Token Security Sample Clauses

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BBDC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BBDC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
AutoNDA by SimpleDocs
Token Security. Equity Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Equity Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Sxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and Equity Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Equity Tokens or result in the loss of Purchaser’s Equity Tokens, the loss of Purchaser’s ability to access or control Purchaser’s Equity Tokens or the loss of ETH in Purchaser’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Equity Tokens are not guaranteed any remedy, refund or compensation.
Token Security. EOS Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the EOS Distribution Contract, the EOS Token Contract or the EOS Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and EOS Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the EOS Tokens or result in the loss of Buyer’s EOS Tokens, the loss of Buyer’s ability to access or control Buyer’s EOS Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of EOS Tokens are not guaranteed any remedy, refund or compensation.
Token Security. LETCOINSHOP Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the LETCOINSHOP Distribution Contract or the LETCOINSHOP Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Binance platform rests on open source software and LETCOINSHOP Tokens are based on open source software, there is the risk that Binance smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the LETCOINSHOP Tokens or result in the loss of Buyer's LETCOINSHOP Tokens, the loss of Buyer's ability to access or control Buyer's LCS. LCS Tokens or the loss of BNB in Buyer's account. In the event of such a software bug or weakness, there may be no remedy and holders of LETCOINSHOP Tokens are not guaranteed any remedy, refund or compensation.
Token Security. CLEAR Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the CLEAR Distribution Contract, the CLEAR Token Contract or the CLEAR Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and CLEAR Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the CLEAR Tokens or result in the loss of Buyer’s CLEAR Tokens, the loss of Buyer’s ability to access or control Buyer’s CLEAR Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of CLEAR Tokens are not guaranteed any remedy, refund or compensation.
Token Security. A security token will be issued by Bank to any Authorized Representative(s) authorized to approve ACH files/batches delivered through the Commercial Online Banking System. The token works in combination with the system to generate a code to authenticate when an Authorized Representative approves an ACH payment for processing. The Authorized Representative must possess the token which will generate an access code. Physical security of the token is solely the Customer’s responsibility. When an Authorized Representative leaves Xxxxxxxx’s employ, and if a token has been issued to such Authorized Representative, Customer must deactivate the Authorized Representative’s credentials.
Token Security. XDB Receipt Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the XDB Receipt Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and XDB Receipt Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the XDB Receipt Tokens or result in the loss of Buyer’s XDB Receipt Tokens, or the loss of Buyer’s ability to access or control Buyer’s XDB Receipt Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of XDB Receipt Tokens are not guaranteed any remedy, refund or compensation.
AutoNDA by SimpleDocs
Token Security. Upthinity Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Upthinity Distribution Contract, the Upthinity Token Contract or the Upthinity Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and Upthinity Tokens are based on open source software, there is the risk that smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Upthinity Tokens or result in the loss of Buyer's Upthinity Tokens, the loss of Buyer's ability to access or control Buyer's Upthinity Tokens or the loss of BTC, ETH, LTC in Buyer's account. In the event of such a software bug or weakness, there may be no remedy and holders of Upthinity Tokens are not guaranteed any remedy, refund or compensation.
Token Security. ARG Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Argentas Distribution Contract, the ARG Token Contract or the ARG Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and ARG Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the ARG Tokens or result in the loss of Buyer’s ARG Tokens, the loss of Buyer’s ability to access or control Buyer’s ARG Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of ARG Tokens are not guaranteed any remedy, refund or compensation.
Token Security. SALPay Tokens may be subject to expropriation and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the SALPay Network, ICO or the SALPay Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and SALPay Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the SALPay Tokens or result in the loss of Buyer’s SALPay Tokens, the loss of Buyer’s ability to access or control Buyer’s SALPay Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of SALPay Tokens are not guaranteed any remedy, refund or compensation.
Time is Money Join Law Insider Premium to draft better contracts faster.