Common use of Risk of Hacking and Security Weaknesses Clause in Contracts

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform is based on open-source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platform, which could negatively affect the platform and the Tokens, including the utility of the Tokens for obtaining services.

Appears in 2 contracts

Samples: Token Pre Sale Agreement, Token Pre Sale Agreement

AutoNDA by SimpleDocs

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on an open-source softwareprotocol, there is a risk that a third party or a member of the Company Foundation team or Carebig team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, including the utility of the Tokens Tokens’ use for obtaining servicesToken Utility.

Appears in 2 contracts

Samples: Token Purchase Agreement, Please Read

Risk of Hacking and Security Weaknesses. 4. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on open-source software, there is a risk that a third party or a member of the Company Company’s team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, Tokens and their value including the utility of the Tokens Token Utility. Risks Associated with Markets for obtaining services.Tokens

Appears in 1 contract

Samples: Please Read (Blockchain Industries, Inc.)

AutoNDA by SimpleDocs

Risk of Hacking and Security Weaknesses. Hackers or other malicious groups or organizations may attempt to interfere with the platform Platform or the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-consensus - based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the platform Platform is based on open-open - source software, there is a risk that a third party or a member of the Company team may intentionally or unintentionally introduce weaknesses into the core infrastructure of the platformPlatform, which could negatively affect the platform Platform and the Tokens, including Tokens’ utility for using the utility of the Tokens for obtaining servicesPlatform.

Appears in 1 contract

Samples: Sale Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.