COMPUTER STORAGE AND SYSTEM SECURITY Sample Clauses

COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
AutoNDA by SimpleDocs
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. hodnocení. Xxxxx Oprávněná osoba odpovídá za jednání uskutečňovaná pod jejím uživatelským jménem. 3.
Time is Money Join Law Insider Premium to draft better contracts faster.