Return/Destruction of Information Clause Samples
POPULAR SAMPLE Copied 1 times
Return/Destruction of Information. Within thirty (30) days after Utility’s written demand, ESE shall (and shall cause its Third Party Representatives to) cease to access and Process Confidential Utility Information and shall at the Utility’s option:
(A) return such Confidential Utility Information to Utility in such manner, format, and timeframe as reasonably requested by Utility or, if not so directed by Utility,
(B) Destroy all copies of all Confidential Utility Information (including any and all extracts, compilations, studies, or other documents based upon, derived from, or containing Confidential Utility Information) that has come into ESE’s or its Third Party Representatives’ possession, including destroying Confidential Utility Information from all systems, records, archives, and backups of ESE and its Third Party Representatives, and all subsequent access, use, and Processing of the Confidential Utility Information by ESE and its Third Party Representatives shall cease. Notwithstanding the foregoing, ESE and its Third Party Representatives shall not be obligated to erase Confidential Utility Information contained in an archived computer system backup maintained in accordance with their respective security or disaster recovery procedures, provided that ESE and its Third Party Representatives shall (1) not have experienced a Data Security Incident, (2) not permit access to or recovery of Confidential Utility Information from such computer backup system and (3) keep all such Confidential Utility Information confidential in accordance with this Addendum. ESE shall, upon request, certify to Utility that the destruction by ESE and its Third Party Representatives required by this Section has occurred by (A) having a duly authorized officer of ESE complete, execute, and deliver to Utility a certification and (B) obtaining substantially similar certifications from its Third Party Representatives and maintaining them on file. Compliance with this Section 8 shall not relieve ESE from compliance with the other provisions of this Addendum. The written demand to destroy or return Confidential Utility Information pursuant to this Section may occur if the ESE has been decertified pursuant to the UBP or DER UBP, the Utility has been notified of a potential or actual Data Security Incident or the Confidential Utility Information has been held for a period in excess of its retention period. The obligations under this Section shall survive any expiration of termination of this Addendum.
Return/Destruction of Information. Within thirty (30) days after Utility’s written demand, ESE shall (and shall cause its Third-Party Representatives to) cease to access and Process Confidential Customer Utility Information and shall at the Utility’s option: (A) return such Confidential Customer Utility Information to Utility in such manner, format, and timeframe as reasonably requested by Utility or, if not so directed by Utility, (B) shred, permanently erase and delete, degauss or otherwise modify so as to make unreadable, unreconstructible and indecipherable (“Destroy”) all copies of all Confidential Customer Utility Information (including any and all extracts, compilations, studies, or other documents based upon, derived from, or containing Confidential Customer Utility Information) that has come into ESE’s or its Third-Party Representatives’ possession, including Destroying Confidential Customer Utility Information from all systems, records, archives, and backups of ESE and its Third-Party Representatives, and all subsequent access, use, and Processing of the Confidential Customer Utility Information by ESE and its Third-Party Representatives shall cease, provided any items required to be maintained by governmental administrative rule or law or necessary for legitimate business or legal needs will not be destroyed until permitted and will remain subject
Return/Destruction of Information. Except as provided in Section 6.2 of this Agreement, and by regulations promulgated by (in) the Food and Drug Administration, upon termination of this Agreement, for any reason, Business Associate shall return or destroy all Protected Health Information received from Covered Entity, or created or received by Business Associate on behalf of Covered Entity. This provision shall apply to Protected Health Information that is in the possession of subcontractors or agents of Business Associate. Business Associate shall retain no copies of the Protected Health Information.
Return/Destruction of Information. Within ten (10) days after Utility’s written demand, Aggregator shall (and shall cause its Representatives to) cease to Process Confidential Utility Information and shall at the Utility’s option: (a) return such Confidential Utility Information to Utility in such manner, format and timeframe as reasonably requested by Utility or, if not so directed by Utility, (b) Destroy all copies of all Confidential Utility Information (including any and all extracts, compilations, studies or other documents based upon, derived from or containing Confidential Utility Information) that has come into Aggregator’s or its Representatives’ possession, including destroying Confidential Utility Information from all systems, records, archives and backups of Aggregator and its Representatives, and all subsequent use and Processing of the Confidential Utility Information by Aggregator and its Representatives shall cease. Notwithstanding the foregoing, Aggregator and its Representatives shall not be obligated to erase Confidential Utility Information contained in an archived computer system backup maintained in accordance with their respective security or disaster recovery procedures, provided that Aggregator and its Representatives shall (i) not have experienced a Data Security Incident,
Return/Destruction of Information. Google agrees that upon termination of the Agreement, Google will return or destroy all PHI received from Customer, or created or received by Google on behalf of Customer, which Google still maintains in accordance with the section titled “Effects of Termination” (or as otherwise expressly agreed in writing) under the Agreement; provided, however, that if such return or destruction is not feasible, Google will extend the protections of this HIPAA BAA to the PHI not returned or destroyed and limit further uses and disclosures to those purposes that make the return or destruction of the PHI infeasible. In the event this HIPAA BAA is terminated earlier than the underlying Agreement Customer may continue to use the Services in accordance with the Agreement, but must delete any PHI it maintains in the Services and cease to create, receive, maintain or transmit such PHI to Google or within the Services.
Return/Destruction of Information. Upon request after termination of this Agreement by a Party for return of the Confidential Information of such Party, the other Party shall, within sixty (60) business days of the request, use commercially reasonable efforts to either return or destroy all written or tangible material containing or reflecting Confidential Information of the requesting Party (whether prepared by the requesting Party or otherwise), without retaining any copies, summaries, analyses, or abstracts thereof, except that each Party’s independent outside counsel may retain one copy for attorney’s eyes only. An authorized individual of the Receiving Party shall confirm in writing Receiving Party’s compliance with this Section within sixty (60) business days after the other Party’s request for the return or destruction of Confidential Information.
Return/Destruction of Information. Other than with respect to the Deposit Materials that were released (which shall be subject to Section 4.4(h) (Return of Deposit Materials)), each Party shall, upon termination or expiration of this Agreement, return or destroy (by rendering unreadable and unusable) Confidential Information of the other Party. Notwithstanding the foregoing, neither Party may destroy any of the other Party’s Confidential Information without such other Party’s prior written consent. Upon request, the destroying Party shall at such time provide the other Party with a certificate signed by an officer of the destroying Party certifying that all Confidential Information has been returned or destroyed. Each Party will erase all of the other Party’s Confidential Information from all forms of magnetic and electronic media in accordance with the requirements set forth herein and in any other Exhibit or Appendix. If any Confidential Information cannot be erased from all forms of magnetic and electronic media, the destroying Party will use its commercially reasonable efforts to ensure that it cannot be recovered or accessed.
Return/Destruction of Information. NMSU must return promptly to Foundation any Donor Information disclosed to NMSU that legally cannot be kept confidential, including either returning or destroying any copy that NMSU has made of that information. NMSU must also return to the Foundation – or with Foundation's permission delete or destroy – all Donor Information or other private information that is disclosed to NMSU upon the sooner of:
1. the completion of NMSU's use; or
2. the Foundation's request.
Return/Destruction of Information. Upon termination of the Product Passthrough Terms or the Agreement, all PHI received from Customer, or created or received by Provider on behalf of Customer, which is still maintained in accordance with the section titled “Effects of Termination” (or as otherwise expressly agreed in writing) under the Product Passthrough Terms will be returned or destroyed; provided, however, that if such return or destruction is not feasible, the protections of this HIPAA BAA will extent to the PHI not returned or destroyed and limit further uses and disclosures to those purposes that make the return or destruction of the PHI infeasible. In the event this HIPAA BAA is terminated earlier than the the Product Passthrough Terms or Agreement Customer may continue to use the Product in accordance with the the Product Passthrough Terms, but must delete any PHI it maintains in the Product and cease to create, receive, maintain or transmit such PHI to Provider or within the Product.
Return/Destruction of Information. On termination of the Services Agreements, Company will return or destroy all PHI received from Customer, or created or received by Company on behalf of Customer; provided, however, that if such return or destruction is not feasible, Company will extend the protections of this BAA to the PHI not returned or destroyed and limit further uses and disclosures to those purposes that make the return or destruction of the PHI infeasible.