Secure Destruction Sample Clauses

Secure Destruction. 2.11.1 The Data Processor shall ensure that information held in paper form regardless of whether as originally provided by the Data Controller or printed from the Data Processor’s IT systems) is destroyed using a cross cut shredder or subcontracted to a confidential waste company that complies with European Standard EN15713 (BS15713 (BS 15713) The Secure Destruction of Confidential Material). The Data Processor shall ensure that electronic storage media used to hold or process Information is destroyed or overwritten to current CESG standards as defined at xxx.xxxx.xxx.xx
AutoNDA by SimpleDocs
Secure Destruction. 11.1 The Data Processor shall ensure that NHS information held in paper form regardless of whether as originally provided by the Data Controller or printed from the Data Processor’s IT systems) is destroyed using a cross cut shredder or subcontracted to a confidential waste company that complies with European Standard EN15713.
Secure Destruction. Securely Destroy and Securely Destroyed mean shredding, erasing or otherwise modifying a record so as to make it unreadable or indecipherable.
Secure Destruction. The Data Processor shall ensure that information held in paper form regardless of whether as originally provided by the Data Controller or printed from the Data Processor’s IT systems) is destroyed using a crosscut shredder or subcontracted to a confidential waste company that complies with European Standard EN15713 (BS15713 (BS 15713) The Secure Destruction of Confidential Material). The Data Processor shall ensure that electronic storage media used to hold or process Information is destroyed or overwritten to current CESG standards as defined at xxx.xxxx.xxx.xx In the event of any bad or unusable sectors that cannot be overwritten, the Data Processor shall ensure complete and irretrievable destruction of the media itself. The Data Processor shall provide the Data Controller with copies of all relevant overwriting verification reports and/or certificates of secure destruction of NHS information at the conclusion of the contract. Monitoring & Audit The Data Processor shall permit the Data Controller to monitor compliance with the terms of this Agreement, by: Allowing Data Controller employees or nominated representatives to enter any premises where information is held, at all reasonable times and with or without prior notice, for the purpose of inspection. Completing and returning a Data Processing Monitoring Form at the request of the Data Controller. Provide independent assurance of the self-audited Information Governance Toolkit performance measures where the Data Processor is required to comply. Freedom of Information (delete if not required) The Data Processor acknowledges that the Data Controller is a public authority for the purpose of the Freedom of Information Act 2000 (FOIA) and the Environmental Information Regulations 2004 (EIR). Basic details of the contract shall be included in the appropriate log under the ‘Data Controllers Publication Scheme’. In addition, the Data Controller may be statutorily required to disclose further information about the contracted service or the contract itself in response to a specific request under FOIA or EIR, in which case: The Data Processor shall provide the Data Controller with all reasonable assistance and co- operation to enable the Data Controller to comply with its obligations under FOIA or EIR. The Data Controller shall consult the Data Processor regarding commercial or other confidentiality issues in relation to this contract, however the final decision about disclosure of information or application of ...
Secure Destruction i. NHS data is subject to legal retention periods and should not be destroyed unless the Contractor has received specific instruction to do so from the Customer. Where data has been identified for disposal:
Secure Destruction. The Data Processor shall ensure that University information held in paper form regardless of whether as originally provided by the Data Controller or printed from the Data Processor’s IT systems) is destroyed using a cross cut shredder or subcontracted to a confidential waste company that complies with European Standard EN15713. The Data Processor shall ensure that electronic storage media used to hold or process University Information is destroyed or overwritten to current CESG standards as defined at xxx.xxxx.xxx.xx In the event of any bad or unusable sectors that cannot be overwritten, the Data Processor shall ensure complete and irretrievable destruction of the media itself. Subject to Clause 2.5, the Data Processor shall provide the Data Controller with copies of all relevant overwriting verification reports and/or certificates of secure destruction of University information at the conclusion of the service. Monitoring & Audit The Data Processor shall permit the Data Controller to monitor compliance with the terms of this Agreement, by: The Data Processor shall permit the Data Controller employees or nominated representatives to enter any premises where University information is held, at all reasonable time, with or without prior notice, for the purpose of inspection. The Data Processor shall compile and return a Data Processing Monitoring Form at the request of the Data Controller. The Data Processor shall provide independent assurance of the self-audited University Digital Data Security and Protection Toolkit (DSPT) performance measures where the Data Processor is required to comply.
Secure Destruction. Requesting Program shall retain NJDOH data received from Early Intervention Program for only the period required to utilize NJDOH data for the purpose authorized under this Agreement. At the end of this Agreement, Requesting Program will, and will certify in writing, that it has securely destroyed or returned all data files containing Early Intervention DATA.
AutoNDA by SimpleDocs
Secure Destruction. When required under this Agreement and in any case when any of Customer’s Confidential Information is no longer needed by RIB to perform the Services, the media on which such Confidential Information is stored or recorded shall be destroyed as follows: (i) paper, film, or other hard copy media shall be shredded or destroyed such that the Confidential Information cannot be read or otherwise cannot be reconstructed; and (ii) electronic media shall be cleared, purged, or destroyed consistent with NIST Special Publication 800 88, Guidelines for Media Sanitization, such that the Customer’s Confidential Information cannot be retrieved.
Secure Destruction. When required under this Agreement and in any case when any of Customer’s Confidential Information is no longer needed by RIB to perform the Services, RIB will take reasonable steps to ensure the Confidential Information is (at RIB’s discretion) permanently destroyed, de-identified, deleted or put beyond use. In this paragraph, “put beyond use” means that RIB: (i) is not able, or will not attempt, to use the Confidential Information for any purpose; (ii) does not give any other organisation access to the Confidential Information; (iii) surrounds the Confidential Information with appropriate technical and organisational security measures; and (iv) commits to permanent deletion of the Confidential Information if, or when, this becomes possible.
Secure Destruction. 11.1 The WSCCG shall ensure that NHS information held in paper form (regardless of whether as originally provided by the I&ES CCG or printed from the WSCCG’s IT systems) is destroyed using a cross cut shredder or sub-contracted to a confidential waste company that complies with European Standard EN15713.
Time is Money Join Law Insider Premium to draft better contracts faster.