Deletion/return of Entrusted Personal Data Sample Clauses

Deletion/return of Entrusted Personal Data. The Service Provider shall at the end of the Main Agreement irreversibly delete all Entrusted Personal Data still in its possession or under its control, or return all such Entrusted Personal Data to the Customer in an unaltered and reusable form, and shall instruct all its Processors to do the same. In case no documented instructions are provided by Customer for the purpose of the last paragraph, the Service Provider shall proceed with the deletion of the Entrusted Personal Data. Deletion or return of Entrusted Personal Data, for the purpose of the two last paragraphs, means deletion or return, in particular, of all files, documents, medias or supports of any nature containing Entrusted Personal Data under this Data Processing Agreement.
AutoNDA by SimpleDocs
Deletion/return of Entrusted Personal Data. At the end of the Agreement, at its discretion, VIANOVA shall (i) delete all Entrusted Personal Data still in its possession or under its control, or (ii) return all such Entrusted Personal Data to the Municipality and instruct all its Sub-Processors to do the same. This Article 3.9 does not apply to Mobility Insights, granted that those intrinsically do not include Entrusted Personal Data in re-identifiable form. VIANOVA may also retain Use-Related Data and anonymized Raw Mobility Data after the end of the Agreement, as stipulated under Article 8.4 of the General Terms & Conditions.
Deletion/return of Entrusted Personal Data. At the end of the TOU, WEGLOT shall make Entrusted Personal Data available to the User and delete it, within the timeframe of the TOU termination. Such deletion mechanism shall apply except to the extent that WEGLOT is required by Applicable Data Protection Laws or any applicable law to retrain some or all of the Entrusted Personal Data.

Related to Deletion/return of Entrusted Personal Data

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • Confidential Information State Records Grantee shall comply with the provisions of this §10 if it becomes privy to confidential information in connection with its performance hereunder. Confidential information, includes, but is not necessarily limited to, state records, personnel records, and information concerning individuals.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Tax Return Information By the 31st day of March of each Fiscal Year of the Partnership, the General Partner, at the expense of the Partnership, shall cause to be delivered to the Limited Partners such information as shall be necessary (including a statement for that year of each Limited Partner’s share of net income, net gains, net losses and other items of the Partnership for the preceding Fiscal Year) for the preparation by the Limited Partners of their Federal, state and local income and other tax returns.

  • Information Returns At the Closing or as soon thereafter as is practicable, Seller shall provide Purchaser with a list of all Deposits on which Seller is back-up withholding as of the Closing Date.

  • Income Tax Return Information Each Company will provide to the other Company information and documents relating to their respective Groups required by the other Company to prepare Tax Returns. The Responsible Company shall determine a reasonable compliance schedule for such purpose in accordance with Distributing Co.'s past practices. Any additional information or documents the Responsible Company requires to prepare such Tax Returns will be provided in accordance with past practices, if any, or as the Responsible Company reasonably requests and in sufficient time for the Responsible Company to file such Tax Returns on a timely basis.

  • Informational Tax Reporting The Assuming Institution agrees to perform all obligations of the Failed Bank with respect to Federal and State income tax informational reporting related to (i) the Assets and the Liabilities Assumed, (ii) deposit accounts that were closed and loans that were paid off or collateral obtained with respect thereto prior to Bank Closing, (iii) miscellaneous payments made to vendors of the Failed Bank, and (iv) any other asset or liability of the Failed Bank, including, without limitation, loans not purchased and Deposits not assumed by the Assuming Institution, as may be required by the Receiver.

  • Annual Tax Information The Managers shall cause the Company to deliver to the Member all information necessary for the preparation of the Member’s federal income tax return.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Issuer is collecting the Subscriber’s personal information for the purpose of fulfilling this Agreement and completing the Offering. The Subscriber acknowledges that its personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be included in record books in connection with the Offering and may be disclosed by the Issuer to: (a) stock exchanges or securities regulatory authorities, (b) the Issuer's registrar and transfer agent, (c) tax authorities, (d) authorities pursuant to the PATRIOT Act (U.S.A.) and (e) any of the other parties involved in the Offering, including the Issuer’s Counsel. By executing this Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) for the foregoing purposes and to the retention of such personal information for as long as permitted or required by applicable laws. Notwithstanding that the Subscriber may be purchasing the Note as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the nature and identity of such undisclosed principal, and any interest that such undisclosed principal has in the Issuer, all as may be required by the Issuer in order to comply with the foregoing. 10.2 Furthermore, the Subscriber is hereby notified that the Issuer may deliver to any government authority having jurisdiction over the Issuer, the Subscriber or this Subscription, including the SEC and/or any state securities commissions, certain personal information pertaining to the Subscriber, including the Subscriber’s full name, residential address and telephone number, the number of Shares or other securities of the Issuer owned by the Subscriber, the principal amount of Note purchased by the Subscriber, the total Subscription Amount paid for the Note and the date of distribution of the Note.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!