COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
Appears in 4 contracts
Samples: Clinical Trial Agreement, Individual Clinical Trial Agreement, Individual Clinical Trial Agreement
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution Provider or supplied by the SponsorSponsor ) are protected against unauthorized use, in particular by ensuring the practice of:
(i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and and
(ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.User
Appears in 1 contract
Samples: Clinical Trial Agreement
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of:
(i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
Appears in 1 contract
Samples: Clinical Trial Agreement
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of:
(i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and and
(ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
Appears in 1 contract
Samples: Clinical Trial Agreement