Loss of Private Key(s Sample Clauses

Loss of Private Key(s. A private key, or a combination of private keys, is necessary to control and dispose of TOKENS stored in your digital wallet or vault. Accordingly, loss of requisite private key(s) associated with your digital wallet or vault storing TOKENS may result in loss of such TOKENS. Moreover, any third party that gains access to such private key(s), including by gaining ac- cess to login credentials of a hosted wallet service you use, may be able to misappropriate your TOKENS.
AutoNDA by SimpleDocs
Loss of Private Key(s. You alone are responsible for securing your private keys and you expressly release the Company from any and all liability as it relates to the loss of private keys. Losing control of your private key will permanently and irreversibly deny you access to any coins or tokens sent to your public address. Neither the Company nor any other person will be able to retrieve or protect your coins or tokens if you lose your private keys. Once lost, you will not be able to transfer your coins or tokens to any other address or wallet. You will not be able to realize any value or utility that the coins or tokens may hold now or in future.

Related to Loss of Private Key(s

  • Protection of Private Information If this Agreement requires City to disclose “Private Information” to Contractor within the meaning of San Francisco Administrative Code Chapter 12M, Contractor and subcontractor shall use such information only in accordance with the restrictions stated in Chapter 12M and in this Agreement and only as necessary in performing the Services. Contractor is subject to the enforcement and penalty provisions in Chapter 12M.

  • No Expectation of Privacy The Student and parent/guardian signing below agree that if the Student uses the Internet through the District’s access, that the Student waives any right to privacy the Student may have for such use. The Student and the parent/guardian agree that the district may monitor the Student’s use of the District’s Internet Access and may also examine all system activities the Student participates in, including but not limited to e-mail, voice, and video transmissions, to ensure proper use of the system. The District may share such transmissions with the Student’s parents/guardians.

  • Freedom of Information and Protection of Privacy Act Any information provided on this contract may be subject to release under the Freedom of Information and Protection of Privacy Act. The Contractor may be consulted prior to release of any information.

  • Public/Private Information The Borrower shall cooperate with the Administrative Agent in connection with the publication of certain materials and/or information provided by or on behalf of the Borrower. Documents required to be delivered pursuant to the Loan Documents shall be delivered by or on behalf of the Borrower to the Administrative Agent and the Lenders (collectively, “Information Materials”) pursuant to this Article and the Borrower shall designate Information Materials (a) that are either available to the public or not material with respect to the Borrower and its Subsidiaries or any of their respective securities for purposes of United States federal and state securities laws, as “Public Information” and (b) that are not Public Information as “Private Information”.

  • Portability of Sick Leave 1. The employer will accept up to sixty (60) accumulated sick leave days from other school districts in British Columbia, for employees hired to or on exchange in the district. 2. An employee hired to or on exchange in the district shall accumulate and utilize sick leave credit according to the provisions of the Collective Agreement as it applies in that district.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Liability for Failure to Stop Payment of Preauthorized Transfers If you order us to stop payment of a preauthorized transfer three (3) business days or more before the transfer is scheduled and we do not do so, we will be liable for your losses or damages.

  • Liability for Failure to Stop Payment of Preauthorized Transfer If you order us to stop one of these payments 3 business days or more before the transfer is scheduled, and we do not do so, we will be liable for your losses or damages.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • COMMUNICATION AND NOTICE REQUIREMENTS All communications, notices and approvals provided for hereunder shall be in writing and mailed or delivered to the Seller or the Purchaser, as the case may be, addressed as set forth in the related Sale Agreement or at such other address as either party may hereafter designate by notice to the other party. Notice given in any such communication, mailed to the Seller or the Purchaser by appropriately addressed registered mail, shall be deemed to have been given on the day following the date of such mailing.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!