How do we demonstrate that a device does not have restricted data, especially if it is stolen?
Related Questions
- How will our research nurse coordinator demonstrate that the data he/she enters on forms 2, 3 or 4 has been verified by the appropriate local investigator?
- How will our research nurse coordinator demonstrate that the data he/she enters on forms 2, 3 or 4 has been verified by the appropriate local investigator?
- How do we demonstrate that a device does not have restricted data, especially if it is stolen?
- Will PreMIS collect and incorporate medical device data?
- Will PreMIS collect and incorporate medical device data?
- What type of device can I use to back up BlueSmart data?