Data Stewardship and Destruction Sample Clauses

Data Stewardship and Destruction how the chain of custody is proactively maintained (for users and systems) and how data is effectively erased to minimize the likelihood of inadvertent access; and
AutoNDA by SimpleDocs

Related to Data Stewardship and Destruction

  • Ownership and Publication of Materials All reports, information, data, and other materials prepared by the Consultant pursuant to this agreement are the property of the City. The City has the exclusive and unrestricted authority to release, publish or otherwise use, in whole or part, information relating thereto. Any re-use without written verification or adaptation by the Consultant for the specific purpose intended will be at the City’s sole risk and without liability or legal exposure to the Consultant. No material produced in whole or in part under this agreement may be copyrighted or patented in the United States or in any other country without the prior written approval of the City.

  • FRAUD PREVENTION AND DETECTION You agree to maintain appropriate security controls and procedures to prevent and detect thefts of Instruments, or losses due to fraud or forgery involving Instruments, or fraudulent or unauthorized Transactions. You agree to diligently supervise and monitor the conduct and work of all agents and employees having any role in the preparation of Your Instruments or conduct of Transactions, Your reconciliation of the statement of account for the Account, or other banking functions.

  • Damage and Destruction If all or any part of the Premises shall be damaged or destroyed by fire or other casualty, this Lease shall continue in full force and effect, unless terminated as hereinafter provided, and Landlord shall repair, restore or rebuild the Premises to the condition existing at the time of the occurrence of the loss; provided, however, Landlord shall not be obligated to commence such repair, restoration or rebuilding until insurance proceeds are received by Landlord, and Landlord’s obligation hereunder shall be limited to the proceeds actually received by Landlord under any insurance policy or policies, if any, less those amounts (i) which have been required to be applied towards the reduction of any indebtedness secured by a mortgage covering the Premises or any portion thereof, and (ii) which are used to reimburse Landlord for all costs and expenses, including but not limited to attorneys’ fees, incurred by Landlord to recover any such insurance proceeds. Tenant agrees to notify Landlord in writing not less than thirty (30) days prior, to the date Tenant opens for business in the Premises of the actual cost of all permanent leasehold improvements and betterments installed or to be installed by Tenant in the Premises (whether same have been paid for entirely or partially by Tenant), but exclusive of Tenant’s personal property, movable trade fixtures and inventory. Similar notifications shall be given to Landlord not less than thirty (30) days prior to the commencement of any proposed alterations, additions or improvements to the Premises. If Tenant fails to comply, with the foregoing provisions, any loss or damage Landlord shall sustain by reason thereof shall be borne by Tenant and shall be paid immediately by Tenant upon receipt of a xxxx therefore and evidence of such loss, and in addition to any other rights or remedies reserved by Landlord under this Lease, Landlord’s obligations under this Article to repair, replace and/or rebuild the Premises shall be deemed inapplicable, and in lieu thereof, Landlord may, at its election, either restore or require Tenant to restore the Premises to the condition which existed prior to such loss, and in either case Tenant shall pay the cost of such restoration. Tenant covenants and agrees to repair or replace Tenant’s fixtures, furniture, furnishings, floor coverings, equipment and stock in trade and reopen for business in the Premises within thirty (30) days after notice from Landlord that the Premises are ready for re-occupancy. No damage or destruction to the Premises shall allow Tenant to surrender possession of the Premises nor affect Tenant’s liability for the payment of rents or charges or any other covenant herein contained, except as may be specifically provided in this Lease. Notwithstanding anything to the contrary contained in this Section or elsewhere in this Lease, Landlord, at its option, may terminate this Lease by giving Tenant notice thereof within one hundred and eighty (180) days from the date of the casualty if:

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Confidentiality and Data Protection 12.1 Buyer undertakes that it shall not at any time disclose to any person any confidential information concerning (i) the business, affairs, customers, clients or suppliers of Seller or any of its affiliates and (ii) the operations, processes, product information, recipes and formulae, know-how, designs, trade secrets of Seller or any of its affiliates, except as permitted by Condition 12.2 (“Confidential Information”).

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Data Protection and Confidentiality 3.1. We obtain, use, process and disclose personal data about you and data subjects (as defined in the DPA) in order that we may provide the Services and for other related purposes including updating and enhancing client records, analysis for management purposes and statutory returns, crime prevention and legal and regulatory compliance.

Time is Money Join Law Insider Premium to draft better contracts faster.