Satellite Encryption Sample Clauses

The Satellite Encryption clause establishes requirements for encrypting data transmitted to and from satellites. Typically, it mandates the use of specific encryption standards or protocols to protect sensitive information during satellite communications, and may apply to both ground stations and onboard satellite systems. This clause ensures the confidentiality and integrity of data, addressing the risk of unauthorized interception or tampering during transmission.
POPULAR SAMPLE Copied 1 times
Satellite Encryption. In accordance with then prevailing commercial practices of broadcasters of Audiovisual Content in the United States, Licensee (and its Affiliates) and Grupo Televisa shall encrypt their respective satellite Broadcasts of Licensed Content in the Territory and outside the Territory respectively, on a conditional access basis (i.e., access to the Broadcast is dependent on the use of receiving equipment which decrypts the Broadcast if, and only if, the user of the equipment is individually and specifically authorized to access the Broadcast by the party permitted to Broadcast such Audiovisual Content). The reception of such an encrypted satellite Broadcast or the unauthorized decryption of such a satellite Broadcast shall not be considered a breach of this Agreement by Licensee (or its Affiliates) or Grupo Televisa, respectively, so long as (A) such parties’ Broadcast is intended for reception only by authorized viewers inside the Territory or outside the Territory, respectively; (B) such unauthorized reception or decryption is unintentional and incidental; and (C) Licensee (and its Affiliates) or Grupo Televisa, as applicable, does not market the availability of such reception or decryption to persons located outside of its authorized territory.

Related to Satellite Encryption

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.