Token Security Sample Clauses

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensation.
AutoNDA by SimpleDocs
Token Security. Equity Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Equity Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Sxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and Equity Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the Equity Tokens or result in the loss of Purchaser’s Equity Tokens, the loss of Purchaser’s ability to access or control Purchaser’s Equity Tokens or the loss of ETH in Purchaser’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Equity Tokens are not guaranteed any remedy, refund or compensation.
Token Security. CASE Tokens may be subject to alienation and / or theft. Hackers or other criminal groups or organizations may attempt to cause harm in various ways, including, but not limited to, malware attacks, DoS attacks, coordinated attacks, smurfing and spoofing. In the event of software errors or irrecoverable shortcomings, the holders of CASE Tokens are not guaranteed any legal protection, refund or compensation.
Token Security. LETCOINSHOP Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the LETCOINSHOP Distribution Contract or the LETCOINSHOP Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Binance platform rests on open source software and LETCOINSHOP Tokens are based on open source software, there is the risk that Binance smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the LETCOINSHOP Tokens or result in the loss of Buyer's LETCOINSHOP Tokens, the loss of Buyer's ability to access or control Buyer's LCS. LCS Tokens or the loss of BNB in Buyer's account. In the event of such a software bug or weakness, there may be no remedy and holders of LETCOINSHOP Tokens are not guaranteed any remedy, refund or compensation.
Token Security. EOS Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the EOS Distribution Contract, the EOS Token Contract or the EOS Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and EOS Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the EOS Tokens or result in the loss of Buyer’s EOS Tokens, the loss of Buyer’s ability to access or control Buyer’s EOS Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of EOS Tokens are not guaranteed any remedy, refund or compensation.
Token Security. DML Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the DML Distribution Contract, the DML Token Contract or the DML Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source technology and DML Tokens are based on open source technology, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the DML Tokens or result in the loss of Buyer’s DML Tokens, the loss of Buyer’s ability to access or control Buyer’s DML Tokens or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of DML Tokens are not guaranteed any remedy, refund or compensation.
Token Security. DNO Token may be subject to expropriation and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the Xxxxxx Smart Contract or DNO Token in a variety of ways, including but not limited to malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and DNO Token are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect DNO Token or result in the loss of Buyer’s DNO Token, the loss of Buyer’s ability to access or control Buyer’s DNO Token or the loss of ETH in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of DNO Token are not guaranteed any remedy, refund or compensation.
AutoNDA by SimpleDocs
Token Security. WINS Tokens may be subject to expropriation and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with WINS Smart Contract or WINS Tokens in a variety of ways, including malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. There is a risk that WINS Smart Contract as based on Ethereum blockchain may contain intentional or unintentional bugs or weaknesses which may negatively affect WINS Tokens or result in partial or complete loss of Buyer’s WINS Tokens, loss of Buyer’s ability to access or control Buyer’s WINS Tokens and/or loss of ETH in Buyer’s account and/or wallet. In the event of such a software bug or weakness there may be no remedy so WINS Tokens holders are not guaranteed any remedy, refund or compensation. Buyer acknowledges, understands and accepts the risk related to token security.
Token Security. Security Tokens may be subject to expropriation and/or theft. Hackers or other malicious groups or organizations may attempt to interfere with the Security Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing.
Token Security. XDB Receipt Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the XDB Receipt Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the Ethereum platform rests on open source software and XDB Receipt Tokens are based on open source software, there is the risk that Ethereum smart contracts may contain intentional or unintentional bugs or weaknesses which may negatively affect the XDB Receipt Tokens or result in the loss of Buyer’s XDB Receipt Tokens, or the loss of Buyer’s ability to access or control Buyer’s XDB Receipt Tokens. In the event of such a software bug or weakness, there may be no remedy and holders of XDB Receipt Tokens are not guaranteed any remedy, refund or compensation.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!