Decommissioned Disks and Disk Destruction Guidelines Sample Clauses

Decommissioned Disks and Disk Destruction Guidelines. Certain disks containing data may experience performance issues, errors or hardware failure that lead them to be decommissioned (“Decommissioned Disk”). Every Decommissioned Disk is subject to a series of data destruction processes (the “Data Destruction Guidelines”) before leaving Google’s premises either for reuse or destruction. Decommissioned Disks are erased in a multi-step process and verified complete by at least two independent validators. The erase results are logged by the Decommissioned Disk’s serial number for tracking. Finally, the erased Decommissioned Disk is released to inventory for reuse and redeployment. If, due to hardware failure, the Decommissioned Disk cannot be erased, it is securely stored until it can be destroyed. Each facility is audited regularly to monitor compliance with the Data Destruction Guidelines.
AutoNDA by SimpleDocs

Related to Decommissioned Disks and Disk Destruction Guidelines

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Customer-Provided Equipment Comcast shall have no obligation to install, operate, or maintain Customer-Provided Equipment. Customer alone shall be responsible for providing maintenance, repair, operation and replacement of all inside telephone wiring and equipment and facilities on the Customer’s side of the cable modem, route and/or coaxial input connection. All Customer-Provided Equipment and wiring that Customer uses in connection with the Services must be fully compatible with the Services. Customer shall be responsible for the payment of all charges for troubleshooting, maintenance or repairs attempted or performed by Comcast’s employees or authorized contractors when the difficulty or trouble report results from Customer-Provided Equipment.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Collocation of Switching Equipment CLEC may collocate any equipment that is necessary for Interconnection or access to Unbundled Network Elements.

  • Removal of Equipment and Materials Within 30 days after completion of the requirements of this contract, PURCHASER shall remove from the areas of operations, and other property owned or controlled by STATE, all equipment, materials, and other property PURCHASER has placed or caused to be placed thereon that is not to become the property of STATE. It is agreed that any such equipment, materials, and other property that are not removed within 30 days, shall become the property of STATE and may be used or otherwise disposed of by STATE without notice or obligation to PURCHASER or to any party to whom PURCHASER may transfer title. Nothing in this section shall be construed as relieving PURCHASER from an obligation to clean up and to burn, remove, or dispose of debris, waste materials, and such, in accordance with the provisions of this contract. PURCHASER shall indemnify STATE for expenses as a result of cleanup, removal or disposal of debris, waste materials, and such.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

  • DAMAGE OR DESTRUCTION OF PREMISES (a) If the Premises or any part thereof shall be damaged by fire or other insured casualty, then, subject to the last paragraph of this Section, Landlord shall proceed with diligence, subject to then applicable statutes, building codes, zoning ordinances and regulations of any governmental authority, and at the expense of Landlord (but only to the extent of insurance proceeds made available to Landlord by any mortgagee of the Building and any ground lessor) to repair or cause to be repaired such damage (other than any Initial Tenant Improvements not deemed to be fixtures covered by Landlord’s property insurance and Tenant Work, which Tenant shall promptly commence, and proceed with diligence, to restore). All such repairs made necessary by any act or omission of Tenant shall be made at the Tenant’s expense to the extent that the cost of such repairs are less than the deductible amount in Landlord’s insurance policy. All repairs to and replacements of Tenant Property not deemed to be fixtures covered by Landlord’s property insurance and any Initial Tenant Improvements and Tenant Work shall be made by and at the expense of Tenant. The cost of any repairs performed under this Section by Landlord at Tenant’s request and at Tenant’s expense (including costs of design fees, financing, and charges for administration, overhead and construction management services by Landlord and Landlord’s contractor) shall constitute Additional Rent hereunder. If the Premises or any part thereof shall have been rendered unfit for use and occupation hereunder by reason of such damage, the Base Rent or a just and proportionate part thereof, according to the nature and extent to which the Premises shall have been so rendered unfit, shall be abated until the Premises (except as to Tenant Property, Initial Tenant Improvements not deemed to be fixtures covered by Landlord’s property insurance and any Tenant Work) shall have been restored as nearly as practicable to the condition in which they were immediately prior to such fire or other casualty; and that if and to the extent Landlord shall be unable to collect the insurance proceeds (including rent insurance proceeds) applicable to such damage because of some action or inaction on the part of Tenant, or the employees, licensees or invitees of Tenant, the cost of repairing such damage shall be paid by Tenant and there shall be no abatement of rent. Landlord shall not be liable for delays in the making of any such repairs that are due to government regulation, casualties, and strikes, unavailability of labor and materials, delays in obtaining insurance proceeds, and other causes beyond the reasonable control of Landlord, nor shall Landlord be liable for any inconvenience or annoyance to Tenant or injury to the business of Tenant resulting from delays in repairing such damage. If the Premises or the Building are substantially damaged so as to prevent Tenant from using the Premises for the Permitted Use and the Premises have not been restored to the condition required pursuant to the terms of this Lease within two hundred and seventy (270) days following said casualty (or if such casualty occurs during the last 18 months of the term, within ninety (90) days after the date of such casualty), then Tenant may terminate this Lease upon thirty (30) days written notice to Landlord unless Landlord shall substantially complete such repair and restoration within such thirty (30) day period in which event Tenant’s termination shall be void and of no further force or effect.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

Time is Money Join Law Insider Premium to draft better contracts faster.