Risk of Incompatible Wallet Service Sample Clauses

Risk of Incompatible Wallet Service. The wallet or wallet service provider used for the acquisition and storage of the Tokens has to be technically compatible with the Tokens. The failure to assure this may have the result that Xxxxx will not gain access to his Tokens.
AutoNDA by SimpleDocs
Risk of Incompatible Wallet Service the wallet or wallet service provider used for the contribution, has to conform to the ERC20 token standard in order to be be technically compatible with the Token. The failure to ensure such conformity may have the result that Contributor will not gain access to his Token.
Risk of Incompatible Wallet Service. The purchaser understands and accepts, that the wallet or wallet service provider used for purchasing TUTs (or STUTs), has to be technically compatible with the TUTs (or STUTs). Failure to assure this may have the result that the purchaser will not gain access to his/her TUTs (or STUTs), respectively.
Risk of Incompatible Wallet Service. The wallet or wallet service provider used for the acquisition and storage of the Tokens has to be technically compatible with the Tokens. The failure to assure this may have the result that purchaser of the Tokens will not gain access to his Tokens. Risks of Theft of the Funds Raised in the Token Sale. The Company will make every effort to ensure that the funds received from the Token Sale will be securely held through the implementation of security measures. Notwithstanding such security measures, there is no assurance that there will be no theft of the cryptocurrencies as a result of hacks, sophisticated cyber-attacks, distributed denials of service or errors, vulnerabilities, or defects on the Website, in the smart contract(s), on the Ethereum or any other blockchain, or otherwise. Such events may include, for example, flaws in programming or source code leading to exploitation or abuse thereof. In such event, even if the Token Sale is 3.1. Риск утраты закрытых ключей. Токены могут храниться владельцем токенов в его цифровом кошельке или хранилище, для доступа к которому требуется закрытый ключ или комбинация закрытых ключей. Соответственно, утрата необходимых закрытых ключей, связанных с цифровым кошельком владельца токенов или хранилищем, в котором хранятся Токены, приведет к потере таких Токенов, утрате доступа к балансу Токенов владельца токенов и (или) любым начальным остаткам в блокчейнах, созданных третьими лицами. Кроме того, любое третье лицо, получившее доступ к таким закрытым ключам, в том числе путем получения доступа к учетным данным входа на используемый владельцем токенов сервис хостинг-кошелька или хранилища, может незаконно завладеть Токенами владельца токенов. 3.2.

Related to Risk of Incompatible Wallet Service

  • -wire ADSL-Compatible Loop This is a designed Loop that is provisioned according to Revised Resistance Design (RRD) criteria and may be up to 18,000 feet long and may have up to 6,000 feet of bridged tap (inclusive of Loop length). The Loop is a 2-wire circuit and will come standard with a test point, OC, and a DLR.

  • wire HDSL-Compatible Loop This is a designed Loop that meets Carrier Serving Area (CSA) specifications, may be up to 12,000 feet long and may have up to 2,500 feet of bridged tap (inclusive of Loop length). It may be a 2-wire or 4-wire circuit and will come standard with a test point, OC, and a DLR.

  • Required Coverages For Generation Resources Of 20 Megawatts Or Less Each Constructing Entity shall maintain the types of insurance as described in section 11.1 paragraphs (a) through (e) above in an amount sufficient to insure against all reasonably foreseeable direct liabilities given the size and nature of the generating equipment being interconnected, the interconnection itself, and the characteristics of the system to which the interconnection is made. Additional insurance may be required by the Interconnection Customer, as a function of owning and operating a Generating Facility. All insurance shall be procured from insurance companies rated “A-,” VII or better by AM Best and authorized to do business in a state or states in which the Interconnection Facilities are located. Failure to maintain required insurance shall be a Breach of the Interconnection Construction Service Agreement.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • System for Award Management (XXX) Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a XXX.xxx proof of registration and Commercial and Government Entity (CAGE) number. Grantee will continue to maintain an active XXX registration with current information at all times during which it has an active award under this Agreement.

  • Packet Switching Capability 4.5.1 The packet switching capability network element is defined as the function of routing or forwarding packets, frames, cells or other data units based on address or other routing information contained in the packets, frames, cells or other data units.

  • Action Item Task MSU Status Comments I.1 The University will employ and empower a Clery Act compliance professional (CCP). The CCP must report to a Vice President (VP) or equivalent. The CCP must not be employed in or under the sole authority of the Office of the General Counsel (OGC). Implemented The Office of Audit, Risk and Compliance (OARC) hired a qualified candidate who began work in February 2020.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Integrated Digital Loop Carriers The feeder portion of some loops may be provide by means of Integrated Digital Loop Carrier (IDLC). IDLC provides a fiber optic cable transmission path that travels directly into BellSouth’s central office local switch. Where BellSouth uses IDLC ,if technically feasible and capacity does exist, BST will provide Al-Call with a Designed DS0 UVL by using alternative provisioning techniques including but not limited to such as “hairpinning” and DAC grooming. Alternative provisioning techniques will be provided at no additional cost to Al-Call . Hairpinning involves providing a DS0 signal from an IDLC-served loop to Al-Call ’s collocation equipment by using a dedicated pathway that traverses BellSouth’s central office switch. BellSouth will provide such DS0 signal to Al-Call by establishing a copper cross connect between the BellSouth switch and Al-Call ’s collocation equipment.

  • Personally Owned Professional Material The employer shall reimburse an employee to a maximum of $150 for loss, damage or personal insurance deductible to personally owned professional material brought to the employee’s workplace to assist in the execution of the employee’s duties, provided that:

Time is Money Join Law Insider Premium to draft better contracts faster.