Preservation of Data Sample Clauses

Preservation of Data. Party B agrees to record and preserve the Technological Achievements developed by him independently or jointly with others during his employment with Party A in the format or methods specified by Party A. These data are the absolute properties of Party A which shall be accessible and available to Party A at any time.
AutoNDA by SimpleDocs
Preservation of Data. All data complied in connection with the Proprietary Technology will be copied or otherwise preserved and archived on storable media by E-Card to ensure that all Proprietary Technology in the form of data is backed up in the case of any loss or damage to the original data for the benefit of the parties and delivered from time to time upon written request by any party.
Preservation of Data. Any data that is reserved to the Grantee by the express terms hereof, and proprietary data and trade secrets that have been utilized to support any premise, postulate or conclusion referred to or expressed in any deliverable hereunder, shall be preserved by the Grantee at the Grantee's own expense for a minimum of three (3) years after final payment, unless a longer period of records retention is stipulated.
Preservation of Data. All data compiled in connection with the Proprietary Technology will be copied or otherwise preserved and archived on storable media by Compte to ensure that all Proprietary Technology in the form of data is backed up in the case of any loss or damage to the original data for the benefit of the parties and delivered from time to time upon request by any party.
Preservation of Data. Notwithstanding anything else in this Agreement to the contrary, unless specifically instructed otherwise in writing by COMPANY, SKI/MEMORTAL shall retain and preserve one (1) copy of all records relating to the Study for two (2) years after the last marketing authorization for the Study Drug has been approved or COMPANY has discontinued its research with respect to the Study Drug and the FDA has been notified, or such longer period as shall be required by law (such period being referred to herein as the "Retention Period"). At the end of such period, SKI/MEMORIAL may destroy all such material upon giving COMPANY written notice of its intent to do so at least sixty (60) days prior to destruction.
Preservation of Data. User agrees and understands that to process the services performed by Site, such services may involve transmissions over various networks, and changes to conform or adapt to the technical requirements of connecting networks or devices; accordingly, User agrees and understands that neither Site nor Company have any responsibility for the maintenance or storage of any content maintained or uploaded through the Site, or any liability for deleting or failing to store any such content.
Preservation of Data. Any data which is reserved to the Contractor by the express terms hereof, and pre-existing proprietary or confidential data which has been utilized to support any premise, postulate or conclusion referred to or expressed in any deliverable hereunder, shall be preserved by the Contractor at the Contractor's own expense for a period of not less than three years after receipt and approval by the Commission of the Final Report herein.
AutoNDA by SimpleDocs

Related to Preservation of Data

  • Protection of Data The Contractor agrees to store Data on one or more of the following media and protect the Data as described: a. Hard disk drives. For Data stored on local workstation hard disks, access to the Data will be restricted to Authorized User(s) by requiring logon to the local workstation using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. b. Network server disks. For Data stored on hard disks mounted on network servers and made available through shared folders, access to the Data will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on disks mounted to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. For DSHS Confidential Information stored on these disks, deleting unneeded Data is sufficient as long as the disks remain in a Secure Area and otherwise meet the requirements listed in the above paragraph. Destruction of the Data, as outlined below in Section 8 Data Disposition, may be deferred until the disks are retired, replaced, or otherwise taken out of the Secure Area. c. Optical discs (CDs or DVDs) in local workstation optical disc drives. Data provided by DSHS on optical discs which will be used in local workstation optical disc drives and which will not be transported out of a Secure Area. When not in use for the contracted purpose, such discs must be Stored in a Secure Area. Workstations which access DSHS Data on optical discs must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism. d. Optical discs (CDs or DVDs) in drives or jukeboxes attached to servers. Data provided by DSHS on optical discs which will be attached to network servers and which will not be transported out of a Secure Area. Access to Data on these discs will be restricted to Authorized Users through the use of access control lists which will grant access only after the Authorized User has authenticated to the network using a Unique User ID and Hardened Password or other authentication mechanisms which provide equal or greater security, such as biometrics or smart cards. Data on discs attached to such servers must be located in an area which is accessible only to authorized personnel, with access controlled through use of a key, card key, combination lock, or comparable mechanism.

  • Retention of Data With regard to business transactions covered by this Agreement, Licensee must retain any records for a period of ten years starting on 1th of January of the year following the year during which the data were transmitted or otherwise transferred, or for the minimum period prescribed by applicable law, whichever is longer. In addition, Licensee must maintain current, complete and accurate reports on all of SAP’s Confidential Information in its possession or in the possession of its representatives.

  • Preservation of Records The Assuming Bank agrees that it will preserve and maintain for the joint benefit of the Receiver, the Corporation and the Assuming Bank, all Records of which it has custody for such period as either the Receiver or the Corporation in its discretion may require, until directed otherwise, in writing, by the Receiver or Corporation. The Assuming Bank shall have the primary responsibility to respond to subpoenas, discovery requests, and other similar official inquiries with respect to the Records of which it has custody.

  • Destruction of Data Provider shall destroy or delete all Personally Identifiable Data contained in Student Data and obtained under the DPA when it is no longer needed for the purpose for which it was obtained or transfer said data to LEA or LEA’s designee, according to a schedule and procedure as the parties may reasonable agree. Nothing in the DPA authorizes Provider to maintain personally identifiable data beyond the time period reasonably needed to complete the disposition.

  • Provision of Data 26.1 The Supplier shall submit all information required under applicable law and regulations, such as but not limited to information required to meet financial and administrative obligations. If Wavin has not received one or more of the requested documents within ten (10) days of making the request, Wavin shall be entitled to suspend payment until the moment of receipt, or to terminate the Agreement without any liability. 26.2 Every change in the data submitted under clause 26.1 must be immediately reported to Wavin in writing.

  • Preservation of Marks Each Assignor agrees to use or license the use of its Marks in interstate commerce during the time in which this Agreement is in effect, sufficiently to preserve such Marks as trademarks or service marks registered under the laws of the United States or the relevant foreign jurisdiction.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Security of Data a. Each of the parties shall: i. ensure as far as reasonably practicable, that Data is properly stored, is not accessible to unauthorised persons, is not altered, lost or destroyed and is capable of being retrieved only by properly authorised persons; ii. subject to the provisions of Sub-Clause 8.a. ensure that, in addition to any security, proprietary and other information disclosure provision contained in the Contract, Messages and Associated Data are maintained in confidence, are not disclosed or transmitted to any unauthorised person and are not used for any purpose other than that communicated by the sending party or permitted by the Contract; and iii. protect further transmission to the same degree as the originally transmitted Message and Associated Data when further transmissions of Messages and Associated Data are permitted by the Contract or expressly authorised by the sending party. b. The sending party shall ensure that Messages are marked in accordance with the requirements of the Contract. If a further transmission is made pursuant to Sub-Clause 3. a. iii. the sender shall ensure that such markings are repeated in the further transmission. c. The parties may apply special protection to Messages by encryption or by other agreed means, and may apply designations to the Messages for protective Interchange, handling and storage procedures. Unless the parties otherwise agree, the party receiving a Message so protected or designated shall use at least the same level of protection and protective procedures for any further transmission of the Message and its Associated Data for all responses to the Message and for all other communications by Interchange or otherwise to any other person relating to the Message. d. If either party becomes aware of a security breach or breach of confidence in relation to any Message or in relation to its procedures or systems (including, without limitation, unauthorised access to their systems for generation, authentication, authorisation, processing, transmission, storage, protection and file management of Messages) then it shall immediately inform the other party of such breach. On being informed or becoming aware of a breach the party concerned shall: i. immediately investigate the cause, effect and extent of such breach; ii. report the results of the investigation to the other party; and iii. use all reasonable endeavours to rectify the cause of such breach. e. Each party shall ensure that the contents of Messages that are sent or received are not inconsistent with the law, the application of which could restrict the content of a Message or limit its use, and shall take all necessary measures to inform without delay the other party if such an inconsistency arises.

  • Preservation of Rights No delay or omission of the Lenders or the Administrative Agent to exercise any right under the Loan Documents shall impair such right or be construed to be a waiver of any Default or an acquiescence therein, and the making of a Loan notwithstanding the existence of a Default or the inability of the Borrower to satisfy the conditions precedent to such Loan shall not constitute any waiver or acquiescence. Any single or partial exercise of any such right shall not preclude other or further exercise thereof or the exercise of any other right, and no waiver, amendment or other variation of the terms, conditions or provisions of the Loan Documents whatsoever shall be valid unless in writing signed by the Lenders required pursuant to Section 8.2, and then only to the extent in such writing specifically set forth. All remedies contained in the Loan Documents or by law afforded shall be cumulative and all shall be available to the Administrative Agent and the Lenders until the Obligations have been paid in full.

  • Identification of Data a. All Background, Third Party Proprietary and Controlled Government Data provided by Disclosing Party shall be identified in the Annex under which it will be provided. b. NASA software and related Data provided to Partner shall be identified in the Annex under which it will be used. Notwithstanding H.4., Software and related Data will be provided to Partner under a separate Software Usage Agreement (SUA). Partner shall use and protect the related Data in accordance with this Article. Unless the SUA authorizes retention, or Partner enters into a license under 37 C.F.R. Part 404, the related Data shall be disposed of as instructed by NASA.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!