Penghapusan Data Sample Clauses

Penghapusan Data. Pelanggan mengakui bahwa pada akhir Jangka Waktu Berlangganan atas Layanan Cloud SAP, sebagai praktik standar, SAP akan menghapus Data Pelanggan (termasuk Data Pribadi) yang tetap berada di server aplikasi xxxx xxxx-host Layanan Cloud, kecuali jika hukum atau Perjanjian yang berlaku mewajibkan adanya penyimpanan, kecuali jika Data Pelanggan yang diproses di Jaringan Ariba dapat disimpan di Jaringan Ariba sesuai dengan kebijakan operasional SAP. Data yang disimpan tunduk pada ketentuan kerahasiaan dalam Perjanjian xxx kewajiban berkelanjutan berdasarkan Perjanjian Pemrosesan Data.
AutoNDA by SimpleDocs

Related to Penghapusan Data

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • GetData BellSouth is authorized to provide, at a minimum, the account owner and/or Regional Accounting Office information on the lines of Express Connection indicating the local service provider and where billing records are to be sent for settlement purposes. This query service may be modified to provide additional information in the future.

  • MARC Records When applicable to the Licensed Materials, at Licensee’s request, Licensor shall provide full OCLC-quality batched sets of MARC records incorporating Licensee specifications at no additional cost by the date of the execution of this License Agreement. Updates to existing records and new title records, matching the schedule of release and delivery of new publications, will be provided on a mutually agreed-upon schedule and in a format that renders them useful to the Licensee and/or the Participating Institutions.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Information Technologies Cooperation 1. The aims of cooperation in Information Technologies sectors, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to focus on cooperative activities towards information technology areas where mutual and complementary interests exists; and (b) to build on existing agreements and arrangements already in place between the Parties. 2. Information Technologies cooperation may include, but not be limited to: (a) scientific and technical cooperation for the Software Industry of the Parties and encouraging cooperation in software development for populations with specific needs; (b) facilitate the cooperation on academic, industrial and entrepreneurial networks in the area of Information Technology; (c) encouraging exchange of experience on management and research and development for Information Technology Parks; (d) research and development on Information Technology products and services, integrating television, multimedia, and cellular telephones; and (e) encouraging exchange of experience for research and development in networks and telecommunications.

  • Medical Records Medical records relating to Trial Subjects that are not submitted to Sponsor may include some of the same information as is included in Trial Data; however, Sponsor makes no claim of ownership to those documents or the information they contain. c.

  • Medical Records Retention Grantee will;

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.