Return or Secure Destruction of FERPA Records Sample Clauses

Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty (30) days after University’s written request, Contractor will halt all access, use, creation, or processing of FERPA Records and will return to University or Securely Destroy all FERPA Records, including any copies created by Contractor or any subcontractor; and Contractor will certify in writing to University that all FERPA records have been returned to University or Securely Destroyed. Secure Destruction, Securely Destroy and Securely Destroyed mean shredding, erasing or otherwise modifying a record so as to make it unreadable or indecipherable.
AutoNDA by SimpleDocs
Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty (30) days after University’s written request, Contractor will halt all access, use, creation, or processing of FERPA Records and will return to University or Securely Destroy all FERPA Records, including any copies created by Contractor or any subcontractor; and Contractor will certify in writing to University that all FERPA records have been returned to University: or Securely Destroyed.
Return or Secure Destruction of FERPA Records. Contractor agrees that no later than 30 days after expiration or termination of the Underlying Agreement or this Addendum for any reason, or within thirty

Related to Return or Secure Destruction of FERPA Records

  • Return/Destruction of PHI 15.1 Business Associate in connection with the expiration or termination of the contract or grant shall return or destroy, at the discretion of the Covered Entity, all PHI received from Covered Entity or created or received by Business Associate on behalf of Covered Entity pursuant to this contract or grant that Business Associate still maintains in any form or medium (including electronic) within thirty (30) days after such expiration or termination. Business Associate shall not retain any copies of the PHI. Business Associate shall certify in writing for Covered Entity (1) when all PHI has been returned or destroyed and (2) that Business Associate does not continue to maintain any PHI. Business Associate is to provide this certification during this thirty (30) day period.

  • Return or Destruction of PHI At termination of this Agreement, Business Associate hereby agrees to return or destroy all PHI provided by or obtained on behalf of Covered Entity. Business Associate agrees not to retain any copies of the PHI after termination of this Agreement. If return or destruction of the PHI is not feasible, Business Associate agrees to extend the protections of this Agreement to limit any further use or disclosure until such time as the PHI may be returned or destroyed. If Business Associate elects to destroy the PHI, it shall certify to Covered Entity that the PHI has been destroyed.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA.

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • REMOVAL OF RECORDS FROM PREMISES Where performance of the Contract involves use by the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) of Authorized User owned or licensed papers, files, computer disks or other electronic storage devices, data or records at Authorized User facilities or offices, or via remote access, the Contractor (or the Contractor’s subsidiaries, affiliates, partners, agents or subcontractors) shall not remotely access, modify, delete, copy or remove such Records without the prior written approval of the Authorized User. In no case, with or without the written approval of the Authorized User, can the Authorized User data be accessed, moved or sent outside the continental United States.

  • Inspection of Records Upon reasonable notice to the Administrative Trustees and the Property Trustee, the records of the Trust shall be open to inspection by Securityholders during normal business hours for any purpose reasonably related to such Securityholder's interest as a Securityholder.

  • EXAMINATION OF RECORDS The Contractor shall maintain during the course of the work complete and accurate records of all of the Contractor's costs and documentation of items which are chargeable to H-GAC under this Agreement. H-GAC, through its staff or designated public accounting firm, the State of Texas, and United States Government, shall have the right at any reasonable time to inspect, copy and audit those records on or off the premises by authorized representatives of its own or any public accounting firm selected by H- GAC. The right of access to records is not limited to the required retention period, but shall last as long as the records are retained. Failure to provide access to records may be cause for termination of the Agreement. The records to be thus maintained and retained by the Contractor shall include (without limitation): (1) personnel and payroll records, including social security numbers and labor classifications, accounting for total time distribution of the Contractor's employees working full or part time on the work, as well as cancelled payroll checks, signed receipts for payroll payments in cash, or other evidence of disbursement of payroll payments; (2) invoices for purchases, receiving and issuing documents, and all other unit inventory records for the Contractor's stocks or capital items; and (3) paid invoices and cancelled checks for materials purchased and for subcontractors' and any other third parties' charges. The Contractor further agrees that the examination of records outlined in this article shall be included in all subcontractor or third-party agreements.

  • Application of Miscellaneous Proceeds upon Condemnation, Destruction, or Loss in Value of the Property In the event of a total taking, destruction, or loss in value of the Property, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not then due, with the excess, if any, paid to Borrower. In the event of a partial taking, destruction, or loss in value of the Property (each, a “Partial Devaluation”) where the fair market value of the Property immediately before the Partial Devaluation is equal to or greater than the amount of the sums secured by this Security Instrument immediately before the Partial Devaluation, a percentage of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument unless Borrower and Lender otherwise agree in writing. The amount of the Miscellaneous Proceeds that will be so applied is determined by multiplying the total amount of the Miscellaneous Proceeds by a percentage calculated by taking (i) the total amount of the sums secured immediately before the Partial Devaluation, and dividing it by (ii) the fair market value of the Property immediately before the Partial Devaluation. Any balance of the Miscellaneous Proceeds will be paid to Borrower. In the event of a Partial Devaluation where the fair market value of the Property immediately before the Partial Devaluation is less than the amount of the sums secured immediately before the Partial Devaluation, all of the Miscellaneous Proceeds will be applied to the sums secured by this Security Instrument, whether or not the sums are then due, unless Borrower and Lender otherwise agree in writing.

  • Return or Destruction (a) As requested by the Furnishing Party during the Agreement Term, the Receiving Party will return or provide the Furnishing Party a copy of any designated Confidential Information of the Furnishing Party.

Time is Money Join Law Insider Premium to draft better contracts faster.