Security Risks Sample Clauses

Security Risks. Client agrees that neither ITX nor its suppliers shall, under any circumstances, be held responsible or liable for situations where the data stored or communicated through the Services are accessed by third parties through illegal or illicit means, including situations where such data is accessed through the exploitation of security gaps, weaknesses or flaws (whether known or unknown to ITX at the time) which may exist in the Services.
AutoNDA by SimpleDocs
Security Risks. There are security risks associated with the use of the Services. The hardware and software that you use in connection with the Services may be subject to unauthorized tracking or other manipulation by spyware or other malicious code. We are not responsible for advising you of the existence or potential effect of such malicious code, and your use of hardware and software is at your own risk. We will use commercially reasonable efforts to secure the portions of the Services under our control to prevent access by unauthorized persons and to prevent the introduction of any malicious code, such as a computer virus. However, no security system is failsafe, and despite our commercially reasonable efforts, the security of the Service could be compromised, or malicious code could be introduced by third parties. We will provide you with notice if your information is the subject of a security breach as required by Applicable Law.
Security Risks. The business premises of Grown Rogue are a target for theft. While Grown Rogue has implemented security measures and continues to monitor and improve its security measures, its cultivation and processing facilities could be subject to break-ins, robberies and other breaches in security. If there was a breach in security and Grown Rogue fell victim to a robbery or theft, the loss of cash, cannabis plants, cannabis oils, cannabis flowers and cultivation and processing equipment could have a material adverse impact on the business, financial condition and results of operation of Grown Rogue.
Security Risks. You understand that as there are inherent security risks on the Internet, you must carefully consider the degree to which you choose to rely on your VIP Credential.
Security Risks. 6.1 Security Risks refer to the following: malfunction of equipment valves, impact and damage of gauges and facilities due to pressure build-up; personal injuries & death and damage of equipments & facilities due to explosion caused by accumulation of methane gas resulting from leakage of pipeline valve and connector and gauge connector; and the liabilities and compensation caused by production halt or breakdown.
Security Risks. You acknowledge that Your Content may be stored on or using Decentralized Storage Services. You understand there may be risks to storing Your Content on or using Decentralized Storage Services, including without limitation loss of Your Content, loss of access to, or ability to manage, Your Content and dependence on third party nodes running such Decentralized Storage Services. We are not responsible for any of Your Content stored on or using Decentralized Storage Services. We will exercise no control whatsoever over Your Content and the content of the information passing through the network, provided that it adheres to all other conditions set forth herein and in our Policies.
Security Risks. We believe the Services are secure and we use them ourselves. However, no online service can guaranty that it is 100% safe from hacking. If you are concerned about the risk of a data breach, then please do not use the Services with any information you would not want to have leaked. Of course, this applies to any other online service as well.
AutoNDA by SimpleDocs
Security Risks. You understand that as there are inherent security risks on the internet, you must carefully consider the degree to which you choose to rely on your VIP Credential. Data Privacy. Bank, Bottomline, token system provider and VIP Network participants will process, share and transmit your personal data through the internet, worldwide, to authenticate you in the context of transactions you conduct with VIP Network participants and for purposes of administering the VIP Network.
Security Risks. Client agrees that neither ITX nor its suppliers shall, under any circumstances, be held responsible or liable for situations where the data stored or communicated through the Authorized Services are accessed by third parties through illegal or illicit means, including situations where such data is accessed through the exploitation of security gaps, weaknesses or flaws (whether known or unknown to ITX at the time) which may exist in the Authorized Services. H8. Client Indemnification of ITX – Client will indemnify, hold harmless, and defend ITX and all employees, officers, directors and agents of ITX and any of its affiliates from and against any and all claims, suits, actions, demands or proceedings (whether threatened, asserted, or filed) and all related damages, losses, liabilities, cost and expenses (including, but not limited to, reasonable attorneys’ fees) arising out of or relating to: (a) any violation or breach by Client of any term, representation or warranty, or policy of the Agreement; (b) Client’s unlawful or improper use of the Authorized Services; (c) any damages caused to ITX Systems by the Client Content; (d) any actual or alleged violation of any Proprietary Rights or non-proprietary rights (including, but not limited to, defamation, libel, rights of privacy or publicity) by Client Content.
Security Risks. Each party shall notify the other immediately upon becoming aware of any potential out of the ordinary risk to the security of any of the Premises, or of any employee of any of the parties or of any third party who may possibly prejudice the security of any of the Premises. Either party shall, if so requested by the other party, provide all reasonable assistance in taking appropriate action to prevent, combat or limit such security risk.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!