Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6
Appears in 2 contracts
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.67.6
Appears in 1 contract
Sources: Master Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6at
Appears in 1 contract
Sources: Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- patent-relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6.
Appears in 1 contract
Sources: Clinical Trial Agreement
Encryption Technology. Institution Provider and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6at
Appears in 1 contract
Sources: Clinical Trial Agreement
Encryption Technology. Institution and Investigator undertake to protect Sponsor Confidential Information (including but not limited to patent- relevant, scientific or technical information) against unauthorized access by third parties. If Sponsor Confidential Information is communicated via Internet Mail, use of Internet Mail Encryption Technology is compulsory (for direct communication between the Parties, Sponsor provides for a suitable technology at ▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇ free of charge). 5.6is
Appears in 1 contract
Sources: Clinical Trial Agreement