COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.
Appears in 4 contracts
Samples: Clinical Trial Agreement, Trial Agreement, Recitals Whereas
COMPUTER STORAGE AND SYSTEM SECURITY. 3.1. Investigator shall ensure that the computer systems used for RDC (whether owned by Institution or supplied by the Sponsor) are protected against unauthorized use, in particular by ensuring the practice of: (i) logging off when not using the computer system or during Authorized User’s absence when the computer system is left unattended; and (ii) locking up the room when data entry is interrupted and the Authorized User has to leave the computer system unattended in that room. 3.:
Appears in 1 contract
Samples: Clinical Trial Agreement