Integrity detection Clause Samples

Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime.
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red ▇▇▇▇▇▇▇ code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player).
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red ▇▇▇▇▇▇▇ code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. The Content Protection System shall implement secure internal data channels to prevent rogue processes from intercepting data transmitted between system processes. Licensor deems the Content Protection System to sufficiently meet the foregoing requirements. The Content Protection System shall prevent the use of media player filters or plug-ins that can be exploited to gain unauthorized access to content (e.g., access the decrypted but still encoded content by inserting a shim between the DRM and the player). Licensor deems the Content Protection System to sufficiently meet the foregoing requirements.
Integrity detection. Using one-way cryptographic hashes of the executable code segments and/or self-referential integrity dependencies, the trusted software fails to execute and deletes all CSPs if it is altered prior to or during runtime. Anti-debugging: The decryption engine prevents the use of common debugging tools. Red ▇▇▇▇▇▇▇ code: The security modules use extra software routines that mimic security modules but do not have access to CSPs. No High Definition Feature Films may be output over compressed video outputs on Approved Devices. With respect to the output of High Definition Feature Films over uncompressed video outputs on Approved Devices, Amazon shall require thatwill signal for HDCP isto be enabled. Notwithstanding the foregoing, with respect to the output of High Definition Feature Films over uncompressed outputs on Approved Devices that are personal computers, if the Customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied), Amazon must ensure that the playback of High Definition Features Films over such outputs is in a resolution no greater than Standard Definition (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)); provided that Amazon may implement Digital Video Interface version 1.0 (“DVI”) without HDCP and allow High Definition Feature Films to be output in High Definition on such interface on personal computer platforms until December 31, 2011, after which date Amazon shall down-res High Definition Feature Films to a resolution no greater than Standard Definition for playback over DVI (which playback must be in accordance with the output requirements specified in Schedule B-1 or Schedule B-5 (as applicable)). Amazon will discuss with CDD in good faith a sunset date for the output of High Definition Feature Films over analog outputs on Approved Devices. CDD authorizes Amazon to format and encode the Source Copies and other materials delivered by CDD in the formats established by Amazon for the Service (any such encoded copy of an Included Program, an “Encoded File”), provided that Amazon may not create Encoded Files in an up-converted or analogous format in which the Encoded File has a higher resolution than the Source Copy from which it was created. Standard Definition Encoded Files created from a High Definition Source Copy must maintain the aspect ratio of the Source Copy. No Encoded File of an Included Pr...

Related to Integrity detection

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting DHCS PHI or PI that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Virus Detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Prevention IP shall take all appropriate measures to prevent sexual exploitation and abuse, and child safeguarding violations, by its employees, personnel or subcontractors. IP shall, inter alia, ensure that its employees, personnel or subcontractors shall have undertaken and successfully completed appropriate training with regard to the prevention of sexual exploitation and abuse, and training on safeguarding children. Such training shall include but not be limited to: reference to definitions of sexual exploitation and sexual abuse, and child safeguarding violations; a clear and unambiguous statement that any form of sexual exploitation and abuse, and any conduct that undermines the safeguarding of children, is prohibited; the requirement that any allegations of sexual exploitation and abuse, or child safeguarding violations be promptly reported as provided for in Article 14.4; and the requirement that alleged victims of sexual exploitation and abuse or child safeguarding violations, be promptly informed of and referred to available professional assistance, upon her or his consent.

  • Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will: