Vault and Private Keys Sample Clauses

Vault and Private Keys. You may elect to use the Monarch Vault to store supported Digital Currency. The Monarch Vault allows users to set withdrawal time-delays and/or to require the electronic approval of multiple individuals designated by the user before transfers may be completed. Monarch also offers an advanced Vault which allows users the option to view, control, and distribute private keys of associated Digital Currency to multiple third parties whose majority approval will be required to transfer associated Digital Currency (the "Multisig Vault"). Monarch does not retain or store private keys. Monarch cannot restore encrypted private keys or otherwise recover private keys which are not within Monarch’s control. If you use the Multisig Vault you acknowledge that Monarch is not responsible for transferring, safeguarding, or maintaining private keys and/or Digital Currency associated with the Vault. If you and/or co-signing authorities lose, mishandle, or have stolen associated Digital Currency private keys, or if your cosigners refuse to provide requisite authority, you acknowledge that you may not be able to recover associated Digital Currency, and that Monarch is not responsible for such loss.
AutoNDA by SimpleDocs

Related to Vault and Private Keys

  • Use of Private Vehicles Whenever practicable, State-owned or contracted vehicles shall be made available to ASF Members required to travel on behalf of the Employer. The Employer may elect to allow ASF Members to utilize personal vehicles on a case-by-case basis and reimburse the mileage resulting at the rates provided under the travel regulations. Except for emergency circumstances, or when defined by the Employer as a condition of employment, an ASF Member shall not be required to use a personal vehicle for university purposes.

  • Personal Information and Privacy 9.1 We will handle Personal Information in accordance with the Privacy Legislation and our privacy policy available at xxx.xxxxxxxxxxxxxxx.xxx/xx/xxxxxxx-xxxxxx/.

  • INFORMATION AND PRIVACY You understand and agree that in conjunction with employee training, quality control and the provision of services, we may monitor and/or electronically record cellular transmissions related to the Services, as well as conversations with you or others. Further, you understand that privacy cannot be guaranteed on telephone, cellular network and computer systems, and we shall not be liable to you for any claims, loss, damages or costs which may result from a lack of privacy experienced. You consent to us (i) using information about you and your location (collectively, “information’) to administer services, offer you new products or services, enforce the terms of this Agreement, prevent fraud and respond to regulatory and legal requirements, (ii) response to a subpoena or other such legal process, and (iii) using and sharing aggregate Subscriber information and statistics that do not include information that identifies you personally.

  • Service Use 5.1 For the avoidance of doubt, the Customer acknowledges that:

  • Export and Privacy Red Hat may supply Client with technical data that is subject to export control restrictions. Red Hat will not be responsible for compliance by Client with applicable export obligations or requirements for this technical data. Client agrees to comply with all applicable export control restrictions. If Client breaches this Section 13.6 or the export provisions of an applicable end user license agreement for the Software, or any provision referencing these sections, Red Hat may terminate this Agreement and/or the applicable Order Form and its obligations thereunder without liability to Client. Client acknowledges and agrees that to provide the Services, it may be necessary for Client Information to be transferred between Red Hat, its Affiliates, Business Partners and/or subcontractors, which may be located worldwide.

  • Protection of Private Information If this Agreement requires City to disclose “Private Information” to Contractor within the meaning of San Francisco Administrative Code Chapter 12M, Contractor and subcontractor shall use such information only in accordance with the restrictions stated in Chapter 12M and in this Agreement and only as necessary in performing the Services. Contractor is subject to the enforcement and penalty provisions in Chapter 12M.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended.

  • Privacy and Personal Information (a) This clause 14 applies where this agreement amounts to a “service arrangement” under the Information Privacy Act 2009 (Qld).

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Substance Use Disorder counseling shall be provided by a QCC, or Chemical Dependency Counselor Intern. Substance use disorder education and life skills training shall be provided by counselors or individuals who have been trained in the education. All counselor interns shall work under the direct supervision of a QCC.

Time is Money Join Law Insider Premium to draft better contracts faster.