Hardware Return Sample Clauses

Hardware Return. 9.17.16.1 Upon termination or expiration of this Subaward or at any time upon County's request, Subrecipient will return all hardware provided by County or purchased by Subrecipient using Subaward Sums. Subrecipient shall not alter or modify such hardware. Subrecipient shall physically seal the hardware and return it to County via a bonded courier or as otherwise directed by County in accordance with Exhibit S (Purchase, Inventory and Disposal Requirements for Fixed Assets, Non-Fixed Assets and Supplies).
AutoNDA by SimpleDocs
Hardware Return. Prior to returning any Hardware to Us for repair or replacement, You must ensure that (a) the Hardware is free of any legal obligations or restrictions and of any proprietary or confidential information that may prevent Us from exchanging, repairing, or replacing the Hardware, and (b)You have obtained a return authorization from Us, including a return material authorization number (a “RMA Number”). Hardware returned to Us becomes Our property at the time it is received, and You shall assume ownership of all replacement Hardware provided by Us to You upon shipment.
Hardware Return. 6.1 Hardware (or any replacement part or other component thereof) shall be returned to Supplier on termination of the Supply Order or where rejected or replaced pursuant to these terms only if UBS confirms that no UBS Data is stored on such Hardware and that it can be returned.
Hardware Return. It is Purchasing Entity’s responsibility to remove Purchasing Entity Protected Information, and any other data, from hardware products being returned to Contractor. As part of Contractor’s internal repair and disposal process, Contractor will take the general measures in its subject policy found at: xxxxx://xxx.xxxxx.xxx/c/dam/en/us/products/policy_regarding_the_removal_of_data_on_ci sco_equipment.pdf. Contractor confirms that it is data deletion standards conform to industry best practices (such as NIST Special Publication 800-88, Rev. 1, or the DoD 5220-22-M Standard).
Hardware Return. For LVT owned hardware: at the end of the Term or upon termination of this Agreement, Customer may elect to either, 1) at its expense, with insurance and freight prepaid, return all of the Hardware to a location designated by LVT or 2) have LVT take possession of the Hardware and charge Customer its costs to collect the Hardware plus 1.0%. All Hardware must be in good condition and repair (ordinary wear and tear excepted). Customer shall have no right of purchase and no equity in the Hardware by reason of this Agreement or other operation of law.
Hardware Return. When returning hardware containing Protected Authorized Purchaser Information to the Authorized Purchaser, the Protected Authorized Purchaser Information shall not be removed or altered in any way. The hardware must be physically sealed and returned via a bonded courier, or as the Authorized Purchaser otherwise directs. Prior to returning any hardware containing Protected Authorized Purchaser Information to a third party, Provider must destroy all Protected Authorized Purchaser Information on such hardware in accordance with Section 6a above, then send the Authorized Purchaser project manager a notarized statement detailing the destruction method used, the data sets involved, the date of destruction, and the identity of the individual who performed the destruction within fifteen (15) days.
Hardware Return. Upon termination or expiration of the Contract at any time upon County’s request, Contractor must return all hardware, if any, provided by the County containing Personally Identifiable Information, Protected Health Information, or County’s Confidential Information to County. The Personally Identifiable Information, Protected Health Information, and County’s Confidential Information should not be removed or altered in any way. The hardware should be physically sealed and returned via a bonded courier or as otherwise directed by the County. In the event the hardware containing County’s Confidential Information or Personally Identifiable Information is owned by Contractor or a third party, a notarized statement, detailing the destruction method used and the data sets involved, the date of destruction, and the company and/or individual who performed the destruction will be sent to a designated County security representative within fifteen (15) days of termination or expiration of the Contract or at any time upon the County’s request. Contractor’s destruction or erasure of Personal Information and Protected Health Information pursuant to this Section will be in compliance with industry Best Practices (e.g., NIST Special Publication 800-88, Guidelines for Media Sanitization).
AutoNDA by SimpleDocs
Hardware Return. Upon termination or expiration of the Agreement or at any time upon County’s request, Contractor will return all hardware, if any, provided by County containing Personally Identifiable Information, Protected Health Information, or County Confidential Information to County. The Personally Identifiable Information, Protected Health Information, and County Confidential Information shall not be removed or altered in any way. The hardware should be physically sealed and 1 Available at xxxx://xxx.xxxx.xxxx.xxx/ 2 Available at xxxx://xxx.xxxx.xxxx.xxx/ 3 Available at xxxx://xxx.xxxx.xxx/whs/directives/corres/pdf/522022MSup1.pdf 4 Available at xxxx://xxx.xxxx.xxxx.xxx/ 5 Available at xxxx://xxx.xxxx.xxxx.xxx/ returned via a bonded courier or as otherwise directed by County. In the event the hardware containing County Confidential Information or Personally Identifiable Information is owned by Contractor or a third-party, a notarized statement, detailing the destruction method used and the data sets involved, the date of destruction, and the company or individual who performed the destruction will be sent to a designated County security representative within fifteen (15) days of termination or expiration of the Agreement or at any time upon County’s request. Contractor’s destruction or erasure of Personal Information and Protected Health Information pursuant to this Section shall be in compliance with industry Best Practices (e.g., NIST SP 800-88, Guidelines for Media Sanitization7).
Hardware Return. Upon termination or expiration of the Agreement or at any time upon County’s request, Contractor will return all hardware, if any, provided by County containing Personally Identifiable Information, Protected Health Information, or County Confidential Information to County. The Personally Identifiable Information, Protected Health Information, and County Confidential Information shall not be removed or altered in any way. The hardware should be physically sealed and returned via a bonded courier or as otherwise directed by County. In the event the hardware containing County Confidential Information or Personally Identifiable Information is owned by Contractor or a third-party, 1 Available at xxxx://xxx.xxxx.xxxx.xxx a notarized statement, detailing the destruction method used and the data sets involved, the date of destruction, and the company or individual who performed the destruction will be sent to a designated County security representative within fifteen (15) days of termination or expiration of the Agreement or at any time upon County’s request. Contractor’s destruction or erasure of Personally Identifiable Information and Protected Health Information pursuant to this Section shall be in compliance with industry Best Practices (e.g., NIST Special Publication 800-88, Guidelines for Media Sanitization3).
Hardware Return. Upon termination or expiration of the Agreement for any reason, or at any time upon Exelon’s request, Contractor will return to Exelon all hardware and Removable Media provided by Exelon containing Personally Identifiable Information. The Personally Identifiable Information in such returned hardware and Removable Media shall not be removed or altered in any way. The hardware should be physically sealed and returned via a bonded courier or as otherwise directed by Exelon. If the hardware containing Personally Identifiable Information is owned by Contractor or a third-party, a notarized statement detailing the destruction method used and the data sets involved, the date of destruction, and the company or individual who performed the destruction will be sent to a designated Exelon IT security representative within fifteen (15) calendar days after termination or expiration of the Agreement for any reason, or at any time upon Exelon’s request. Contractor’s destruction or erasure of Personally Identifiable Information pursuant to this Section shall be in compliance with best industry practices (e.g., Department of Defense 5220-22-M Standard).
Time is Money Join Law Insider Premium to draft better contracts faster.