Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Token Purchase Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin PINGPAID Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin PINGPAID Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Token Purchase Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin DTF Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin DTF Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Token Sales Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin Astox Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the Astox Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: astox.network
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BitBook Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BitBook Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Token Sale Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BDCC Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BDCC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensationorcompensation.
Appears in 1 contract
Samples: bdccstaking.io
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin CPU Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin CPU Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Token Sales Agreement
Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BBDC Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BBDC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.
Appears in 1 contract
Samples: Terms of BBDC Token Sale