Destruction of Information Sample Clauses

Destruction of Information. Immediately upon completion of the Project, Recipient will destroy all Student Record Information that Recipient obtained or learned in connection with the Project. Upon the District’s request, Recipient will promptly certify in writing that this destruction has occurred.
AutoNDA by SimpleDocs
Destruction of Information. All documents containing Personal Information that have been obtained from or through iiX must be properly disposed of by taking reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal. This would include, but not be limited to, implementing and monitoring compliance with policies and procedures that require the burning, pulverizing, erasing, or shredding of papers or records containing such information so that the information cannot practicably be read or reconstructed. Electronic files or media containing Personal Information must be destroyed or erased so that the information cannot be read or reconstructed.
Destruction of Information. Upon the request of the Disclosing Party, the Recipient shall collect and surrender, or confirm the destruction or non-recoverable data erasure of, all Proprietary Information and all copies thereof, regardless of form, and any such destruction shall be certified in writing to the Disclosing Party by an authorized officer of the Recipient supervising such destruction.
Destruction of Information. A cable operator shall destroy personally identifiable information if the information is no longer necessary for the purpose for which it was collected and there are no pending requests or orders for access to such information under subsection (d) of this section or pursuant to a court order.
Destruction of Information. Upon termination of this Agreement and at the request of ODM, the MCOP will return to ODM or destroy all PHI in MCOP’s possession stemming from this Agreement as soon as possible but no later than 90 days, and will not keep copies of the PHI except as may be requested by ODM or required by law, or as otherwise allowed for under this Agreement. If the MCOP, its agent(s), or subcontractor(s) destroy any PHI, then the MCOP will provide to ODM documentation evidencing such destruction. Any PHI retained by the MCOP will continue to be extended the same protections set forth in this Section, HIPAA regulations and this Agreement for as long as it is maintained.
Destruction of Information. Upon Disclosing Party’s request, the Receiving Party will promptly destroy all Confidential Information (in all forms) of the Disclosing Party and certify in writing that it has destroyed everything.
Destruction of Information. Within thirty (30) days after Utility’s written demand, ESE shall (and shall cause its Third-Party Representatives to) cease to access and Process Confidential Customer Utility Information and shall at the Utility’s option: (A) return such Confidential Customer Utility Information to Utility in such manner, format, and timeframe as reasonably requested by Utility or, if not so directed by Utility, (B) shred, permanently erase and delete, degauss or otherwise modify so as to make unreadable, unreconstructible and indecipherable (“Destroy”) all copies of all Confidential Customer Utility Information (including any and all extracts, compilations, studies, or other documents based upon, derived from, or containing Confidential Customer Utility Information) that has come into ESE’s or its Third-Party Representatives’ possession, including Destroying Confidential Customer Utility Information from all systems, records, archives, and backups of ESE and its Third-Party Representatives, and all subsequent access, use, and Processing of the Confidential Customer Utility Information by ESE and its Third-Party Representatives shall cease provided any items required to be maintained by governmental administrative rule or law or necessary for legitimate business or legal needs will not be destroyed until permitted and will remain subject to confidentiality during the retention period. A Utility making a written demand of an ESE for the return or destruction of Confidential Customer Utility Information will specify the reason for the demand. ESE agrees that upon a customer revocation of consent, ESE warrants that it will no longer access through Utility Confidential Customer Utility Information and that it will Destroy any Confidential Customer Utility Information in its or its Third-Party Representative’s possession. Notwithstanding the foregoing, ESE and its Third-Party Representatives shall not be obligated to erase Confidential Customer Utility Information contained in an archived computer system backup maintained in accordance with their respective security or disaster recovery procedures, provided that ESE and its Third-Party Representatives shall: (1) not have experienced an actual Data Security Incident;
AutoNDA by SimpleDocs
Destruction of Information. Upon the written request of the relevant Provider, and except as provided by law, each Party will (and save as otherwise provided in Clause 5.2): Return to the Provider or, at the Provider’s option, destroy with such destruction certified in writing to the Provider, all documents containing Information provided (or otherwise made available) to it by or on behalf of the relevant Provider; destroy all analyses, memoranda or other documents derived from the Information provided (or otherwise made available) to it by or on behalf of the Provider; to the extent reasonably practicable, expunge all Information provided (or otherwise made available) to it by or on behalf of the Provider from any computer, word processor or other device, electronic or otherwise, containing such Information; and if so requested by the Provider, deliver to the Provider a certificate signed by an authorised individual confirming that the obligations contained in this Clause 5 have been complied with. Without prejudice to the provisions of Clause 5.1, each Party may retain one copy of all Information provided to it and one copy of any analysis, memoranda, or other documents derived from such information for the sole purpose of retaining a definitive record of the Information actually provided and as long as: such retained Information is treated as confidential at all times in accordance with the provisions of this agreement; and the copy of that Information is not duplicated or otherwise copied, reproduced or summarised (in each case, in whole or in part) by the Party retaining that Information.
Destruction of Information. At the termination of the Agreement, Business Associate shall return or destroy all PHI received from or created or received on behalf of Covered Entity that Business Associate still maintains in any form and retain no copies of PHI. If Business Associate determines that return or destruction is not feasible, Business Associate shall notify Covered Entity in writing of the reasons why return or destruction is not feasible. If destruction or return is not feasible, Business Associate shall not use or disclose PHI in any manner other than those permitted or required by state and federal laws or for the purposes described herein.
Destruction of Information. 12.1 Information will be securely destroyed by both parties once it is no longer required for the purposes set out in this Memorandum, subject to the requirements of the Public Records Act 2005.
Time is Money Join Law Insider Premium to draft better contracts faster.