Termination and Violations. 1. UTAH may terminate this Agreement if either RECIPIENT or PI is in default of any terms and conditions of this Agreement and such default has not been remedied within 10 days after the date of written notice of such default. UTAH may unilaterally terminate this Agreement for any reason within 90 days written notice to RECIPIENT.
2. Upon termination of this Agreement for any reason, RECIPIENT and PI shall destroy any copies of Data Set in their possession, including derivative datasets that contain individual-level information, and shall document and report such destruction to UTAH.
Termination and Violations. Upon Project Close-out, or expiration/termination of this Agreement, the Approved User agrees to destroy all copies, versions, and derivations of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, except as required by publication practices, institutional policies, or law to retain them. The Requester and Approved User understand that the NIH may terminate this Agreement and the NCI DAC may terminate the DAR including this Agreement and immediately revoke access to all controlled-access datasets subject to the GDS Policy at any time if the Institution or Approved User does not comply with the policies, principles and procedures of the NIH and the NCI DAC or is in breach of this Agreement.
Termination and Violations. This Data Use Certification will be in effect for a period of one (1) year from the date the dataset(s) are made accessible to the Approved User (“Approved Access Date”). At the end of the access period, Approved Users agree to destroy all copies of the requested dataset(s), except as required by publication practices or law to retain them. Consideration will be given to a renewal of this agreement upon submission of a new DAR. Copies of NIH genomic dataset(s) may not need to be destroyed if, with advance notice and approval by the NHLBI Data Access Committee, the project has been transferred to another Approved User. In this case, documentation must be provided that other Approved Users are using the dataset(s) under an active DAC approved research project at the same institution. The Requester and Approved User acknowledge that the NIH or the NHLBI may terminate this agreement and immediately revoke access to all NIH genomic datasets at any time if the Requester is found to be no longer in agreement with the policies, principles and procedures of the NIH and the NHLBI. ***************************************** By submission of the attached Data Access Request, the Requester through the Institutional Signing Official attests to the Approved Users’ qualifications for access to and use of NIH genomic dataset(s) and certifies their agreement to the NIH principles, policies and procedures for the use of the requested datasets as articulated in this document, including the potential termination of access should a violation of any of these agreement terms be identified. Requesters and the Principal Investigator further acknowledge that they have shared this document and the NIH GWAS data sharing policies and procedures for access and use of genomic datasets with any Approved Users, appropriate research staff, and all other Key Personnel identified in the DAR. Institutional Signing Officials acknowledge that they have considered the relevant NIH GWAS policies and procedures, that they have shared this document and the relevant policies and procedures with appropriate institutional organizations, and have assured compliance with local institutional policies related to technology transfer, information technology, privacy, and human subjects research.
Termination and Violations. Upon project close-out, all Approved Users agree to destroy all copies, versions, and derivations of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, except as required by publication practices, institutional policies, or law to retain them. The Requester and PI acknowledge that the NIH or the eNCI may terminate this agreement and immediately revoke access to all controlled-access datasets subject to the GDS Policy at any time if the Requester is found to be no longer in agreement with the policies, principles and procedures of the NIH and the eNCI.
Termination and Violations. The NCI may terminate this agreement if the RECIPIENT(S) are in default of any of its conditions and such default has not been remedied within 30 days after the date of written notice of such default by an authorized representative of the NCI. Past violations will be taken into consideration by the NCI for future requests from the RECIPIENT(S) to access NCI data.
Termination and Violations. The NICHD may terminate this agreement if RECIPIENT or APPROVED USERS are in default of any of its conditions and such default has not been remedied within 30 days after the date of written notice of such default by an authorized representative of the NICHD. Past violations will be taken into consideration by the NICHD for future requests from the RECIPIENT and APPROVED USERS to access NICHD Research Materials.
Termination and Violations. Upon project close-out, all Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIAGADS, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for Controlled- Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NADAC. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by the NADAC to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, and 11 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.
Termination and Violations. The NHLBI may terminate this agreement if RECIPIENT or APPROVED USERS are in default of any of its conditions and such default has not been remedied within 30 days after the date of written notice of such default by an authorized representative of the NHLBI. Past violations will be taken into consideration by the NHLBI for future requests from the RECIPIENT and APPROVED USERS to access NHLBI Research Materials.
Termination and Violations. The Qualified Investigator and Approved Users acknowledge that the CIFASD Consortium, the NIH or the NIAAA may terminate this agreement and immediately revoke access to all CIFASD datasets at any time if the Qualified Investigator is found to be no longer in agreement with the policies, principles and procedures of the CIFASD Consortium, the NIAAA, and the NIH.
Termination and Violations. Upon project close-out, all Approved Users agree to destroy all copies of the requested dataset(s), on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, except as required by publication practices or law to retain them. The Requester and PI acknowledge that the NIH or the NIAGADS Data Use Committee may terminate this agreement and immediately revoke access to all controlled-access datasets subject to the GDS Policy at any time if the Requester is found to be no longer in agreement with the policies, principles and procedures of the NIH and the NADAC. subject to the GDS Policy.