Retention, Destruction or Return of Information and Data Sample Clauses

Retention, Destruction or Return of Information and Data. Unless otherwise legally required, Seller and its suppliers shall return, delete, or destroy all Subcontract Data, including all originals and copies in any medium and their derivatives, upon the earlier of (i) Buyer’s request, or (ii) the completion of Seller’s obligations under the Order. Seller shall certify to Buyer in writing its compliance with this requirement.
AutoNDA by SimpleDocs

Related to Retention, Destruction or Return of Information and Data

  • Return or Destruction of Information Upon termination of this Agreement and at the request of ODM, the MCP will return to ODM or destroy all PHI in MCP’s possession stemming from this Agreement as soon as possible but no later than 90 calendar days and will not keep copies of the PHI except as may be requested by ODM or required by law, or as otherwise allowed for under this Agreement. If the MCP, its agent(s), or subcontractor(s) destroy any PHI, then the MCP will provide to ODM documentation evidencing such destruction. Any PHI retained by the MCP will continue to be extended the same protections set forth in this section, HIPAA regulations, and this Agreement for as long as it is maintained.

  • Retention of Information You acknowledge and accept that the Bank will be required under the China Connect Rules to keep records in relation to Northbound trading for a period of not less than 20 years.

  • Return of Information Upon written request by the disclosing Party, all of the disclosing Party’s Confidential Information in whatever form shall be returned to the disclosing Party upon termination of this Agreement or destroyed with destruction certified by the receiving Party, without the receiving Party retaining copies thereof except that one copy of all such Confidential Information may be retained by a Party’s legal department for purposes of resolving any dispute that may arise hereunder or for complying with Applicable Law or the rules of any securities exchange applicable to the Party, and the receiving Party shall be entitled to retain any Confidential Information in electronic form stored on automatic computer back-up archiving systems during the period such backup or archived materials are retained under such Party’s customary procedures and policies; provided, however, that any Confidential Information retained by the receiving Party shall be maintained subject to confidentiality pursuant to the terms of this Section 8.6, and such archived or back-up Confidential Information shall not be accessed except as required by Applicable Law.

  • Dissemination of Information The Borrower authorizes each Lender to disclose to any Participant or Purchaser or any other Person acquiring an interest in the Loan Documents by operation of law (each a "Transferee") and any prospective Transferee any and all information in such Lender's possession concerning the creditworthiness of the Borrower and its Subsidiaries, including without limitation any information contained in any Reports; provided that each Transferee and prospective Transferee agrees to be bound by Section 9.11 of this Agreement.

  • Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.B. After the end of the provision of the processing services, the data importer shall, at the choice of the data exporter, delete all personal data processed on behalf of the controller and certify to the data exporter that it has done so, or return to the data exporter all personal data processed on its behalf and delete existing copies. Until the data is deleted or returned, the data importer shall continue to ensure compliance with these Clauses. In case of local laws applicable to the data importer that prohibit return or deletion of the personal data, the data importer warrants that it will continue to ensure compliance with these Clauses and will only process it to the extent and for as long as required under that local law. This is without prejudice to Clause 14, in particular the requirement for the data importer under Clause 14(e) to notify the data exporter throughout the duration of the contract if it has reason to believe that it is or has become subject to laws or practices not in line with the requirements under Clause 14(a).

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Notification and Provision of Information 1. To the maximum extent possible, each Party shall notify the other Party of any proposed or actual measure that the Party considers might materially affect the operation of this Agreement or otherwise substantially affect the other Party's interests under this Agreement.

  • Collection of Information You authorize us to access and download information from your Meter or from your PC Postage account. We may disclose this information to the USPS or other authorized governmental entity. We won’t share with any third parties (except the USPS or other governmental entity) individually identifiable information that we obtain about you in this manner unless required to by law or court order. We may elect to share aggregate data about our clients’ postage usage with third parties.

  • Availability of Information To make DHCS PI and PII available to the DHCS and/or 15 COUNTY for purposes of oversight, inspection, amendment, and response to requests for records, 16 injunctions, judgments, and orders for production of DHCS PI and PII. If CONTRACTOR receives 17 DHCS PII, upon request by COUNTY and/or DHCS, CONTRACTOR shall provide COUNTY and/or 18 DHCS with a list of all employees, contractors and agents who have access to DHCS PII, including 19 employees, contractors and agents of its subcontractors and agents.

  • Protection of Information E1 Data Protection Xxx X0 Official Secrets Acts 1911, 1989, Section 182 of the Finance Xxx 0000 E3 Confidentiality E4 Freedom of Information E5 Security of Confidential Information E6 Publicity, Media and Official Enquiries E7 Security E8 Intellectual Property Rights and Assigned Deliverables E9 Audit and the National Audit Office

Time is Money Join Law Insider Premium to draft better contracts faster.