Destruction of District Data Sample Clauses

Destruction of District Data. Unless otherwise provided in the Contract, within thirty (30) days of the termination or expiration of the Agreement and upon written request, Contractor shall Securely Destroy, or caused to be Securely Destroyed, District Data in its possession or under its control, including without limitation District Data in the possession or under the control of its Subcontractors. Upon written request, the Contractor shall promptly certify in writing to District that such District Data has been Securely Destroyed using the form attached hereto as Schedule 2.
AutoNDA by SimpleDocs
Destruction of District Data. Within thirty (30) days of the termination or expiration of this Agreement, Contractor shall Securely Destroy, or caused to be Securely Destroyed, District Data in its possession or under its control, including without limitation District Data in the possession or under the control of its Subcontractors. The Contractor shall promptly certify in writing to District that such District Data has been Securely Destroyed using the form attached hereto as Schedule 2. Response to Specific Data Destruction or Return Requests. Contractor shall Securely Destroy or return any specific District Data in its possession or under its control within ten (10) business days, excluding national holidays, after receiving a written request from the District.

Related to Destruction of District Data

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Loss, Theft, Destruction or Mutilation of Warrant The Company covenants that upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant or any stock certificate relating to the Warrant Shares, and in case of loss, theft or destruction, of indemnity or security reasonably satisfactory to it (which, in the case of the Warrant, shall not include the posting of any bond), and upon surrender and cancellation of such Warrant or stock certificate, if mutilated, the Company will make and deliver a new Warrant or stock certificate of like tenor and dated as of such cancellation, in lieu of such Warrant or stock certificate.

  • Description of Data Instructions to the drafter; delete after completion of this section: This section of this attachment should provide sufficient information such that each party understands the information that will be transmitted under this Agreement. Examples of information that should be provided include: * Whether the data is obtained from human subjects and, if so, a description of the population included in the data. * If the data is from animal subjects, the species of animal the data was obtained using. * If not from human or animal subjects, a description of the focus of the data. * The number of subjects and/or experiments included * Name of the study that the data was obtained under If there is a particular study that needs to be acknowledged/cited as the source of the data, this information should be included here.

  • Deletion of Data You can delete the information saved on your device at any time by uninstalling the App via your operating system. If you have activated a cloud solution to synchronize your device (e.g. Samsung Cloud or Apple iCloud), it may be necessary for you to delete the safeguard saved in the cloud to delete the data saved in the cloud. Images taken with the treasure xxxx App are saved on your device and are not automatically deleted from your device when the app is uninstalled. The TabTracks App is not authorized to do this under requested permissions. This is a security setting for the iOS and Android operating systems. The information saved on our servers under your user account can be deleted at any time upon your request. Please write an email with your request to xxxxxxxxxxx@xxxxxxxxx.xxx.

Time is Money Join Law Insider Premium to draft better contracts faster.