Return of PHI; Destruction Sample Clauses

Return of PHI; Destruction. Within thirty business days of termination of the Contract or this Agreement, Associate will return to FCRW all PHI received from FCRW or created or received by Associate on behalf of FCRW Program that Associate maintains in any form or format. Associate will not maintain or keep in any form or format any portion of such PHI. Alternatively, Associate may, upon FCRW written consent, destroy all such PHI and provided written documentation of such destruction. The requirement to return or destroy such PHI will apply to all agents or subcontractors of Associate. Associate will be responsible for recovering any PHI from such agents or subcontractors. If Associate cannot obtain the PHI from any agent or subcontractor, Associate will so notify FCRW and will require that such agents or subcontractors directly return PHI to FCRW or otherwise destroy such PHI, subject to the terms of this Section.
AutoNDA by SimpleDocs
Return of PHI; Destruction. Within thirty days of termination of Agreement, Associate will return to Summit all PHI received from Summit or created or received by Associate on behalf of Summit which Associate maintains in any form or format, and Associate will not maintain or keep in any form or format any portion of the PHI. Alternatively, Associate may, upon Summit's written consent, destroy all such PHI and provide written documentation of such destruction. The requirement to return or destroy such PHI will apply to all agents or subcontractors of Associate. Associate will be responsible for recovering any PHI from such agents or subcontractors. If Associate cannot obtain the PHI from any agent or subcontractor, Agent will so notify Summit and will require that such agents or subcontractors directly return PHI to Summit or otherwise destroy such PHI, subject to the terms of this Section.
Return of PHI; Destruction. Within thirty business days of termination of the Contract or this Agreement, Associate will return to Maricopa County Xxxx Xxxxx Part A Program all PHI received from Maricopa County Xxxx Xxxxx Part A Program or created or received by Associate on behalf of Maricopa County Xxxx Xxxxx Part A Program that Associate maintains in any form or format. Associate will not maintain or keep in any form or format any portion of such PHI. Alternatively, Associate may, upon Maricopa County Xxxx Xxxxx Part A Program written consent, destroy all such PHI and provided written documentation of such destruction. The requirement to return or destroy such PHI will apply to all agents or subcontractors of Associate. Associate will be responsible for recovering any PHI from such agents or subcontractors. If Associate cannot obtain the PHI from any agent or subcontractor, Associate will so notify Maricopa County Xxxx Xxxxx Part A Program and will require that such agents or subcontractors directly return PHI to Maricopa County Xxxx Xxxxx Part A Program or otherwise destroy such PHI, subject to the terms of this Section.
Return of PHI; Destruction. At the termination of the contract, if feasible, Associate will return or destroy all PHI received from, or created or received by Associate on behalf of, Grantee(s) that Associate still maintains in any form and retain no copies of such information.

Related to Return of PHI; Destruction

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Complete Destruction In the event the Premises are completely destroyed by fire, explosion, the elements, a public enemy, Act of God, or other casualty or are so damaged as to render the entire Premises untenable, and the Premises cannot be repaired within 120 days, Company will give Authority immediate notice thereof, and Authority will be under no obligation to repair, replace, and reconstruct said Premises. In the event Authority elects not to repair, replace, and reconstruct said Premises, Authority will not be required to grant alternative premises and this Agreement and the obligations of the Parties hereunder will terminate.

  • Confidential Destruction PHI COUNTY discloses to CONTRACTOR or 5 CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must be disposed of 6 through confidential means, such as cross cut shredding and pulverizing.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Total Destruction Notwithstanding any other provision hereof, if Premises Total Destruction occurs (including any destruction required by any authorized public authority), this Lease shall terminate sixty (60) days following the date of such Premises Total Destruction, whether or not the damage or destruction is an Insured Loss or was caused by a negligent or willful act of Lessee. In the event, however, that the damage or destruction was caused by Lessee, Lessor shall have the right to recover Lessor's damages from Lessee except as released and waived in Paragraph 9.7.

Time is Money Join Law Insider Premium to draft better contracts faster.