Destruction or Return of School Data Sample Clauses

Destruction or Return of School Data. With the exception of De-identified Data that School has specifically agreed in writing to allow Contractor to use after termination or expiration of this Agreement, or School Data for which Contractor has specifically obtained consent from the parent, legal guardian or student to keep, within thirty (30) calendar days after termination or expiration of this Agreement, Contractor shall ensure that all School Data and PII that Contractor collected, generated or inferred pursuant to the Contract (“Contract Data”), is securely returned or Securely Destroyed, as directed by School. In the event that School requests destruction, Contractor agrees to Securely Destroy all School Data and Contract Data that is in its possession and cause its Subcontractors to Securely Destroy all School Data and Contract Data that is in the possession of any Subcontractors. If School requests return, Contractor shall securely return all School Data and Contract Data to the authorized person specified by School, using the methods requested by School, in its discretion. The Contractor shall promptly certify in writing to School that such School Data and Contract Data has been disposed of or returned securely, using the form attached hereto as Schedule 3.

Related to Destruction or Return of School Data

  • Duration of processing and erasure or return of data Processing by the data importer shall only take place for the duration specified in Annex I.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

  • DESTRUCTION OF STATE DATA At any time during the term of this Contract within thirty days of (i) the State’s written request or (ii) termination or expiration of this Contract for any reason, Contractor shall securely dispose of all copies, whether in written, electronic or other form or media, of State Data according to National Institute of Standards and Technology (NIST) approved methods, and certify in writing to the State that such State Data has been disposed of securely. Further, upon the relocation of State Data, Contractor shall securely dispose of such copies from the former data location according to National Institute of Standards and Technology (NIST) approved methods and certify in writing to the State that such State Data has been disposed of securely. Contractor shall comply with all reasonable directions provided by the State with respect to the disposal of State Data.

  • Return of Company Materials Upon the termination of this Agreement, or upon Company’s earlier request, Consultant will immediately deliver to the Company, and will not keep in Consultant’s possession, recreate, or deliver to anyone else, any and all Company property, including, but not limited to, Confidential Information, tangible embodiments of the Inventions, all devices and equipment belonging to the Company, all electronically-stored information and passwords to access such property, those records maintained pursuant to Section 3.D and any reproductions of any of the foregoing items that Consultant may have in Consultant’s possession or control.