specifically designed to ensure that any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users to explore data relationships in a fashion requiring copyright permission, other than the work the party's predecessor in interest had or could give under the terms of sections 4 and 5, provided that you conspicuously and appropriately publish on each copy that you also convey