Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6
Appears in 2 contracts
Encryption Technology. Institution Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6at
Appears in 1 contract
Samples: Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6is
Appears in 1 contract
Samples: Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6at
Appears in 1 contract
Samples: Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.67.6
Appears in 1 contract
Samples: Master Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- patent-relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6.
Appears in 1 contract
Samples: Clinical Trial Agreement