Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.
Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.
Destruction of Confidential Information Upon the Disclosing Party’s written request, at any time during or after the term of this Agreement, the Recipient and its Representatives shall promptly return all copies, in any form or media, of the Disclosing Party’s Confidential Information, or destroy such copies and certify in writing that the Confidential Information has been destroyed. Additionally, the Recipient shall destroy all copies of any Notes created by the Recipient or its Representatives and certify that such Notes have been destroyed. However, the following exceptions apply: The Recipient and its Representatives are not required to destroy electronic copies of Confidential Information created as part of standard backup and archival processes, provided that: personnel not primarily involved in information technology do not have access to such retained copies; and information technology personnel only access such copies as necessary to perform regular IT functions (e.g., system recovery). The Recipient and its Representatives may retain: one copy of the Confidential Information as necessary to defend or maintain any litigation related to this Agreement or the Confidential Information, or to comply with established document retention policies; and copies of the Confidential Information as required by applicable law, regulation, or rule, or as necessary to comply with any request or requirement of a legal, regulatory, governmental, or supervisory authority, provided that the Recipient and its Representatives remain bound by the terms of this Agreement concerning any retained Confidential Information.
Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.
Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.