Common use of Defeating Functions Clause in Contracts

Defeating Functions. Licensed Products shall not include: (a) switches, buttons, jumpers, specific traces (electrical connections) that can be cut, or software equivalents of any of the foregoing; or (b) Debug Functions such as active JTAG ports, active emulator interfaces or active test points to probe security functions; or (c) special functions or modes of operation (including service menus or remote-control functions); in each case (i) by which an ECP Protection Function can be defeated, (ii) by which a Standard Protection Function can be defeated, (iii) by which a CI Plus 2nd RoT Trust Value can be modified, (iv) by which a CI Plus RoT Trust Value can be modified, (v) by which a CI Plus 2nd RoT Secret Value can be modified or revealed, (vi) by which a CI Plus RoT Secret Value can be modified or revealed, (vii) by which ECP Controlled Content can be exposed to unauthorized access, copying, redistribution, or modification of user rights, (viii) by which Controlled Content can be exposed to unauthorized access, copying, redistribution, or modification of user rights (ix) by which the protection provided by the CI Plus ECP Trusted Boundary can be defeated, (x) by which the ECP Compliance Rules can be defeated, in each case other than as permitted under this License Agreement.

Appears in 3 contracts

Sources: Ci Plus Ila Addendum for Ecp, Ci Plus Ila Addendum, Ci Plus Ila Addendum for Ecp