Risk Associated with Other Applications Sample Clauses

Risk Associated with Other Applications. The Platform may give rise to other, alternative projects, promoted by unaffiliated third parties, under which the Token will have no intrinsic value.
AutoNDA by SimpleDocs
Risk Associated with Other Applications the products , services, platforms and/or the OWL Token Generation Interface may give rise to other, alternative projects, promoted by unaffiliated third parties, under which the OWL Tokens will have no intrinsic value.
Risk Associated with Other Applications. The Contributor understands and accepts that the Projects may give rise to other alternatives projects, promoted by unaffiliated third parties under which Tokens will have no intrinsic value.
Risk Associated with Other Applications the STX Platform may give rise to other, alternative projects, promoted by unaffiliated third parties, under which Tokens will have no intrinsic value.
Risk Associated with Other Applications the OTCE Platform may give rise to other, alternative projects, promoted by unaffiliated third parties, under which Tokens will have no intrinsic value.
Risk Associated with Other Applications. The Flinter Ecosystem may give rise to other, alternative projects, promoted by unaffiliated third parties, under which FLT will have no intrinsic value. This means that competitors may produce platforms that compete with the Flinter Ecosystem and may not accept FLT as payment for services within such platforms; further, such platforms may become more popular and have greater success than the Flinter Ecosystem. In addition, the utility of FLT depends on the success of the Flinter Ecosystem, if developed. The Flinter Ecosystem may not be popular or widely used after it is launched. In the long term, the Flinter Ecosystem may fail to attract a xxxxxxxx xxxx of users. The Flinter Ecosystem may be merged with other projects. Various circumstances, including technical advancement and competitors, may render the Flinter Ecosystem obsolete.

Related to Risk Associated with Other Applications

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Data shared with Subcontractors If DSHS Data provided under this Contract is to be shared with a subcontractor, the Contract with the subcontractor must include all of the data security provisions within this Contract and within any amendments, attachments, or exhibits within this Contract. If the Contractor cannot protect the Data as articulated within this Contract, then the contract with the sub- Contractor must be submitted to the DSHS Contact specified for this contract for review and approval.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Complete Work without Extra Cost Except to the extent otherwise specifically stated in this contract, the Contractor shall obtain and provide, without additional cost to the City, all labor, materials, equipment, transportation, facilities, services, permits, and licenses necessary to perform the Work.

  • Paid Claims without Supporting Documentation Any Paid Claim for which Practitioner cannot produce documentation shall be considered an error and the total reimbursement received by Practitioner for such Paid Claim shall be deemed an Overpayment. Replacement sampling for Paid Claims with missing documentation is not permitted.

  • Collocation Transfer of Responsibility Without Working Circuits The Collocation is not serving any End User Customers and does not have active service terminations (e.g., Interconnection trunks or UNE Loops) or 2) Collocation Transfer of Responsibility With Working Circuits – The Collocation has active service terminations, such as Interconnection trunks or is serving End User Customers.

  • Background and Narrative of Budget Reductions 2. Assumptions Used in the Deficit Reduction Plan: - EBF and Estimated New Tier Funding: - Equal Assessed Valuation and Tax Rates: - Employee Salaries and Benefits: - Short and Long Term Borrowing: - Educational Impact: - Other Assumptions: - Has the district considered shared services or outsourcing (Ex: Transportation, Insurance) If yes please explain: ESTIMATED LIMITATION OF ADMINISTRATIVE COSTS (School Districts Only) (For Local Use Only)

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Special Aggregation Rule Applicable to Relationship Managers For purposes of determining the aggregate balance or value of accounts held by a person to determine whether an account is a High Value Account, a Reporting Financial Institution shall also be required, in the case of any accounts that a relationship manager knows or has reason to know are directly or indirectly owned, controlled, or established (other than in a fiduciary capacity) by the same person, to aggregate all such accounts.

Time is Money Join Law Insider Premium to draft better contracts faster.