Return or Destruction of DSH PCI on Expiration or Termination Sample Clauses

Return or Destruction of DSH PCI on Expiration or Termination. Upon expiration or termination of the agreement between Contractor and DSH for any reason, Contractor shall securely return or destroy the DSH PCI. If return or destruction is not feasible, Contractor shall provide a written explanation to the DSH Program Contract Manager, the DSH Privacy Officer and the DSH Chief Information Security Officer, using the contact information listed in Section XI(F), above.
AutoNDA by SimpleDocs

Related to Return or Destruction of DSH PCI on Expiration or Termination

  • PROVISIONS SURVIVING EXPIRATION OR TERMINATION Notwithstanding the expiration or termination (by agreement, breach, or operation of time) of this Agreement, the provisions of this Agreement regarding payments (including liquidated damages and tax payments), reports, records, and dispute resolution of the Agreement shall survive the termination or expiration dates of this Agreement until the following occurs:

  • Data Transfer Upon Termination or Expiration Provider will notify the Division of impending cessation of its business and any contingency plans. Provider shall implement its exit plan and take all necessary actions to ensure a smooth transition of service with minimal disruption to the Division. As mutually agreed upon and as applicable, Provider will work closely with its successor to ensure asuccessful transition to the new equipment, with minimal downtime and effect on the Division, all such work to be coordinated and performed in advance of the formal, transition date.

  • Duration of Agreement and Protected Data Upon Termination or Expiration The Master Agreement commences on the date of signature. • Upon expiration of the Master Agreement without renewal, or upon termination of the Master Agreement prior to its expiration, Vendor will securely delete or otherwise destroy any and all Protected Data remaining in the possession of Vendor or any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data. If requested by the District, Vendor will assist the District in exporting all Protected Data previously received back to the District for its own use, prior to deletion, in such formats as may be requested by the District. • In the event the Master Agreement is assigned to a successor Vendor (to the extent authorized by the Master Agreement), the Vendor will cooperate with the District as necessary to transition Protected Data to the successor Vendor prior to deletion. • Neither Vendor nor any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data will retain any Protected Data, copies, summaries or extracts of the Protected Data, or any de-identified Protected Data, on any storage medium whatsoever. Upon request, Vendor and/or its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data, as applicable, will provide the District with a certification from an appropriate officer that these requirements have been satisfied in full. Challenging Accuracy of Protected Data: Parents or eligible students can challenge the accuracy of any Protected Data provided by the District to Vendor, by contacting the District regarding procedures for requesting amendment of education records under the Family Educational Rights and Privacy Act (FERPA). Teachers or principals may request to challenge the accuracy of APPR data provided to Vendor by following the appeal process in the District’s applicable APPR Plan. Data Storage and Security Protections: Any Protected Data that Vendor receives will be stored on systems maintained by Vendor, or by a subcontractor under the direct control of Vendor, in a secure data center facility located within the United States. The measures that Vendor (and, if applicable, its subcontractors) will take to protect Protected Data include adoption of technologies, safeguards and practices that align with the NIST Cybersecurity Framework, and safeguards associated with industry standards and best practices including, but not limited to, disk encryption, file encryption, firewalls, and password protection.

  • Property Rights upon Termination or Expiration of Contract In the event the Contract is terminated for any reason, or upon its expiration State Property remains the property of the System Agency and must be returned to the System Agency by the end date of the Contract or upon System Agency’s request.

  • DELIVERY UPON TERMINATION OR EXPIRATION No later than the first calendar day after the termination or expiration of the Contract or upon System Agency’s request, Grantee shall deliver to System Agency all completed, or partially completed, Work Product, including any Incorporated Pre-existing Works, and any and all versions thereof. Xxxxxxx’s failure to timely deliver such Work Product is a material breach of the Contract. Grantee will not retain any copies of the Work Product or any documentation or other products or results of Grantee’s activities under the Contract without the prior written consent of System Agency.

  • Contract Renegotiation, Suspension, or Termination Due to Change in Funding If the funds DSHS relied upon to establish this Contract or Program Agreement are withdrawn, reduced or limited, or if additional or modified conditions are placed on such funding, after the effective date of this contract but prior to the normal completion of this Contract or Program Agreement:

  • Termination of Use These terms and Your access to Our Website may be terminated by Us (at Our sole discretion) at any time without notice or any requirement to give You a reason why. In the event of termination under this clause We shall have no liability to You whatsoever (including for any consequential or direct loss You may suffer).

  • Effect of cessation or determination of Agreement 35. (1) On the cessation or determination of this Agreement —

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Termination or Abandonment Notwithstanding anything contained in this Agreement to the contrary, this Agreement may be terminated and abandoned at any time prior to the Effective Time, whether before or after any approval of the matters presented in connection with the Merger by the stockholders of the Company:

Time is Money Join Law Insider Premium to draft better contracts faster.