access control or protection process, such as encryption or scrambling, or a copy control mechanism, which achieves the objective of protection.Return to first footnote 14 referrerFootnote 15In implementing paragraphs 5 and 6, no Party shall be obligated to require that the design of, or the design and selection of parts and components for, a consumer electronics, telecommunications, or computing