Common use of Token Security Clause in Contracts

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Purchase Agreement

AutoNDA by SimpleDocs

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin PINGPAID Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin PINGPAID Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Purchase Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin DTF Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin DTF Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Sales Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin Astox Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the Astox Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: astox.network

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BitBook Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BitBook Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Sale Agreement

AutoNDA by SimpleDocs

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BDCC Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BDCC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensationorcompensation.

Appears in 1 contract

Samples: bdccstaking.io

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin CPU Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin CPU Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Token Sales Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the mHealthCoin BBDC Protocol rests on open source software and Tokens are based on open source software, there is the risk that mHealthCoin the BBDC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund or compensation.

Appears in 1 contract

Samples: Terms of BBDC Token Sale

Time is Money Join Law Insider Premium to draft better contracts faster.