Common use of Risk of Hacking and Security Weaknesses Clause in Contracts

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Network or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Network is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Network, which could negatively affect the Network and the Tokens.

Appears in 3 contracts

Samples: Token Sale Agreement, Spectre Token Presale, Spectre Token Presale

AutoNDA by SimpleDocs

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Network Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Network Platform is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the NetworkPlatform, which could negatively affect the Network Platform and Tokens, including Tokens’ utility for using the TokensPlatform.

Appears in 3 contracts

Samples: Token Sale Agreement, Token) Sale Agreement, Token Sale Agreement

Risk of Hacking and Security Weaknesses. 4. Hackers or other malicious groups or organizations may attempt to interfere with the Network Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx Sxxxx attacks, smurfing and spoofing. Furthermore, because the Network Platform is based on open-source software, there is a risk that a third party or a member of the Company Company’s team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the NetworkPlatform, which could negatively affect the Network Platform and the TokensTokens and their value including the Token Utility.

Appears in 1 contract

Samples: Please Read These Token (Blockchain Industries, Inc.)

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations organisations may attempt to interfere with the Network or the Tokens Coins in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Network is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Network, which could negatively affect the Network and the TokensCoins.

Appears in 1 contract

Samples: Coin Sale Agreement

AutoNDA by SimpleDocs

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the Network or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Network it is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the Networkinfrastructure, which could negatively affect the Network and the Tokens.

Appears in 1 contract

Samples: F2k Token Sale Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.