Information Destruction or Return Sample Clauses

Information Destruction or Return. Promptly after (i) Provider no longer needs to Process the Aramark Information to perform the Services, (ii) the Agreement terminates or expires, or (iii) Aramark’s written request, Provider shall return to Aramark, and require all Provider Resources to return to Aramark, all originals and copies of all Aramark Information. Following the return of such information, Provider shall Securely Dispose of such information from all systems it directly or indirectly controls (including those of Third Parties). Provider shall provide a written statement to Aramark certifying that it has complied with the requirements in this section. Provider shall not be required to return, destroy, or erase any Aramark Information if prohibited by applicable law, in which case the Provider shall retain, in its then current state, all such Aramark Information within its control or possession in accordance with the Agreement and perform its obligations under this Agreement as soon as such law no longer prevents it from doing so, provided that for as long as the Aramark Information is stored by Provider, Provider shall only make such use of the Aramark Information as required by law.
AutoNDA by SimpleDocs

Related to Information Destruction or Return

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

  • Return or Destruction of Information Upon termination of this Agreement and at the request of ODM, the MCP will return to ODM or destroy all PHI in MCP’s possession stemming from this Agreement as soon as possible but no later than 90 calendar days and will not keep copies of the PHI except as may be requested by ODM or required by law, or as otherwise allowed for under this Agreement. If the MCP, its agent(s), or subcontractor(s) destroy any PHI, then the MCP will provide to ODM documentation evidencing such destruction. Any PHI retained by the MCP will continue to be extended the same protections set forth in this section, HIPAA regulations, and this Agreement for as long as it is maintained.

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Deletion or return of Company Personal Data 9.1 Subject to this section 9 Processor shall promptly and in any event within 10 business days of the date of cessation of any Services involving the Processing of Company Personal Data (the “Cessation Date”), delete and procure the deletion of all copies of those Company Personal Data.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Deletion or Return of Personal Data 8.1 Xxxx shall delete the Personal Data upon termination/expiry of the MSA as specified in the MSA or upon Client’s reasonable request within 30 days and ensure the deleted data is unrecoverable. Xxxx may retain Personal Data to the extent required by applicable laws and only to the extent and for such period as required by the applicable laws and always provided that Xxxx shall ensure the confidentiality of all such Personal Data and shall ensure that such Personal Data is only Processed as necessary for the purpose(s) specified in the applicable laws requiring its storage and for no other purpose.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Failure to Maintain Financial Viability The System Agency may terminate the Contract if, in its sole discretion, the System Agency has a good faith belief that Grantee no longer maintains the financial viability required to complete the services and Deliverables, or otherwise fully perform its responsibilities under the Contract.

  • Destruction of Confidential Information Upon the written request of the disclosing Party, the receiving Party shall cease using and arrange for the destruction of all copies of any Confidential Information then in the receiving Party’s possession or under such Party’s control. The receiving Party agrees to dispose of the Confidential Information in such a manner that the information cannot be read or reconstructed after destruction. Upon the written request of the disclosing Party, the receiving Party shall certify in writing that it has complied with the obligations set forth in this paragraph.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!