Retention of Records; Access 7.01 For so long as the contents thereof may become material in the administration of any matter under applicable Tax Law, but in any event until the later of (i) the expiration of any applicable statutes of limitation and (ii) seven years after the Closing Date, the Parties shall (a) retain records, documents, accounting data and other information (including computer data and the systems necessary to access such data) necessary for the preparation and filing of all Tax Returns in respect of Taxes of any member of the CCE Group or the Splitco Group or for any Tax Contests relating to such Tax Returns, and (b) give to the other Parties reasonable access to such records, documents, accounting data and other information (including computer data) and to its personnel (insuring their cooperation), systems and premises, for the purpose of the review or audit of such Tax Returns to the extent relevant to an obligation or liability of a Party under this Agreement or for purposes of the preparation or filing of any such Tax Return, the conduct of any Tax Contest or any other matter reasonably and in good faith related to the Tax affairs of the requesting Party. At any time after the Closing Date that TCCC or Splitco proposes to destroy such material or information, it shall first notify the other Party in writing and such other Party shall be entitled to receive such materials or information proposed to be destroyed.
REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.
Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.
Inspection and Retention of Records In addition to any other requirement under this Agreement or at law, Party must fulfill all state and federal legal requirements, and will comply with all requests appropriate to enable the Agency of Human Services, the U.S. Department of Health and Human Services (along with its Inspector General and the Centers for Medicare and Medicaid Services), the Comptroller General, the Government Accounting Office, or any of their designees: (i) to evaluate through inspection or other means the quality, appropriateness, and timeliness of services performed under this Agreement; and (ii) to inspect and audit any records, financial data, contracts, computer or other electronic systems of Party relating to the performance of services under Vermont’s Medicaid program and Vermont’s Global Commitment to Health Waiver. Party will retain for ten years all documents required to be retained pursuant to 42 CFR 438.3(u).
Retention of Records The Contractor and its subcontractors shall maintain all records pertinent to this Agreement, and all other financial, statistical, property, participant records, and supporting documentation for a period of no less than seven (7) years from the later of the date of acceptance of the final payment or until all audit findings have been resolved. If any litigation, claim, negotiation, audit or other action involving the records has been started before the expiration of the retention period, the records shall be retained until completion of the action and resolution of all issues which arise from it, or until the end of the seven (7) years, whichever is later, and until any outstanding litigation, audit, or claim has been fully resolved.
Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.
Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period. 15.2 Business Associate shall provide to Covered Entity notification of any conditions that Business Associate believes make the return or destruction of PHI infeasible. If Covered Entity agrees that return or destruction is infeasible, Business Associate shall extend the protections of this Agreement to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction infeasible for so long as Business Associate maintains such PHI. This shall also apply to all Agents and Subcontractors of Business Associate.
Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.
Inspection of Records Upon reasonable notice to the Administrative Trustees and the Property Trustee, the records of the Trust shall be open to inspection by Securityholders during normal business hours for any purpose reasonably related to such Securityholder's interest as a Securityholder.
Location of Records The offices where the initial Servicer keeps all of its records relating to the servicing of the Pool Receivables are located at Xxx XXX Xxxxxx, Xxxxxxx, XX 00000.