COMPUTER STORAGE AND SYSTEM SECURITY Sample Clauses

COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
AutoNDA by SimpleDocs
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the
COMPUTER STORAGE AND SYSTEM SECURITY. Investigator shall ensure that the computer or mobile devices used for EDC system (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer or mobile device or during Authorized User’s absence when the computer or mobile device is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer or mobile device unattended in that room.

Related to COMPUTER STORAGE AND SYSTEM SECURITY

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!