Software Destruction Sample Clauses

Software Destruction. Upon request by Tintri, Recipient will provide Tintri with written certification of Recipient’s discontinued use and destruction of all Software Applications and accompanying Documentation.
AutoNDA by SimpleDocs

Related to Software Destruction

  • Data Destruction When no longer needed, all County PHI or PI must be cleared, purged, or destroyed consistent with NIST Special Publication 800-88, Guidelines for Media Sanitization such that the PHI or PI cannot be retrieved.

  • Confidential Destruction PHI COUNTY discloses to CONTRACTOR or 5 CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must be disposed of 6 through confidential means, such as cross cut shredding and pulverizing.

  • Media Destruction DST shall destroy removable media and any mobile device (such as discs, USB drives, DVDs, back-up tapes, laptops and PDAs) containing Fund Data or use commercially reasonable efforts to render Fund Data on such physical media unintelligible if such media or mobile device is no longer intended to be used. All backup tapes that are not destroyed must meet the level of protection described in this Security Schedule until destroyed or rendered irretrievable.

  • Substantial Destruction Any damage or destruction to the Premises or the Building which Landlord is not obligated to repair pursuant to Subparagraph 20(a) above will be deemed a substantial destruction. In the event of a substantial destruction, Landlord may elect to either (i) repair, reconstruct and restore the portion of the Building or the Premises damaged by such casualty, in which case this Lease will continue in full force and effect, subject to Tenant's termination right contained in Subparagraph 20(d) below; or (ii) terminate this Lease effective as of the date which is thirty (30) days after Tenant's receipt of Landlord's election to so terminate.

  • Partial Destruction If the Premises or the Building are damaged by fire or other casualty to an extent not exceeding twenty-five percent (25%) of the full replacement cost thereof, and Landlord’s contractor reasonably estimates in a writing delivered to Landlord and Tenant that the damage thereto may be repaired, reconstructed or restored to substantially its condition immediately prior to such damage within one hundred eighty (180) days from the date of such casualty, and Landlord will receive insurance proceeds sufficient to cover the costs of such repairs, reconstruction and restoration (including proceeds from Tenant and/or Tenant’s insurance which Tenant is required to deliver to Landlord pursuant to Subparagraph 20(d) below to cover Tenant’s obligation for the costs of repair, reconstruction and restoration of any portion of the tenant improvements and any alterations for which Tenant is responsible under this Lease), then Landlord agrees to commence and proceed diligently with the work of repair, reconstruction and restoration and this Lease will continue in full force and effect.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Loss or Destruction Upon receipt of evidence satisfactory to the Company of the loss, theft, destruction, or mutilation of this Warrant Certificate and, in the case of any such loss, theft or destruction, upon delivery of an indemnity agreement or bond satisfactory in form, substance and amount to the Company or, in the case of any such mutilation, upon surrender and cancellation of this Warrant Certificate, the Company at its expense will execute and deliver, in lieu thereof, a new Warrant Certificate of like tenor.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!