Last updated: February 29, 2016

What Does Compliance Mean?

Compliance, in DRM, references a manufacturers’ adherence to output copy protection. Manufacturers who distribute digital rights management (DRM) equipment must comply with copy protection rules, which include protective measures. These protective measures and technologies prevent hackers from copying unauthorized materials.

Technical documents are specified within private license contracts, which apply to the equipment implementing DRM. In conjunction with compliance rules, manufacturers must adhere to robustness rules further protecting against hackers attempting unrestricted copying. Usually they are private in nature, while others are public. Compliance rules pertaining to DRM devices also pertain to software and are similar to behavioral rules. Adherence to them should be in conjunction with robustness rules, each under the umbrella of DRM laws and regulations.


Techopedia Explains Compliance

Ensuring output copy protection in video cards and in secure digital (SD) memory cards are two examples of DRM equipment compliance required by manufacturers. If a manufacturer is meeting compliance rules, it will be issued a type of device certificate. If one device is certified in this manner, it can be entrusted to pass the content along to another certified device. Compliance rules help determine acceptable interfaces when protected content is found on potentially shared devices. Technical specifications are unable to do this and compliance rules are necessary.

It is difficult to address compliance rules without referencing robustness rules. In the DRM arena, the two terms are interrelated and formally referenced as compliance and robustness (C and R). There is a C and R group made up of various companies engaged in proactive measures to remain within antitrust laws without conflicts of interest. They are also responsible for enhancing trust in original content owners, assuring them that their rights protected content will be securely transferred from one DRM system to another.


Share this Term

  • Facebook
  • LinkedIn
  • Twitter

Related Reading


Data ManagementEnterprise ITe-CommerceInformation AssuranceLegal/PrivacyEmerging TechnologyData Privacy and Compliance

Trending Articles

Go back to top