Risks affiliated with Users’ credentials Sample Clauses

Risks affiliated with Users’ credentials. Any third party that gains access to the User’s credentials affiliated with the Platform can control User’s cryptocurrencies, funds stored. To minimize this risk, the User should protect his or her electronic devices from unauthorized access.
AutoNDA by SimpleDocs

Related to Risks affiliated with Users’ credentials

  • Other Methods of Procurement of Consultants’ Services The following table specifies methods of procurement, other than Quality and Cost-based Selection, which may be used for consultants’ services. The Procurement Plan shall specify the circumstances under which such methods may be used. Procurement Method

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

  • Data shared with Subcontractors If DSHS Data provided under this Contract is to be shared with a subcontractor, the Contract with the subcontractor must include all of the data security provisions within this Contract and within any amendments, attachments, or exhibits within this Contract. If the Contractor cannot protect the Data as articulated within this Contract, then the contract with the sub- Contractor must be submitted to the DSHS Contact specified for this contract for review and approval.

  • Unbundled Network Terminating Wire (UNTW) 2.8.3.1 UNTW is unshielded twisted copper wiring that is used to extend circuits from an intra-building network cable terminal or from a building entrance terminal to an individual End User’s point of demarcation. It is the final portion of the Loop that in multi-subscriber configurations represents the point at which the network branches out to serve individual subscribers.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Software Ownership Upon request, the State and all appropriate federal agencies shall receive a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or otherwise use, and to authorize others to do so, all application software produced in the performance of this Agreement, including, but not limited to, all source, object, and executable code, data files, and job control language, or other system instructions. This requirement applies only to software that is a specific deliverable under this Agreement, or is integral to the program or service funded under this Agreement, and is primarily financed with funding provided under this Agreement.

  • Processing of a Grievance It is recognized and accepted by the Union and the Employer that the processing of grievances as hereinafter provided is limited by the job duties and responsibilities of the employees and shall therefore be accomplished during normal working hours only when consistent with such employee duties and responsibilities. The aggrieved employee and a Union representative shall be allowed a reasonable amount of time without loss of pay when a grievance is investigated and presented to the Employer during normal working hours provided that the employee and the Union representative have notified and received the approval of the designated supervisor who has determined that such absence is reasonable and would not be detrimental to the work programs of the Employer.

  • Customer Ownership Customer owns and has sole responsibility for the accuracy, quality, integrity, and appropriateness of all original data, content and information provided to Xxxxxx Xxxxxxx in conjunction with the Services, and, when paid for, Customer will own all modified content and information as specified under the SOW (collectively the “Content,” which, together with the Customer’s trademarks or logos, are referred to as the “Customer Material).”

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.