Risk of Incompatible Wallet Service Sample Clauses

Risk of Incompatible Wallet Service. The wallet or wallet service provider used for the acquisition and storage of the Tokens has to be technically compatible with the Tokens. The failure to assure this may have the result that Acquiror will not gain access to his Tokens.
AutoNDA by SimpleDocs
Risk of Incompatible Wallet Service the wallet or wallet service provider used for the contribution, has to conform to the ERC20 token standard in order to be be technically compatible with the Token. The failure to ensure such conformity may have the result that Contributor will not gain access to his Token.
Risk of Incompatible Wallet Service. The wallet or wallet service provider used for the acquisition and storage of the Tokens has to be technically compatible with the Tokens. The failure to assure this may have the result that purchaser of the Tokens will not gain access to his Tokens. Risks of Theft of the Funds Raised in the Token Sale. The Company will make every effort to ensure that the funds received from the Token Sale will be securely held through the implementation of security measures. Notwithstanding such security measures, there is no assurance that there will be no theft of the cryptocurrencies as a result of hacks, sophisticated cyber-attacks, distributed denials of service or errors, vulnerabilities, or defects on the Website, in the smart contract(s), on the Ethereum or any other blockchain, or otherwise. Such events may include, for example, flaws in programming or source code leading to exploitation or abuse thereof. In such event, even if the Token Sale is 3. 1. Риск утраты закрытых ключей. Токены могут храниться владельцем токенов в его цифровом кошельке или хранилище, для доступа к которому требуется закрытый ключ или комбинация закрытых ключей. Соответственно, утрата необходимых закрытых ключей, связанных с цифровым кошельком владельца токенов или хранилищем, в котором хранятся Токены, приведет к потере таких Токенов, утрате доступа к балансу Токенов владельца токенов и (или) любым начальным остаткам в блокчейнах, созданных третьими лицами. Кроме того, любое третье лицо, получившее доступ к таким закрытым ключам, в том числе путем получения доступа к учетным данным входа на используемый владельцем токенов сервис хостинг-кошелька или хранилища, может незаконно завладеть Токенами владельца токенов.
Risk of Incompatible Wallet Service. The purchaser understands and accepts, that the wallet or wallet service provider used for purchasing TUTs (or STUTs), has to be technically compatible with the TUTs (or STUTs). Failure to assure this may have the result that the purchaser will not gain access to his/her TUTs (or STUTs), respectively.

Related to Risk of Incompatible Wallet Service

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • System for Award Management (XXX) Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a XXX.xxx proof of registration and Commercial and Government Entity (CAGE) number. Grantee will continue to maintain an active XXX registration with current information at all times during which it has an active award under this Agreement.

  • Year 2000 Compatibility Take all action necessary to assure that its computer based systems are able to operate and effectively process data including dates on and after January 1, 2000, and, at the reasonable request of the Administrative Agent or the Required Lenders, provide evidence to the Lenders of such year 2000 compatibility.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Personally Owned Professional Material The employer shall reimburse an employee to a maximum of $150 for loss, damage or personal insurance deductible to personally owned professional material brought to the employee’s workplace to assist in the execution of the employee’s duties, provided that: a. The loss or damage is not the result of negligence on the part of the employee claiming compensation; b. The claim for loss or damage exceeds ten (10) dollars; c. If applicable, a copy of the claim approval from their insurance carrier shall be provided to the employer; d. The appropriate Principal or Vice-Principal reports that the loss was sustained while on assignment for the employer.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Internet Service In the event that internet is required during your stay, please verify that the Property selected provides the service. Rules of the House: In the event there are rules specific to your Property either required by the Owner or if applicable from an HOA, they will be posted at the home and your compliance is necessary. Rental Unit for Sale: Occasionally a Property may go on the market for sale. In such cases Agent reserves the right to show the Property to potential buyers. Agent will make every effort to schedule the showing at a time that is convenient for Tenant, so as not to interrupt your vacation. Tenant’s cooperation is appreciated. Consumable Products: Paper products, laundry/dish detergent, personal toiletry items and food staples are not included in the Properties. Linens: Linens are included with all Properties for reservations up to 2 days or more. If linens and towels are damaged or missing there will be an added fee to replace and/or clean those items. Linens and towels should only be used for sleeping in and drying off. Damaged or missing bath towels are $25, hand towels are $15, wash cloths are $10, sheets are $30, pillow cases are $15, and bath mats are $20. Damaged items might include makeup, blood stains, excessive dirt, tanning lotion, and human waste.

  • CLOUD SERVICE The Cloud Service offering, is described below and is specified in an Order Document for the selected entitled offerings. The Order Document will consist of the Quotation that is provided and the Proof of Entitlement (XxX) you will receive confirming the start date and term of the Cloud Services and when invoicing will commence.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!