Common use of Token Security Clause in Contracts

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensation.

Appears in 1 contract

Samples: Token Sale Agreement

AutoNDA by SimpleDocs

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC mHealthCoin Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC mHealthCoin Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Token Purchase Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC BBDC Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC BBDC Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Terms of Token Sale

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC DTF Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC DTF Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Token Sales Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC BitBook Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC BitBook Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Token Sale Agreement

AutoNDA by SimpleDocs

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC Astox Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC Astox Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Terms of Token Sale

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC PINGPAID Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC PINGPAID Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensation.

Appears in 1 contract

Samples: Token Purchase Agreement

Token Security. Tokens may be subject to expropriation and or/theft. Hackers or other malicious groups or organizations may attempt to interfere with the Tokens in a variety of ways, including, but not limited to, malware attacks, denial of service attacks, consensus- consensus-based attacks, Xxxxx attacks, smurfing and spoofing. Furthermore, because the BDCC CPU Protocol rests on open source software and Tokens are based on open source software, there is the risk that the BDCC CPU Protocol may contain intentional or unintentional bugs or weaknesses which may negatively affect the Tokens or result in the loss of Buyer’s Tokens, the loss of Buyer’s ability to access or control Buyer’s Tokens or the loss of any other assets in Buyer’s account. In the event of such a software bug or weakness, there may be no remedy and holders of Tokens are not guaranteed any remedy, refund orcompensationor compensation.

Appears in 1 contract

Samples: Token Sales Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!