Destruction of Classified Information Sample Clauses

Destruction of Classified Information. 1. Classified Information shall be destroyed insofar as to prevent its reconstruction in whole or in part.
AutoNDA by SimpleDocs
Destruction of Classified Information. 1. Classified Information shall be destroyed in accordance with the legislation of the state of the Recipient Party, in such a manner as to eliminate its reconstruction in part or in whole.
Destruction of Classified Information. 1. Documents and other media containing Classified Information shall be destroyed by burning, shredding, pulping, or other means that prevent reconstruction of the Classified Information contained therein.
Destruction of Classified Information. 1. Information classified as VRLO TAJNO / TRÈS SECRET LUX shall not be destroyed, except in cases referred to in paragraph 4 of this Article. Such Classified Information shall be returned to the Originating Party after it is no longer considered necessary by the Parties.
Destruction of Classified Information. Classified Information shall be destroyed in a manner that prevents its partial or total reconstruction. Classified Information marked up to СТРОГО ПОВЕРЉИВО/SECRET LUX/ SECRET shall be destroyed in accordance with national laws and regulations. A report on destruction of Classified Information shall be made and its English translation shall be delivered to the Competent Authority of the Originating Party. Classified Information marked ДРЖАВНА TAJHA/TRES SECRET LUX/TOP SECRET shall not be destroyed, except in cases referred to in paragraph 5 of this Article. It shall be returned to the Competent Authority of the Originating Party. In case of a crisis situation in which it is impossible to protect or return Classified Information, it shall be destroyed immediately. The Receiving Party shall inform the Competent Authority of the Originating Party about this destruction as soon as possible.

Related to Destruction of Classified Information

  • Classified Information In no event shall any of the Copyright Collateral, Patent Collateral or Trademark Collateral include any Copyright, Patent or Trademark, any application for a Copyright, Patent or Trademark, or any license or right under any Copyright, Patent or Trademark that is “classified” for reasons of national security or foreign policy under applicable laws or with respect to which Pledgor is not entitled to pledge, sublicense or assign pursuant to its terms or applicable law or regulation.

  • Destruction of Confidential Information Upon the written request of the disclosing Party, the receiving Party shall cease using and arrange for the destruction of all copies of any Confidential Information then in the receiving Party’s possession or under such Party’s control. The receiving Party agrees to dispose of the Confidential Information in such a manner that the information cannot be read or reconstructed after destruction. Upon the written request of the disclosing Party, the receiving Party shall certify in writing that it has complied with the obligations set forth in this paragraph.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Disposition of Confidential Information Upon termination of Agreement or request of City, Contractor shall within forty-eight (48) hours return all Confidential Information which includes all original media. Once Contractor has received written confirmation from City that Confidential Information has been successfully transferred to City, Contractor shall within ten (10) business days purge all Confidential Information from its servers, any hosted environment Contractor has used in performance of this Agreement, work stations that were used to process the data or for production of the data, and any other work files stored by Contractor in whatever medium. Contractor shall provide City with written certification that such purge occurred within five (5) business days of the purge.

  • Protected Information 5.3.1 In this Section "

Time is Money Join Law Insider Premium to draft better contracts faster.