Common use of Level of Protection Clause in Contracts

Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they: (i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); and (ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.

Appears in 2 contracts

Sources: Ci Plus Device Interim License Agreement, Ci Plus Device Interim License Agreement

Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they: (i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); andprotection (ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysersanalyzers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.

Appears in 2 contracts

Sources: Ci Plus Device Interim License Agreement, Ci Plus / Most Device Interim License Agreement

Level of Protection. The protection functions of the Specifications (maintaining the confidentiality of Keys, key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, from copying or unauthorized viewing) shall be implemented, at a minimum, in a way that they: (i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); and (ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysersanalyzers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.

Appears in 1 contract

Sources: Ci Plus Device Interim License Agreement

Level of Protection. The protection core encryption functions of the Specifications (maintaining the confidentiality of Keys, key Key generation methods and the cryptographic algorithms, conformance to the Compliance Rules and preventing Controlled Content that has been decrypted, unencrypted from copying or unauthorized viewing) shall be implementedimplemented in accordance with the “Level 2” requirements of the United States Federal Information Processing Standards (see FIPS PUB 140-2 “Security Requirements for Cryptographic Modules,” May 25, 2001), and, at a minimum, in a way that they: (i) Cannot be reasonably foreseen to be defeated or circumvented merely by using general purpose tools or equipment that are widely available at a reasonable price, such as screw drivers, jumpers, clips and soldering irons (“Widely Available Tools”), or using specialized electronic tools or specialized software tools that are widely available at a reasonable price, such as EEPROM readers and writers, debuggers or de-compilers or similar software development tools (“Specialized Tools”), other than devices or technologies whether hardware or software that are designed and made available for the specific purpose of bypassing or circumventing the protection technologies required (“Circumvention Devices”); and (ii) Can only with difficulty be defeated or circumvented using professional tools or equipment (excluding Circumvention Devices and professional tools or equipment that are made available only on the basis of a non-disclosure agreement), such as logic analysersanalyzers, chip disassembly systems, or in-circuit emulators or other tools, equipment, methods or techniques not included in the definition of Widely Available Tools and Specialized Tools in subsection (i) above.

Appears in 1 contract

Sources: Technology License Agreement