Common use of Encryption Technology Clause in Contracts

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6

Appears in 2 contracts

Sources: Clinical Trial Agreement, Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.67.6

Appears in 1 contract

Sources: Master Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6at

Appears in 1 contract

Sources: Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- patent-relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6.

Appears in 1 contract

Sources: Clinical Trial Agreement

Encryption Technology. Institution Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6at

Appears in 1 contract

Sources: Clinical Trial Agreement

Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6is

Appears in 1 contract

Sources: Clinical Trial Agreement