Content Protection Clause Samples

A Content Protection clause establishes requirements and obligations for safeguarding proprietary or sensitive content shared between parties. Typically, it outlines measures such as encryption, access controls, and restrictions on copying or distributing content, and may specify the types of content covered, such as digital media, software, or confidential information. The core function of this clause is to prevent unauthorized use or disclosure of valuable content, thereby protecting intellectual property and reducing the risk of data breaches or misuse.
POPULAR SAMPLE Copied 3 times
Content Protection. Schedule C - Content Protection Requirements and Obligations - of the Agreement shall be deleted in its entirety and replaced with the attached Schedule C – Content Protection Requirements and Obligations.
Content Protection. 52 6.11.1 Content Protection (Esafe) Administration .............. 52 6.12
Content Protection a. LS shall cause Apple to protect materials furnished by Publisher in a manner no less restrictive than LS and Apple protect materials furnished by any other book publisher, including the use of the Security Solution, and the implementation and enforcement of Content Usage Rules, as set forth in Exhibit E, except as otherwise agreed by Publisher and LS. Notwithstanding the foregoing, on a title-by-title and country-by-country basis, using technical means provided and approved by LS, Publisher may instruct LS and Apple to make eBooks available hereunder without the Security Solution. If the Security Solution is compromised such that eBooks are being made widely available without restriction, having a material adverse effect on the commercial purpose of the appointment and this Schedule, then LS shall cause Apple to use commercially reasonable efforts to cure such compromise. If the breach is not substantially cured within thirty (30) days, then Publisher may stop providing additional New Releases to LS, and if the breach is not substantially cured within sixty (60) days, then Publisher may suspend LS’s appointment until cured. b. In the event of a security breach of the Online Store servers such that unauthorized access to Publisher Content becomes available, then LS shall cause Apple to disable all access to such servers or destroy content on such servers within twenty-four (24) hours. c. Publisher Materials in Apple’s control or possession shall reside only on secure network servers or equivalent devices owned or controlled by Apple or its contractors with restricted access.
Content Protection. AND USAGE RULES Licensee shall at all times comply with the Content Protection Requirements and Usage Rules with respect to all Programs. The Programs designated as SEL Programs in Exhibit A (the “SEL Programs”) shall be made available to Eligible Consumers who validate/authenticate their Approved Devices with Licensee’s service for no additional charge by the delivery from Licensee or its vendors of a decryption key to such Eligible Consumers after they have completed such validation/authentication. All other Programs (“SEN Programs”) shall only be viewable by Eligible Consumers who purchase a decryption key for an additional charge per Program per transaction through Sony Entertainment Network (“SEN”), which transaction shall be subject to the terms and conditions of another agreement between Licensor and SEN. The Content Protection Requirements and Usage Rules shall be non-precedential with respect to any future agreement between the parties that permits programs to be delivered via other means of delivery. LICENSE FEE Licensee shall pay to Licensor a wholesale fee of $25.50 for each SEL Program per Approved Device distributed to an Eligible Consumer and not returned (collectively for all SEL Programs on all Approved Devices, the “License Fees”). The License Fees shall be payable regardless of whether decryption keys are sent to or used by Eligible Consumers or whether Programs are viewed by Eligible Consumers. By way of example, if Licensee distributes 400 Approved Devices with all SEL Programs loaded thereon and no Approved Devices are returned, Licensee will owe Licensor a total of $102,000 (i.e., $25.50 multiplied by 10 SEL Programs, multiplied by 400 Units). No deductions of any kind are permitted before remitting payment to Licensor (including any tax, levy or charge, the payment of which shall be the responsibility of Licensee). For the avoidance of doubt, the price charged by Licensee for each Approved Device shall be established by Licensee in its sole and absolute discretion; provided that Licensee shall not charge any per transaction or per program fee for any Programs. AGREED TO AND ACCEPTED: Sony Electronics Inc. Sony Pictures Home Entertainment Inc. By Title By Title
Content Protection. (a) Apple shall protect materials furnished by Publisher in a manner no less restrictive than Apple protects materials furnished by any other book publisher, including the use of the Security Solution, and the implementation and enforcement of Content Usage Rules, as set forth in Exhibit E, except as otherwise agreed by Publisher and Apple. Notwithstanding the foregoing, on a title-by-title and country-by-country basis, using iTunes Connect or via other technical means provided and approved by Apple, Publisher may instruct Apple to make eBooks available hereunder without the Security Solution. If the Security Solution is compromised such that eBooks are being made widely available without restriction, having a material adverse effect on the commercial purpose of the appointment and this Agreement, then Apple shall use commercially reasonable efforts to cure such compromise. If the breach is not substantially cured within thirty (30) days, then Publisher may stop providing additional New Releases to Apple, and if the breach is not substantially cured within sixty (60) days, then Publisher may suspend Apple’s appointment until cured. (b) In the event of a security breach of the Online Store servers such that unauthorized access to Publisher Content becomes available, then Apple will disable all access to such servers or destroy content on such servers within twenty-four (24) hours. (c) Publisher Materials in Apple’s control or possession shall reside only on secure network servers or equivalent devices owned or controlled by Apple or its contractors with restricted access.
Content Protection. Schedule B of the Agreement, Content Protection Requirements and Obligations, shall be deleted in its entirety and replaced with the updated Schedule B Content Protection Requirements and Obligations, attached as Exhibit 1 to this First Amendment.
Content Protection. [▇▇▇▇▇▇ to send Sony team an email detailing Google’s technical protections so that we can share such technical efforts with SPE Digital Policy. Content protection is still under review by SPE and is subject to further comment.]
Content Protection. COMPANY Content used in connection with the Radio Service will be protected no less than any other third party content used in connection with the Radio Service.
Content Protection. HP-OMS will provide Full Support for content protection of the Customer with proactive, multi-tiered Internet Content Security for gateway and mail servers, protecting the entire IT Environment from: o Viruses, Trojans, worms, blended threats, and other malicious code that destroys or steals digital assets o Security exploits in corporate email servers and email clients HP-OMS will provide content protection Services according to the Customer Security Policy that will be defined by the customer. In addition HP-OMS will make changes to the content protection Services according to changes that will be approved by the Change Management process.
Content Protection. For audio playback in our native clients, we use ****. Every audio file is encrypted ****. Files can be ****, should the need arise. The client requests a ****. **** Confidential portion omitted and filed separately with the Securities and Exchange Commission pursuant to a request for confidential treatment. It will compute the appropriate **** in memory before decrypting to give some protection against ****. For video playback, and audio playback in web clients, third party, **** systems, such as ****, are used for content protection. Similar to ****. All network traffic between the Spotify servers and the clients as well as between the clients is ****. The proprietary protocol uses a **** in both cases to ensure ****. The **** to prevent ****. The protocol is proprietary to prevent ****. Web stack communication with the Spotify backend is handled over ****. The native clients’ **** is also ****, where an attacker would ****. Similarly, the client stores ****. A schematic overview of the encryption used is given in the figure below. Figure 2: Overview of encryption used by the native clients **** Confidential portion omitted and filed separately with the Securities and Exchange Commission pursuant to a request for confidential treatment.