Return, Destruction, etc Sample Clauses

Return, Destruction, etc. Each of Member and AVP shall permanently cease all use of Confidential Information, Personal Information, information transmitted through a VOW Datafeed, and any other proprietary and confidential information received hereunder upon any suspension or termination of its access to and use of the VOW Datafeed pursuant to this Agreement and shall promptly, by secure means, permanently delete, erase and destroy any and all Confidential Information, Personal Information, information transmitted through a VOW Datafeed and any materials (in any medium) containing or reflecting any Listing Information including all copies, extracts, reproductions, or otherwise, in whole or in part, that each has stored anywhere and by any means, including without limitation on magnetic media or other electronic or digital storage, including all backup copies, in its possession or under its control, as well as any copies in the possession or under the control of its representatives, immediately upon termination of this Agreement, but in any event, not later than seven (7) days after termination of this Agreement, for any reason whatsoever. Member and AVP shall each certify in writing to TREB that each has complied with all of the foregoing.
AutoNDA by SimpleDocs
Return, Destruction, etc. Each of IDX Data Subscriber and Third Party Service Provider shall promptly cease all use of Confidential Information, Personal Information, IDX System and any part thereof, and any other proprietary and confidential information received hereunder upon any suspension or termination of its access to and use of the IDX System and any part thereof pursuant to this Agreement and shall promptly, by secure means, permanently delete, erase and destroy any and all Confidential Information, Personal Information, IDX Data (including IDX Data transmitted through an IDX Datafeed) and any materials (in any medium) containing or reflecting any IDX Data (including any IDX Data transmitted through an IDX Datafeed) including all copies, extracts, reproductions, or otherwise, in whole or in part, that each has stored anywhere and by any means, including without limitation on magnetic media or other electronic or digital storage, including all backup copies, in its possession or under its control, as well as any copies in the possession or under the control of its representatives, immediately upon termination of this Agreement, but in any event, not later than seven (7) days after termination of this Agreement, for any reason whatsoever. IDX Data Subscriber and Third Party Service Provider shall each certify in writing to KWAR that each has complied with the foregoing.

Related to Return, Destruction, etc

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period. 15.2 Business Associate shall provide to Covered Entity notification of any conditions that Business Associate believes make the return or destruction of PHI infeasible. If Covered Entity agrees that return or destruction is infeasible, Business Associate shall extend the protections of this Agreement to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction infeasible for so long as Business Associate maintains such PHI. This shall also apply to all Agents and Subcontractors of Business Associate.

  • Return or Destruction Upon termination of this Agreement or upon any earlier written request by Sponsor at any time, Institution shall return to Sponsor, or destroy, at Sponsor’s option, all Confidential Information other than Study Data.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Loss or Destruction Upon receipt of evidence satisfactory to the Company of the loss, theft, destruction, or mutilation of this Warrant Certificate and, in the case of any such loss, theft or destruction, upon delivery of an indemnity agreement or bond satisfactory in form, substance and amount to the Company or, in the case of any such mutilation, upon surrender and cancellation of this Warrant Certificate, the Company at its expense will execute and deliver, in lieu thereof, a new Warrant Certificate of like tenor.

  • Loss, Theft, Destruction of Warrants Upon receipt of evidence satisfactory to the Issuer of the ownership of and the loss, theft, destruction or mutilation of any Warrant and, in the case of any such loss, theft or destruction, upon receipt of indemnity or security satisfactory to the Issuer or, in the case of any such mutilation, upon surrender and cancellation of such Warrant, the Issuer will make and deliver, in lieu of such lost, stolen, destroyed or mutilated Warrant, a new Warrant of like tenor and representing the right to purchase the same number of shares of Common Stock.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Loss or Destruction of Warrant Subject to the terms and conditions hereof, upon receipt by the Company of evidence reasonably satisfactory to it of the loss, theft, destruction or mutilation of this Warrant and, in the case of loss, theft or destruction, of such bond or indemnification as the Company may reasonably require, and, in the case of such mutilation, upon surrender and cancellation of this Warrant, the Company will execute and deliver a new Warrant of like tenor.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

  • Loss, Theft, Destruction or Mutilation Upon receipt by the Company of evidence satisfactory to it, in the exercise of its reasonable discretion, of the ownership and the loss, theft, destruction or mutilation of this Warrant and, in the case of loss, theft or destruction, of indemnity reasonably satisfactory to the Company and, in the case of mutilation, upon surrender and cancellation thereof, the Company will execute and deliver in lieu thereof, without expense to the Holder, a new Warrant of like tenor dated the date hereof.

  • Substantial Destruction Any damage or destruction to the Premises or the Building which Landlord is not obligated to repair pursuant to Subparagraph 20(a) above will be deemed a substantial destruction. In the event of a substantial destruction, Landlord may elect to either (i) repair, reconstruct and restore the portion of the Building or the Premises damaged by such casualty, in which case this Lease will continue in full force and effect, subject to Tenant's termination right contained in Subparagraph 20(d) below; or (ii) terminate this Lease effective as of the date which is thirty (30) days after Tenant's receipt of Landlord's election to so terminate.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!