COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of:
(i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the
COMPUTER STORAGE AND SYSTEM SECURITY. Investigator shall ensure that the computer or mobile devices used for EDC system (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of:
(i) logging off when not using the computer or mobile device or during Authorized User’s absence when the computer or mobile device is left unattended; and
(ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer or mobile device unattended in that room.