Security Risks. Client agrees that neither ITX nor its suppliers shall, under any circumstances, be held responsible or liable for situations where the data stored or communicated through the Services are accessed by third parties through illegal or illicit means, including situations where such data is accessed through the exploitation of security gaps, weaknesses or flaws (whether known or unknown to ITX at the time) which may exist in the Services.
Security Risks. There are security risks associated with the use of the Services. The hardware and software that you use in connection with the Services may be subject to unauthorized tracking or other manipulation by spyware or other malicious code. We are not responsible for advising you of the existence or potential effect of such malicious code, and your use of hardware and software is at your own risk. We will use commercially reasonable efforts to secure the portions of the Services under our control to prevent access by unauthorized persons and to prevent the introduction of any malicious code, such as a computer virus. However, no security system is failsafe, and despite our commercially reasonable efforts, the security of the Service could be compromised, or malicious code could be introduced by third parties. We will provide you with notice if your information is the subject of a security breach as required by Applicable Law.
Security Risks. The business premises of Grown Rogue are a target for theft. While Grown Rogue has implemented security measures and continues to monitor and improve its security measures, its cultivation and processing facilities could be subject to break-ins, robberies and other breaches in security. If there was a breach in security and Grown Rogue fell victim to a robbery or theft, the loss of cash, cannabis plants, cannabis oils, cannabis flowers and cultivation and processing equipment could have a material adverse impact on the business, financial condition and results of operation of Grown Rogue.
Security Risks. You acknowledge and agree that any use of the OCBC GooglePay-PayNow Service, or Enabled Devices over the internet or other communications networks may be subject to security risks which may include but not be limited to: (a) monitoring and recording of your personal data, transactions, usage patterns and Security Procedure responses; (b) use of your personal data, transactions, usage patterns and Security Procedure responses to perform unauthorised transactions or to commit or facilitate crime; (c) installation of malware, viruses, monitoring or malicious code on your computer systems and/or other devices which may then collect and communicate to third parties information or other data about you; (d) malfunctioning Enabled Devices, GooglePay Application, network connections or hardware failure; (e) “phishing” or other websites or emails which mimic the appearance of the websites of OCBC or Google LLC (or their representatives, affiliates and service providers) or official communications, but do not in fact originate from OCBC or Google LLC or such representative, affiliate, or service provider as the case may be, and which may be used to collect information about you or deceive you into entering into transactions or providing information or compromising Security Procedures; and (f) “man-in-the-middle” or other interception of your communications with OCBC, Google LLC, or any of their representatives, affiliates, or service providers. Use of the OCBC GooglePay-PayNow Service carried out over the internet or other communications networks is entirely at your own risk. You shall be solely liable for any PayNow Transactions and any loss, damage or claim arising in connection with any such use, and whether for any initial or subsequent PayNow Transactions made through the OCBC GooglePay-PayNow Service. OCBC shall not be liable for any loss or damage whatsoever which is suffered (including but not limited to indirect or consequential loss) as a result of your use of the OCBC GooglePay- PayNow Service.
Security Risks. 6.1 Security Risks refer to the following: malfunction of equipment valves, impact and damage of gauges and facilities due to pressure build-up; personal injuries & death and damage of equipments & facilities due to explosion caused by accumulation of methane gas resulting from leakage of pipeline valve and connector and gauge connector; and the liabilities and compensation caused by production halt or breakdown.
6.2 Purchaser’s facilities shall not be put into use before being registered at the Company’s Security Supervision Department with the security certificates.
6.3 Supplier shall assume the liability for compensation for any production breakdown or damage of gauge or any facilities and pipelines under the ownership of Supplier for more than 12 hours due to malfunction of Supplier’s facilities or that the supply gas pressure exceeds the pressure-bearing range of gauge.
6.4 Any personal injuries and/or death and damage of equipments and facilities caused by explosion of accumulated coal-bed gas within the respective property range of both Parties due to improper management or insufficient protection facilities of either Party, as well as the liability for causing the other Party unable to supply or use gas (production breakdown), shall be borne solely by the Party of accident. Contract for Purchase and Sales of Coal-Bed Gas 4
Security Risks. You understand that as there are inherent security risks on the Internet, you must carefully consider the degree to which you choose to rely on your VIP Credential.
Security Risks. Client agrees that neither ITX nor its suppliers shall, under any circumstances, be held responsible or liable for situations where the data stored or communicated through the Authorized Services are accessed by third parties through illegal or illicit means, including situations where such data is accessed through the exploitation of security gaps, weaknesses or flaws (whether known or unknown to ITX at the time) which may exist in the Authorized Services. H8. Client Indemnification of ITX – Client will indemnify, hold harmless, and defend ITX and all employees, officers, directors and agents of ITX and any of its affiliates from and against any and all claims, suits, actions, demands or proceedings (whether threatened, asserted, or filed) and all related damages, losses, liabilities, cost and expenses (including, but not limited to, reasonable attorneys’ fees) arising out of or relating to: (a) any violation or breach by Client of any term, representation or warranty, or policy of the Agreement; (b) Client’s unlawful or improper use of the Authorized Services; (c) any damages caused to ITX Systems by the Client Content; (d) any actual or alleged violation of any Proprietary Rights or non-proprietary rights (including, but not limited to, defamation, libel, rights of privacy or publicity) by Client Content.
Security Risks. You acknowledge that Your Content may be stored on or using Decentralized Storage Services. You understand there may be risks to storing Your Content on or using Decentralized Storage Services, including without limitation loss of Your Content, loss of access to, or ability to manage, Your Content and dependence on third party nodes running such Decentralized Storage Services. We are not responsible for any of Your Content stored on or using Decentralized Storage Services. We will exercise no control whatsoever over Your Content and the content of the information passing through the network, provided that it adheres to all other conditions set forth herein and in our Policies.
Security Risks. We believe the Services are secure and we use them ourselves. However, no online service can guaranty that it is 100% safe from hacking. If you are concerned about the risk of a data breach, then please do not use the Services with any information you would not want to have leaked. Of course, this applies to any other online service as well.
Security Risks. You acknowledge that the proof of the login information will be stored on Decentralized Storage. You understand there is no limitation on loss of Your Content, loss of access to, or ability to manage, Your Content and dependence on third party nodes running such Decentralized Storage Services. We will exercise no control whatsoever over Your Content and the content of the information passing through the network, provided that it adheres to all other conditions set forth herein and in our Policies.