Return or Secure Destruction of FERPA Records Sample Clauses

Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty (30) days after University’s written request, Contractor will halt all access, use, creation, or processing of FERPA Records and will return to University or Securely Destroy all FERPA Records, including any copies created by Contractor or any subcontractor; and Contractor will certify in writing to University that all FERPA records have been returned to University or Securely Destroyed. Secure Destruction, Securely Destroy and Securely Destroyed mean shredding, erasing or otherwise modifying a record so as to make it unreadable or indecipherable.
AutoNDA by SimpleDocs
Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty (30) days after University’s written request, Contractor will halt all access, use, creatio n, or processing of FERPA Records and will return to University or Securely Destroy all FERPA Records, including any copies created by Contractor or any subcontractor; and Contractor will certify in writing to University that all FERPA records have been returned to University: or Securely Destroyed.
Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty

Related to Return or Secure Destruction of FERPA Records

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Cancellation and Destruction of Surrendered Receipts; Maintenance of Records All Receipts surrendered to the Depositary shall be cancelled by the Depositary. The Depositary is authorized to destroy Receipts so cancelled in accordance with its customary practices. Cancelled Receipts shall not be entitled to any benefits under this Deposit Agreement or be valid or obligatory for any purpose.

  • Loss, Theft, Destruction or Mutilation Upon receipt by the Company of evidence satisfactory to it, in the exercise of its reasonable discretion, of the ownership and the loss, theft, destruction or mutilation of this Warrant and, in the case of loss, theft or destruction, of indemnity reasonably satisfactory to the Company and, in the case of mutilation, upon surrender and cancellation thereof, the Company will execute and deliver in lieu thereof, without expense to the Holder, a new Warrant of like tenor dated the date hereof.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

  • Loss, Theft, Destruction or Mutilation of Warrant The Company covenants that upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant or any stock certificate relating to the Warrant Shares, and in case of loss, theft or destruction, of indemnity or security reasonably satisfactory to it (which, in the case of the Warrant, shall not include the posting of any bond), and upon surrender and cancellation of such Warrant or stock certificate, if mutilated, the Company will make and deliver a new Warrant or stock certificate of like tenor and dated as of such cancellation, in lieu of such Warrant or stock certificate.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Retention of Records, Right to Monitor and Audit (a) CONTRACTOR shall maintain all required records for three (3) years after the COUNTY makes final payment and all other pending matters are closed, and shall be subject to the examination and/or audit of the County, a Federal grantor agency, and the State of California.

Time is Money Join Law Insider Premium to draft better contracts faster.