Common use of Encryption Technology Clause in Contracts

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6

Appears in 2 contracts

Samples: Clinical Trial Agreement, Clinical Trial Agreement

AutoNDA by SimpleDocs

Encryption Technology. Institution Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6at

Appears in 1 contract

Samples: Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6is

Appears in 1 contract

Samples: Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6at

Appears in 1 contract

Samples: Clinical Trial Agreement

AutoNDA by SimpleDocs

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.67.6

Appears in 1 contract

Samples: Master Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- patent-relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at xxxx://xxxxxx.xxxxxxxxxx-xxxxxxxxx.xxx free of charge). 5.6.

Appears in 1 contract

Samples: Clinical Trial Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!