Risk of weak and loss of credentials Sample Clauses

Risk of weak and loss of credentials. If you do not use 2FA, any person with knowledge of your password and email address may be able to access your 1T Account and the assets deposited with the 1T Platform and may make transactions in your name. The password you chose when registering a 1T Account (as amended from time to time) may be subject to attacks (such as brute-force or dictionary attacks), even if it is unique and only known to you. The risk is greater if the password is weak (in length and/or complexity) and/or if the password contains personal details (for example your name, date of birth or place of residence) and/or words included in a dictionary. We recommend that you always choose a strong and unique password (not used in any other service) and that you use the required 2FA. If you use the password used with the 1T Platform on any other platform or service, or if you store (digitally or physically) your password in any location an attacker may retrieve your password used with the 1T Platform if such other platform or service or storage space (where your password is recorded) is successfully attacked. While stronger passwords are statistically (far) less likely to be successfully retrieved by an attacker, no password is fully safe. While we may indicate the password strength of your password when a 1T Account is registered, such indicator is calculated from general parameters, does not verify whether your password may contain any of your personal details or words included in a dictionary and should thus be regarded as a guideline only. We do not guarantee that any particular password is in fact secure or immune to password attacks.
AutoNDA by SimpleDocs

Related to Risk of weak and loss of credentials

  • RISK OF LOSS OR DAMAGE From the point the equipment leaves Company’s office in El Cajon, CA the Customer assumes all risks of loss or damage to the equipment from any cause.

  • Travel, Meals and Lodging When provided for in the Mini-Bid and resultant Authorized User Agreement, an Authorized User may reimburse travel expenses. All rules and regulations associated with this travel can be found at xxxx://xxx.xxxxx.xx.xx/agencies/travel/travel.htm. In no case will any travel reimbursement be paid that exceeds these rates. All travel will be paid only as part of a deliverable specified within the Authorized User Agreement and must be billed with that associated Invoice with receipts attached. The Contractor shall receive prior approval from the Authorized User for any travel that occurs during the term of an Authorized User Agreement. Parking fees and/or parking tickets may not be paid by an Authorized User. Unless otherwise specified in writing by the Authorized User, a vehicle will not be provided by Authorized User to the Contractor for travel. Therefore, the Contractor will be responsible for ensuring that the Contractor has access to an appropriate vehicle (e.g., personal vehicle or rental vehicle) or common carrier with which to carry out any necessary travel. For the Contractor to obtain reimbursement for the use of a rental vehicle, such use must be justified as the most cost-effective mode of transportation under the circumstances (including consideration of the most effective use of time). The Contractor shall provide evidence of three (3) written or telephone price quotes, and the paid invoice must detail the type of vehicle rented, miles traveled, license plate number, and time of pickup and return. The Contractor is responsible for keeping adequate records to substantiate any claims for reimbursement, by personnel for travel in performance of the services.

  • Unbundled Loop Concentration (ULC) System 2.5.1 BellSouth will provide to <<customer_name>> Unbundled Loop Concentration (ULC). Loop concentration systems in the central office concentrate the signals transmitted over local loops onto a digital loop carrier system. The concentration device is placed inside a BellSouth central office. BellSouth will offer ULC with a TR008 interface or a TR303 interface.

  • Act Identifier Title Shoulder note Iron Ore (Robe River) Agreement Xxx 0000 First Schedule Iron Ore (Robe River) Agreement Second Schedule First variation agreement Third Schedule Second variation agreement [s. 3B] Fourth Schedule Third variation agreement [s. 2] Fifth Schedule Fourth variation agreement Sixth Schedule Fifth variation agreement

  • Unbundled Loop Concentration 2.8.5.1 Upon the Effective Date of this Amendment, the Unbundled Loop Concentration (ULC) element will no longer be offered by BellSouth and no new orders for ULC will be accepted. Any existing ULCs that were provisioned prior to the Effective Date of this Amendment will be grandfathered at the rates set forth in the Parties’ interconnection agreement that was in effect immediately prior to this Amendment and may remain connected, maintained and repaired according to BellSouth’s TR73600 until such time as they are disconnected by MyLineToo, or BellSouth provides ninety (90) calendar days notice that such ULC must be terminated.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Commercial Items The Software, including all related documentation, are “Commercial Item(s),” as that term is defined at 48 C.F.R. Section 2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation,” as such terms are used in 48 C.F.R. Section 12.212 or 48 C.F.R. Section 227.7202, as applicable. Consistent with 48 C.F.R. Section 12.212 or 48 C.F.R. Sections 227.7202-1 through 227.7202-4, as applicable, the Commercial Computer Software and Commercial Computer Software Documentation are being licensed to U.S. Government end users (i) only as Commercial Items; and (ii) with only those rights as are granted to all other end users pursuant to the terms and conditions herein. Unpublished-rights reserved under the copyright laws of the United States.

  • Risk of Loss Matters of inspection and acceptance are addressed in section 215.422, F.S. Until acceptance, risk of loss or damage will remain with the Contractor. The Contractor will be responsible for filing, processing, and collecting all damage claims. To assist the Contractor with damage claims, the Customer will: record any evidence of visible damage on all copies of the delivering xxxxxxx’x xxxx of lading; report damages to the carrier and the Contractor; and provide the Contractor with a copy of the xxxxxxx’x xxxx of lading and damage inspection report.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • For Product Development Projects and Project Demonstrations  Published documents, including date, title, and periodical name.  Estimated or actual energy and cost savings, and estimated statewide energy savings once market potential has been realized. Identify all assumptions used in the estimates.  Greenhouse gas and criteria emissions reductions.  Other non-energy benefits such as reliability, public safety, lower operational cost, environmental improvement, indoor environmental quality, and societal benefits.  Data on potential job creation, market potential, economic development, and increased state revenue as a result of the project.  A discussion of project product downloads from websites, and publications in technical journals.  A comparison of project expectations and performance. Discuss whether the goals and objectives of the Agreement have been met and what improvements are needed, if any.

Time is Money Join Law Insider Premium to draft better contracts faster.