No Password Retrieval Sample Clauses

No Password Retrieval. 5.5.1 With respect to the Wallet, Xxxxxxxxxx.xxx does not receive or store your Wallet password, nor any keys, network addresses or transaction history. We cannot assist you with Wallet password retrieval. You are solely responsible for remembering, storing and keeping secret your Wallet password. Any Virtual Currency you have associated with such Wallet may become inaccessible if you do not know or keep secret your Wallet password. Any third party with knowledge of one or more of your credentials (including, without limitation, a backup phrase, wallet identifier or password) can dispose of Virtual Currency in your Wallet.
AutoNDA by SimpleDocs
No Password Retrieval. (a) With respect to the Wallet, Xxxxxxxxxx.xxx does not receive or store your Wallet password, nor any keys, network addresses or transaction history. We cannot assist you with Wallet password retrieval. You are solely responsible for remembering, storing and keeping secret your Wallet password. Any Digital Assets you have associated with such Wallet may become inaccessible if you do not know or keep secret your Wallet password. Any third party with knowledge of one or more of your credentials (including, without limitation, a backup phrase, wallet identifier or password) can dispose of Digital Assets in your Wallet.
No Password Retrieval. With respect to the Wallet, GW does not receive or store your Wallet password, nor any keys, network ad- dresses or transaction history. We cannot assist you with Wallet password retrieval. You are solely respon- sible for remembering, storing and keeping secret your Wallet password. Any Virtual Currency you have associated with such Wallet may become inaccessible if you do not know or keep secret your Wallet pass- word. Any third party with knowledge of one or more of your credentials (including, without limitation, a backup phrase, wallet identifier or password) can dispose of Virtual Currency in your Wallet When you create a Wallet, you must: (a) create a strong password that you do not use for any other web- site or online service; (b) provide accurate and truthful information; (c) protect and keep secret all creden- tials for the Wallet; (d) protect access to your device and your Wallet; (e) promptly notify us if you discover or otherwise suspect any security breaches related to your Wallet; and (f) use the backup functionality pro- vided through the Wallet and safeguard your backup files. You agree to take responsibility for all activities that occur with your Wallet and accept all risks of any authorised or unauthorised access to your Wallet, to the maximum extent permitted by law.
No Password Retrieval. 5.4.1 With respect to the Wallet, AMFEIX does not receive or store your Wallet password, nor any keys, network addresses or transaction history. We cannot assist you with Wallet password retrieval. You are solely responsible for remembering, storing and keeping secret your Wallet password. Any Virtual Currency you have associated with such Wallet may become inaccessible if you do not know or keep secret your Digital Keys. Any third party with knowledge of one or more of your credentials (including, without limitation, backup phrases, wallet identifier or password) can dispose of Virtual Currency in your Wallet
No Password Retrieval. 5.1. With respect to the Wallet, Arkadiko does not receive or store your Wallet password, nor any keys, network addresses or transaction history. We cannot assist you with Wallet password retrieval. You are solely responsible for remembering, storing and keeping secret your Wallet password. Any Virtual Currency you have associated with such Wallet may become inaccessible if you do not know or keep secret your Wallet password. Any third party with knowledge of one or more of your credentials (including, without limitation, a backup phrase, wallet identifier or password) can dispose of Virtual Currency in your Wallet.
No Password Retrieval. With respect to the Wallet, the Company does not receive or store your Wallet password, nor any keys, network addresses or transaction history. We cannot assist You with Wallet password retrieval. You are solely responsible for remembering, storing and keeping secret your Wallet password. Any Digital Currency You have associated with such Wallet may become inaccessible if You do not know or keep secret your Wallet password. Any third party with knowledge of one or more of your credentials (including, without limitation, a backup phrase, wallet identifier or password) can dispose of digital currency in your wallet.

Related to No Password Retrieval

  • Export and Retrieval by Customer During the Subscription Term and subject to the Agreement, Customer can access its Personal Data at any time. Customer may export and retrieve its Personal Data in a standard format. Export and retrieval may be subject to technical limitations, in which case SAP and Customer will find a reasonable method to allow Customer access to Personal Data.

  • Responsibility for Electronic Data The Student is solely responsible for any data stored on the Computer. It is the sole responsibility of the Student to backup such data as necessary.

  • Password Protection Contractor agrees that any portable or laptop computer that has access to the Eligible Users or State of Utah networks, or stores any Public Data is equipped with strong and secure password protection.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Electronic Data 7.1.1 The parties recognize that Contract Documents, including drawings, specifications and three-dimensional modeling (such as Building Information Models) and other Work Product may be transmitted among Owner, Design-Builder and others in electronic media as an alternative to paper hard copies (collectively “Electronic Data”).

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Electronic Data Interchange (EDI This standard establishes the data contents of the Invoice Transaction Set (810) for use within the context of an EDI environment. This transaction set can be used for invoicing via the AN for catalog and non-catalog goods and services.

  • Electronic Data Interchange If both Parties elect to facilitate business activities hereunder by electronically sending and receiving data in agreed formats (also referred to as Electronic Data Interchange or “EDI”) in substitution for conventional paper-based documents, the terms and conditions of this Agreement shall apply to such EDI activities.

  • EDI - Electronic Data Interchange The exchange of business data in a standardized format between business computer systems.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT.

Time is Money Join Law Insider Premium to draft better contracts faster.