Retention & Destruction of Shared Data Sample Clauses

Retention & Destruction of Shared Data. Local Authorities and voluntary adoption agencies create records for children and for adopters and prospective adopters. Regulation 27(1) of the Adoption Agencies (Scotland) Regulations 2009 (See Annex B for link) obliges adoption agencies to create case records for; • Any child for whom an adoption panel has recommended that adoption is in his or her best interests; and • Any prospective adopter. Regulation 27(2) Adoption Agency Regulations 2009 lists the minimum content for both types of case record and the record should contain all of the information contained on the Register as well as additional information. The rules about retention of adoption agency records are in regulation 28 of the Adoption Agencies (Scotland) Regulations 2009. Statutory rules are therefore in place to determine how long information is held within adoption agencies. The Register will not hold any information that is not held elsewhere and as such once notified that the information is no longer required for the purpose for linking by the referring agency, all information will be archived on the Register for 12 months. After 12 months all personal identifiable information will be completely deleted while the remaining information will be archived. The circumstances which will determine the timing for when information is deleted from the Register are as follows: • The Register is notified the child has been placed for adoption • The Register is notified the child is withdrawn • The Register is notified a child has been placed for adoption with a family • The Register is notified the family have withdrawn
AutoNDA by SimpleDocs

Related to Retention & Destruction of Shared Data

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Confidential Destruction PHI COUNTY discloses to CONTRACTOR or 5 CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must be disposed of 6 through confidential means, such as cross cut shredding and pulverizing.

  • Retention of Records, Right to Monitor and Audit (a) CONTRACTOR shall maintain all required records for three (3) years after the COUNTY makes final payment and all other pending matters are closed, and shall be subject to the examination and/or audit of the County, a Federal grantor agency, and the State of California.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Application of Miscellaneous Proceeds upon Condemnation, Destruction, or Loss in Value of the Property In the event of a total taking, destruction, or loss in value of the Property, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not then due, with the excess, if any, paid to Borrower. In the event of a partial taking, destruction, or loss in value of the Property (each, a “Partial Devaluation”) where the fair market value of the Property immediately before the Partial Devaluation is equal to or greater than the amount of the sums secured by this Security Instrument immediately before the Partial Devaluation, a percentage of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument unless Borrower and Lender otherwise agree in writing. The amount of the Miscellaneous Proceeds that will be so applied is determined by multiplying the total amount of the Miscellaneous Proceeds by a percentage calculated by taking (i) the total amount of the sums secured immediately before the Partial Devaluation, and dividing it by (ii) the fair market value of the Property immediately before the Partial Devaluation. Any balance of the Miscellaneous Proceeds will be paid to Borrower. In the event of a Partial Devaluation where the fair market value of the Property immediately before the Partial Devaluation is less than the amount of the sums secured immediately before the Partial Devaluation, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not the sums are then due, unless Borrower and Lender otherwise agree in writing.

Time is Money Join Law Insider Premium to draft better contracts faster.