Return or Destruction of the Templates Sample Clauses

Return or Destruction of the Templates. If the Agreement is terminated, then Subscriber shall immediately cease use of the Templates and shall immediately return or destroy all copies of the Templates. Upon R eliability’s request given by Notice, Subscriber shall certify in writing within five Days of delivery of Reliability’s Notice that it has completed this return or destruction.
AutoNDA by SimpleDocs

Related to Return or Destruction of the Templates

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • CONSTRUCTION OF THE BUS TERMINAL 12.1 Obligations prior to commencement of construction Prior to commencement of Construction Works, the Concessionaire shall:

  • Damage, Destruction or Condemnation If the Dock or any portion thereof is at any time destroyed or damaged by a casualty, or if any portion of the Dock or adjacent parcels are taken pursuant to the exercise or threatened exercise of the power of eminent domain (including a conveyance in lieu thereof), Port may elect to terminate this Agreement.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Return or Destruction of Information Upon termination of this Agreement and at the request of ODM, the MCP will return to ODM or destroy all PHI in MCP’s possession stemming from this Agreement as soon as possible but no later than 90 calendar days and will not keep copies of the PHI except as may be requested by ODM or required by law, or as otherwise allowed for under this Agreement. If the MCP, its agent(s), or subcontractor(s) destroy any PHI, then the MCP will provide to ODM documentation evidencing such destruction. Any PHI retained by the MCP will continue to be extended the same protections set forth in this section, HIPAA regulations, and this Agreement for as long as it is maintained.

  • Access to the Work The Design Professional and its representatives shall have access to the Work at all times while it is in progress, and shall comply with all job site safety rules.

Time is Money Join Law Insider Premium to draft better contracts faster.