  • The Content Protection System shall enable CGMS-A content protection technology on all analog outputs from end user devices.

  • The Content Protection System shall: be approved in writing by Licensor (including any upgrades or new versions, which Licensee shall submit to Licensor for approval upon such upgrades or new versions becoming available), be fully compliant with all the compliance and robustness rules associated therewith, and use only those rights settings, if applicable, that are approved in writing by Licensor.

  • Red xxxxxxx code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes.


More Definitions of The Content Protection

The Content Protection. System shall maintain the integrity of all protected content. The Content Protection System shall detect any tampering with or modifications to the protected content from its originally encrypted form. Each installation of the Content Protection System on an end user device shall be individualized and uniquely identifiable. For example, if the Content Protection System is in the form of client software, and is copied or transferred from one device to another device, it will not work on such other device without being uniquely individualized. [The Licensed Service shall prevent the unauthorized delivery and distribution of Licensor’s content (for example, user-generated / user-uploaded content) and shall use reasonable efforts to filter and prevent such occurrences. NOTE TO SONY – CAN WE PLEASE DISCUSS WHAT YOU’RE TRYING TO CAPTURE UNDER THIS CLAUSE WHICH IS NOT OTHERWISE COVERED BY OTHER CLAUSES OF THE AGREEMENT/SCHEDULE (FOR EXAMPLE, ENCRYPTION/GEO-FILTERING/OUT PROTECTION)] [TW: This is the content filtering clause. We should either reinstate (in the new location) this clause above or instead put in the more up to date and frankly, clearer, version of this requirement, which is “If Licensee supports or facilitates any content sharing or upload service for its Users, the Licensed Service shall use appropriate technology (e.g. digital fingerprint and filtering techniques) to prevent the unauthorized delivery and distribution of Licensor’s content across such content sharing or upload services”] Digital Rights Management Any digital rights management used to protect content must support the following: A valid license, containing the unique cryptographic key/keys, other necessary decryption information and the set of approved usage rules [NOTE TO SONY – WHAT ARE THESE USEAGE RULES? IS IT REFERING TO THE USEAGE RULES IN CLAUSE 3.5?],, shall be required in order to decrypt and play each piece of content. Each license shall be bound to either a (i) specific individual end user device or (ii) domain of registered end user devices in accordance with clause 3.5 of this Agreement. Licenses bound to individual end user devices shall be incapable of being transferred between such devices. Licenses bound to a domain of registered end user devices shall ensure that such devices are only registered to a single subscriber account at a time. An online registration service shall maintain an accurate count of the number of devices in the domain other than Sky STB’s [and Who...
The Content Protection. System shall maintain the integrity of all protected content. The Content Protection System shall detect any tampering with or modifications to the protected content from its originally encrypted form. Each installation of the Content Protection System on an end user device shall be individualized and thus uniquely identifiable. [For example, if the Content Protection System is in the form of client software, and is copied or transferred from one device to another device, it will not work on such other device without being uniquely individualized.] The Licensed Service shall prevent the unauthorized delivery and distribution of Licensor’s content (for example, user-generated / user-uploaded content) and shall use reasonable efforts to filter and prevent such occurrences.

Related to The Content Protection

  • Cathodic protection means a technique designed to prevent the corrosion of a metal surface by making that surface the cathode of an electrochemical cell. For example, protection can be accomplished with an impressed current system or a galvanic anode system.

  • Fire Protection means all aspects of fire safety including but not limited to fire prevention, firefighting or Fire Suppression, pre-fire planning, fire investigation, public education and information, training or other staff development;

  • the 1961 Act means the Land Compensation Act 1961(d); “the 1965 Act” means the Compulsory Purchase Act 1965(e); “the 1980 Act” means the Highways Act 1980(f);

  • MFN Protection has the meaning set forth in Section 2.14(e)(iii).

  • Data Protection means the implementation of appropriate administrative, technical or physical means to guard against unauthorized intentional or accidental disclosure, modification, or destruction of data.

  • Data Protection Act means Act CXII of 2011 on Informational Self-Determination and Freedom of Information.

  • ERCOT Protocols means the document adopted by ERCOT, including any attachments or exhibits referenced in that document, as amended from time to time, that contains the scheduling, operating, planning, reliability, and settlement (including customer registration) policies, rules, guidelines, procedures, standards, and criteria of ERCOT. For the purposes of determining responsibilities and rights at a given time, the ERCOT Protocols, as amended in accordance with the change procedure(s) described in the ERCOT Protocols, in effect at the time of the performance or non-performance of an action, shall govern with respect to that action.

  • Sort code means the 6-digit code that identifies a particular bank and bank branch in the Republic of Ireland;

  • Wellhead protection area means the surface and subsurface area surrounding a water well or well field that supplies a public water system through which contaminants are reasonably likely to migrate toward the water well or well field.

  • EU Data Protection Law means (i) prior to 25 May 2018, Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of Personal Data and on the free movement of such data ("Directive") and on and after 25 May 2018, Regulation 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of Personal Data and on the free movement of such data (General Data Protection Regulation) ("GDPR"); and (ii) Directive 2002/58/EC concerning the processing of Personal Data and the protection of privacy in the electronic communications sector and applicable national implementations of it (as may be amended, superseded or replaced).

  • Plant Protection Gas means the minimum volumes required to prevent physical xxxx to the plant facilities or danger to plant personnel when such protection cannot be afforded through the use of an alternate fuel. This includes the protection of such material in process as would otherwise be destroyed, but shall not include deliveries required to maintain plant production. A determination will be made by the Seller of minimum volumes required. Such essential volumes will be dispatched accordingly.

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Access Code means the Railways (Access) Code 2000;

  • Cathodic protection tester means a person who can demonstrate an understanding of the principles and measurements of all common types of cathodic protection systems as applied to buried or submerged metal piping and tank systems. At a minimum, such persons must have education and experience in soil resistivity, stray current, structure-to-soil potential, and component electrical isolation measurements of buried metal piping and tank systems.

  • Data Protection Law means the applicable legislation protecting the fundamental rights and freedoms of persons and their right to privacy with regard to the processing of Personal Data under the Agreement (and includes, as far as it concerns the relationship between the parties regarding the processing of Personal Data by SAP on behalf of Customer, the GDPR as a minimum standard, irrespective of whether the Personal Data is subject to GDPR or not).

  • Community protection zone means the area within eight

  • Electrical protection barrier means the part providing protection against any direct contact to the high voltage live parts.

  • the applicable data protection law means the legislation protecting the fundamental rights and freedoms of individuals and, in particular, their right to privacy with respect to the processing of personal data applicable to a data controller in the Member State in which the data exporter is established;

  • Applicable Data Protection Law means, as applicable, the EU General Data Protection Regulation (Regulation 2016/679) (as may be amended, superseded or replaced) ("GDPR") and all other supplemental or implementing laws relating to data privacy in the relevant European Union member state, including where applicable the guidance and codes of practice issued by the relevant supervisory authority, and/or all applicable analogous privacy laws of other countries;

  • Marking means a symbol or group of symbols displayed on the surface of the movement area in order to convey aeronautical information;

  • the 1965 Act means the Compulsory Purchase Act 1965(2);

  • Internet Protocol or “IP” means a communications protocol for devices connected to the Internet that specifies the format for addresses and units of transmitted data.

  • Technology protection measure means a specific technology that blocks or filters Internet access to visual depictions that are:

  • Criminal justice information system means a system including the equipment, facilities, procedures,

  • EU Data Protection Laws means EU Directive 95/46/EC, as transposed into domestic legislation of each Member State and as amended, replaced or superseded from time to time, including by the GDPR and laws implementing or supplementing the GDPR;

  • the 1981 Act which means the Compulsory Purchase (Vesting Declarations) Act 1981.