Proposed Validation Standard Vs-2: Computer-Related System Validation
Proposed Validation Standard Vs-2: Computer-Related System Validation
REVIEWERS
Robert W. Stotz, Ph.D. Jay H. King
Validation Technologies, Inc. LifeScan, a Johnson & Johnson Company
Introduction
T
his Preamble by the Institute of Validation Technology Standards Committee (IVT/SC) intro-
duces the second in a series of new proposed validation standards that are available to reviewers
of manuscripts intended for publication in the Journal of Validation Technology and the Journal of
GXP Compliance (formerly the Journal of cGMP Compliance). It will also be useful to practitioners
worldwide who develop, implement, validate, and maintain systems used to automate manufacturing
processes, or to otherwise influence the ultimate quality, safety, or efficacy of drug substances or drug
products. The focus of this proposed standard is the pharmaceutical industry.
Most pharmaceutical firms like to have lists of succinct, unambiguous, and specific rules about quality
assurance against which to audit. It is preferable for such rules to contain imperative verbs like “shall,”
“will,” and “must” rather than passive verbs like “should,” “may,” and “can” to avoid interpretive debates
with auditees. Standards usually satisfy this need, whereas guidance documents often do not. However, it is
also important for those who are to follow the rules to have access to some interpretive documents that
accompany and explain the rules. Thus, FDA provides a Preamble to each of its regulations. Similarly, the
IVT/SC plans to accompany each proposed validation standard with a Preamble like this one, to amplify the
rationale behind the rules contained.
As will be explained, many finalized and draft standards/guidelines covering validation of computer-relat-
ed systems have emerged in the past 20 years. Why is this proposed standard needed? The IVT/SC believes
VS-2 is needed and will be potentially useful for the following reasons. VS-2:
■ Is designed to be comprehensive, contemporary, and consistent in its technical content as well as in its
updating and optimization of the use and definition of key terms
■ Uniquely separates its succinct standards statements from preamble-type explanation and elaboration
about what those standards mean and how they were derived
■ Addresses all three GXP components (GMP, GLP, and GCP), rather than just one or two
■ Provides commonality of terms and principles with other IVT/SC proposed validation standards, pro-
moting a more cohesive understanding and approach to validation of all types
Already published was the Proposed Validation Standard VS-1: Non-Aseptic Pharmaceutical Processes.1
Preamble
When FDA’s GMPs were proposed in 1977, two of its chief architects, Bud Loftus and Ted Byers, lec-
tured that the GMPs were designed to reflect what the “better-managed” (not the “best-managed”) firms were
already doing. Their point was clear: FDA did not want its proposed regulations to demand practices that
were out of reach for most firms at that time. The IVT/SC has taken note of that successful experience and
will attempt to structure all its proposed validation standards to reflect practices that are reasonable, achiev-
able, and verifiable. Where cutting edge technology or practice comes to bear, the merits of such technolo-
gy or practice will be discussed in this accompanying Preamble, but not in the proposed validation standards.
Some Specific Points About the Proposed Computerized System Validation Standard
■ On the Subject of GXP
Just about every school of thought relative to validation includes the standard approach of Installation
Qualification (IQ), Operational Qualification (OQ), and Performance Qualification (PQ). This approach is pri-
marily pharmaceutical GMP-driven and is appropriate for process, cleaning, utility, and other types of valida-
tion, as well as computer system validation in a production setting where automated systems are used to con-
trol operating processes and are validated within the larger context of the entire automated system. In some
cases however, there may be difficulty in applying the IQ/OQ/PQ methodology to information systems in a
non-shop-floor environment, such as the pharmaceutical research arena. An additional complicating factor is
added to the computer validation process when these information systems are developed internally rather than
purchased, either as a whole or in part. Additionally, many commercial software packages require extensive
configuration. In an attempt to address the factor of internal development and configuration, some companies
have borrowed from the medical device arena by including a design qualification or Design Verification and
Review (DVR) in their computer system validation methodology.2 Lastly, since the use of information systems
is often not a part of repeatable production processes, the PQ portion of the standard methodology often does
not really fit. (This statement excludes such things as Programmable Logic Controllers (PLCs) and embedded
chips that are normally validated along with the equipment they control, and for which the IQ/OQ/PQ
approach is appropriate.)
The terms IQ, OQ, and PQ are used in this standard for consistency with other IVT proposed standards,
and also because these terms are the most widely used in Industry. It may be appropriate, however, to build
flexibility into the testing methodology and protocols that accommodate non-shop-floor information systems.
Although the basic principles of computer validation and associated activities apply across all regulatory
arenas, they are more firmly established within the GMP arena at present. Therefore, there is typically a slant
toward GMP with respect to guidance regarding the execution of these basic principles.
IEEE’s software standards present a comprehensive set of logically devised and ordered standards for
developing and maintaining software and systems via good quality engineering practices and adequate
checks and balances throughout the lifecycle.4 Prior to this lifecycle perspective, computer system validation
(as well as validation in general) was largely considered to be solely an exercise in testing the resulting soft-
ware or system. IEEE’s approach helped to advance the understanding that the process of actually develop-
ing the software and system must include good quality practices as well, otherwise testing would simply
reveal problems and initiate rework, resulting in a “patchwork quilt” of mended code and configuration.
Likewise, these good quality practices must continue into the maintenance phase of the system to ensure that
its stable state is retained, and that the system remains robust and maintainable. Thus, IEEE’s treatment of
software testing, quality, and validation, including use of the lifecycle approach, has contributed substantial-
ly to the development of subsequent CRSV guidelines and standards.
Figure 15 Figure 2
development process itself. When a supplier is producing hundreds or even thousands of the same version of a
configurable program annually, users no longer need, nor have the opportunity, to inspect each line of code.
Instead, the emphasis must be redirected to judging market performance and system functionality, including
reliability of all relevant configuration options. Audits of the software producer, when it is possible to conduct
such audits, now commonly involve ensuring that reliable software development practices, including change
controls, exist and are being followed.
Figure 3
CRSV V-Shaped Lifecycle (GAMP-2)
User Requirements
Specification Testing URS
During the same transition era, the need to, the practicality of, and the rationale for possessing a suppli-
er’s source code diminished. Having access to all original and customized source code remained vital to a
sound validation program; but even suggesting that Bill Gates should share his source code with customers
worldwide would earn only a chuckle.
In 1986, taking a leaf from IEEE, the Pharmaceutical Manufacturers Association (PMA) incorporated a
waterfall lifecycle to portray validation of computerized systems in its Validation Concepts for Computer
Systems Used in the Manufacture of Drug Products.6 Nine years later, the Parenteral Drug Association (PDA)
included an enhanced waterfall lifecycle in its Technical Report No. 18.7 In 1996, the GAMP Forum pub-
lished the GAMP Supplier Guide, Version 28 which added a V-shaped lifecycle to waterfall versions. The V-
shaped lifecycle adds the powerful feature of associating test plans directly with functional specifications as
those specifications are created (see Figure 2). The GAMP Guide for Validation of Automated Systems in
Pharmaceutical Manufacture, Version 3.0 9 appeared in 1998 offering an enhanced V-shaped lifecycle (see
Figure 3) plus a new X-shaped lifecycle (see Figure 4) that associates supplier activities with user activities
in the validation process.
All of the above guidelines originated by Industry have contributed significantly to understanding, by
pharmaceutical firms and by suppliers, of how to cope with validation requirements for systems that are
based on swiftly-evolving new technology. Although variations exist, all versions of the lifecycle modules
involve the same fundamentals and are compatible with each other.
Figure 4
X-Model (GAMP-3)
Ongoing Support
Response
Validation Planning Validation Reporting
Verify
System On-Site
Specification Testing
As-Built or
Configurations
Supplier OTS Build
OTS Functional
OTS On-Site Tests
Specification Verify
Figure 5
Computer-Related System Lifecycle Model
❶ Plan Validation
Activities
❷ Define Computer-
Related System
Requirements
❸ Select
Computerized
System Vendors
❹ Design
Computerized
System
❺ Construct
Computerized
System
❼ Qualify
Computerized
System
➑ Evaluate Computer-
Related System in
Its Operating
Environment
❶ Planning
The planning phase is the initial phase of a project. The need for a system is identified, and there must be
an understanding of the business case and processes that will be supported by the system. The scope of the
project, the risks involved, business benefits, alternate approaches, and current technologies are examined. A
high-level conceptual design of the proposed system is developed. The required resources for the project are
estimated in a work plan for the computer system/application initiative. The current experience and training
of all project team participants should be verified. The regulatory impact of the system must be understood,
and validation activities must be included in the planning phase for regulated systems. Key deliverables
yielded from the planning phase typically include a business case, project work plan, and project quality plan.
If the system is regulated, the system validation plan is typically started in this phase, but cannot be com-
pleted until system requirements are fully defined.
❷ Requirements Analysis
The requirements analysis phase encompasses both the functional requirements of the system from the
users’ perspective and the technical requirements from the developers and implementers’ perspective.
Functional requirements identify the expected capabilities of the system, capturing what the system will do
without defining how it will do it. Technical requirements identify the technical conditions necessary for
proper operation of the system. Key deliverables yielded from the requirements analysis phase typically
Figure 6
Design Phase of Lifecycle Model
Functional
Specifications
Computerized
System
Design Specification
Specifications
Equipment
Computer Specification
❹ Design System
Computerized Specification
System
Design Design Design
Hardware Software Equipment
include the functional requirements specification and the technical requirements specification. Failure to ade-
quately define the functional requirements at the beginning of a project is universally recognized as the most
frequent reason for failure involving computer system design and/or validation.
❸ Design
The intent of the design phase is to capture how the requirements will be met (see Figure 6). The func-
tional and technical requirements identified during the requirements analysis phase are translated so that
the proposed system can be described in terms of physical components, such as database tables and pro-
gram components (i.e, windows, buttons, etc.). All of the application prompts, events, constraints, and
actions are designed. All reports and business forms are designed. Program modules, messages, and inter-
faces are designed. In a client-server system, application partitioning is defined. The data requirements
identified in the requirements analysis phase are transformed into logical and physical structures to be
used by developers and database administrators, which include the database tables, views, and constraint
definitions. The physical database design includes creating indexes, laying out files, de-normalizing tables
(when applicable), and developing replication, as well as backup and recovery strategies. The physical
characteristics of the database are captured in the Data Definition Language (DDL) that is used to create
the physical structures. To accomplish this definition, the design document typically includes both text and
diagrams.
If a vendor-supplied application is chosen, detailed design documentation can be limited to aspects con-
structed or configured by the user firm, although the complete design documentation should be verified dur-
ing the supplier audit. Key deliverables yielded from the design phase typically include the detailed design
specification. Additionally, a draft of the technical operations manual for the system is often started during
this phase.
❹ Development
Construction of the software takes place in the development phase. All work units (modules, windows,
reports, etc.) are fully developed. Each piece of code created as part of the application is debugged so that pro-
cessing or logic errors, as well as invalid or inefficient designs, can be identified and corrected. Work units are
integrated, resulting in a fully functional application, which is then configured in an environment that is repre-
sentative of the target production environment. The key deliverable yielded from the development phase is the
application source code or supplier’s application code customized/configured with the user firm’s parameters.
❺ Testing
During the testing phase, verification is performed to ensure that the application flow, user and system
interfaces, controls, and error processing are technically correct and in alignment with functional require-
ments. Testing is documented via organized test protocols, and a final report of the test results is produced.
Testing documentation is signed and dated by the tester(s). Key deliverables yielded from the testing phase
typically include the executed technical/functional test protocols and a final report.
❻ Implementation
The implementation phase comprises the activities required to coordinate the controlled and successful
roll-out of the system into the production computing environment. Training takes place for technical support
personnel, as well as the users of the system. Service level agreements are established with technical infra-
structure personnel with respect to system availability, backup, and restoration, etc. Installation and data
migration/conversion plans are developed. The implementation takes place, and a post-implementation
review is conducted. Key deliverables yielded from the implementation phase typically include a production
version of the application code, implementation instructions, training materials and records, service level
agreements, system release authorization, and finalized user and operations manuals.
❼ Maintenance
The maintenance phase spans the duration of time between the initial production implementation and the
retirement of the system. The validated state of the system is preserved during this phase via use of good
change control and configuration management practice, as well as a robust problem reporting and resolution
process. A change history is maintained for the system and revalidation/requalification takes place when
required. Key deliverables yielded from the maintenance phase typically include the system change history
and associated documentation, problem logs, maintenance logs, security logs, and system logs.
➑ Retirement
The retirement phase addresses the retirement of a system from active use by the firm. When a system
is retired, consideration must be given to the application source code concerning how it will be phased out,
how data will be converted if applicable, how it will be stored, and how it will be available for retrieval if
required. Key deliverables yielded from the retirement phase typically include documentation covering the
storage requirements for application source code and data, the retrieval process to be followed, and any
hardware or other software dependencies, as well as the process by which the application will be removed
from operational status including any data conversion activity, along with a schedule of execution dates
and approval.
Figure 7
Customer-Supplier Relationship During Specification and Testing
Level
SPECIFICATIONS 1 TESTING
User Requirements User Testing of the Automated Performance Qualification
(Customer) URS (Customer)
Functional 2 System Acceptance Testing
(Customer and Supplier) Test Functional [OQ of Computer/PLC]
Hardware Design Specification (Customer and Supplier)
(Customer and Supplier) 3 Hardware Acceptance Testing
Software Design Test Hardware [IQ of Computer/PLC]
(Customer and Supplier) Specification (Customer and Supplier)
Software Module 4 Software Integration Testing
(Supplier) 5 (Supplier)
6 Software Module Testing
(Supplier)
Review and test
modules
Core Modules
(Supplier) UK PICSVF 1994
Conclusion
See Figure 7 for the details of the customer-supplier relationship during specification and testing. For a
computer-related system overview, see Figure 8. As with all of its proposed validation standards, the
Institute of Validation Technology invites questions and comments from our readers.
Figure 8
Computer-Related System Validation
Overview
❶ System Definition ❺ Results Evaluation Report
– Functional Requirements – Interpret
– Physical Specifications – Summarize
❷ Validation Project Plan – Report
– Approve Results
❸ Software Quality Assurance
– Assure Structural Integrity ❻ Maintenance – Change Control
– Assure Future Support – Periodic Review and Revalidation
– Security, Training, and Certification
❹ Qualifications
– Installation Qualification (IQ)
– Operational Qualification (OQ)
– Performance Qualification (PQ)
– (Functional Testing Full System)
References
1. Proposed Validation Standard VS-1: Non-Aseptic Pharmaceutical Processes. Journal of Validation Technology. Vol. 6, No. 2. pp. 502-
521. Feb. 2000.
2. Medical Devices: Current Good Manufacturing Practice (CGMP) Final Rule; Quality System Regulation. 1996.
3. Garwood, R. and Motise, P. FDA’s Guide to Inspection of Computerized Systems in Drug Processing. Reference Materials and training
aids for investigators. ( The Blue Book). Feb. 2000.
4. Institute of Electrical and Electronics Engineers. IEEE Standards Collection: Software Engineering. 1994 Edition.
5. Myers, G.J., Ed. “The Art of Software Testing.” John Wiley & Sons: New York. 1979.
6. Pharmaceutical Manufacturers Association. “Validation Concepts for Computer Systems Used in the Manufacture of Drug Products.”
Pharmaceutical Technology. Vol. 10(5). 1987. pp. 24-34.
7. Parenteral Drug Association. “Validation of Computer-Related Systems: Technical Report No. 18.” Journal of Pharmaceutical
Technology. Vol. 49(S1). S1-S17.
8. GAMP Forum. “Supplier Guide: Version 2.0.” May 1996.
9. International Society of Pharmaceutical Engineering. “GAMP Guide for Validation of Automated Systems in Pharmaceutical
Manufacture: Version 3.0.” Vols. 1-2. March 1998.
10. FDA. Guidance for Industry: General Principles of Software Validation. Draft Guidance Version 1.1. June 9, 1997.
Suggested Reading
• TickIT. A Guide to Software Quality Management System (Using 9001:1994) – The TickIT Guide. ISBN 0-580, Issue 3.0, 1994.
• Parenteral Drug Association. “Validation of Computer-Related Systems: Technical Report #18.” PDAJournal of Pharmaceutical Science
and Technology. 49 (S1), S1-S17.
• International Society for Pharmaceutical Engineering. GAMP Guide for Validation of Automated Systems in Pharmaceutical Manufacture.
1 (1) User Guide. Mar. 1998.
• International Society for Pharmaceutical Engineering. GAMP Guide for Validation of Automated Systems in Pharmaceutical Manufacture.
1 (2) Supplier Guide. Mar. 1998.
• International Society for Pharmaceutical Engineering. GAMP Guide for Validation of Automated Systems in Pharmaceutical Manufacture.
Vol. 2. Best Practice for Users and Suppliers. Mar. 1998.
• Parenteral Drug Association. “Validation and Qualification of Computerized Laboratory Data Acquisition Systems, Technical Report
#31.” PDA Journal of Pharmaceutical Science and Technology. 53 (4).
T
he following proposed standard is intended to reflect desirable contemporary practices, are not bind-
ing in any way, and can be modified to suit a firm’s specific needs. The proposed standard incorporates
imperative verbs (e.g., shall, will, must) to provide users with unambiguous quality assurance auditing
tools, and are prefaced by a Preamble that provides rationale for several of the more complex concepts. The
proposed standard is also directed toward users that may, or may not, be part of a larger corporation.
Terms that are bold and asterisked (*) the first time they are used are defined in Section IV – Glossary.
I. POLICY STATEMENTS
POL 2.1
Every Computerized System* with functions that can directly or indirectly affect product quality or
cause product misshipments is to be identified as a New System* or Legacy System* and Validated*.
Throughout these proposed validation standards, all references to computerized systems apply to such
systems and include Computer-Related Systems*.
POL 2.2
One or more Computerized System Validation Team (CSVT) members shall be available to each site hav-
ing one or more computerized system. The team shall define and direct validation-related Computerized
System Validation (CSV) activities, have an identified team leader, and include Qualified* representa-
tion from at least each of the following groups:
POL 2.3
Responsibilities of the CSVT leader shall include ensuring that all outside consultants, hardware and soft-
ware Suppliers,* and system integrators understand their responsibilities and provide documented cre-
dentials that are Verified.*
POL 2.4
A System-Specific Validation Master Plan – (VMP)* is to be developed for each CSV project that
describes, defines, or refers to documents that describe or define at least the following:
POL 2.5
Validation documents must all be approved by the quality authority and by an authorized representative
from the business function (eg., Production) that the validated system will support.
POL 2.6
There shall be written instructions (e.g., SOPs and/or policies) for computer and computer-related sys-
tems that are designed to:
POL 2.7
Revalidation* procedures are to be established that: (1) include, as part of ongoing change control mea-
sures, assessments to determine when revalidation is required and (2) provide for documented annual
reviews of each computerized system to further ensure that revalidation is conducted when required.
■ System definition
■ Corporate/enterprise-level master validation plan
■ System-specific validation master plan
■ Functional requirements
■ User requirements
■ Computerized system design specifications
■ Hardware design specifications
■ Software design specifications
■ Installation qualification
■ Operational qualification
III. ACRONYMS
API Active Pharmaceutical Ingredient
BPC Bulk Pharmaceutical Chemical
COTS Commercial-Off-The-Shelf
CRSV Computer-Related System Validation
CSV Computer System Validation
CSVT Computer System Validation Team
IT Information Technology
OQ Operational Qualification
PQ Performance Qualification
SLC System Lifecycle
SOP Standard Operating Procedure
VMP Validation Master Plan (system-specific)
IQ Installation Qualification
IV. Glossary
Reference
Standard
Number
POL 2.1 Computerized System – a computer system plus the controlled function that it operates or
controls.
POL 2.1 Computer-Related System – one or more computerized system and the relevant operating
environment.
POL 2.4 Functional Requirements – statements that describe the functions a computer-related system
must be capable of performing (also referred to as User Requirements).
POL 2.4 Functional Specifications – statements of how the computerized system, including its soft-
ware, will satisfy functional requirements of the computerized system.
POL 2.4 Installation Qualification (IQ) – documented verification that the equipment, system, or
subsystem has been properly installed and adheres to applicable codes and approved design
intentions: and that supplier recommendations have been suitably addressed.
POL-2.1 Legacy System – (as applied to Computerized Systems) a computerized system installed and
successfully operated prior to a specific date identified by the firm.
POL-2.1 New System – (as applied to Computerized Systems) a computerized system installed on or
after a specific date identified by the firm (see Legacy System).
POL-2.4 Operational Qualification (OQ) – documented verification that the equipment, system, or
subsystem performs as specified throughout representative or anticipated operating ranges.
(Note: Overlap between IQ and OQ often occurs and is considered allowable.)
POL-2.6 Performance Qualification (PQ) – documented evidence that the defined process or system
functions as intended and produces intended results under normal operating conditions at
simulated or actual commercial scale.
POL-2.2 Qualified – (when applied to a person) sufficiently trained in procedures and skills with doc-
umented evidence of competence to perform assigned tasks.
POL-2.2 Quality Authority – one or more persons who, collectively, have formal responsibilities for
specified quality-related operations, such as approval of manufacturing materials, release of fin-
ished products for sale, review and approval of documents, adjudication of quality assurance
investigations, and review of certain records. Titles of Quality Authority principals vary through-
out the world; for example, in the United States, the term “the q.c. unit” is all-embracing; in the
EU and Canada, the head of Quality Control has some of the responsibilities, while a Qualified
Person has others; terms such as Responsible Head (or Person) and Quality Assurance (and/or
Control) Department are also used in other areas.
POL-2.7 Revalidation – repetition of the validation process or a specific portion of it, including total
process/system review, and/or requalification of those portions of the automated process/sys-
tem potentially affected by a change.
POL-2.3 Supplier – a merchant firm that manufactures or sells materials. For the purpose of the sup-
plier approval process, each supplier site that produces the material of interest requires sepa-
rate approval.
POL-2.1 Validated – the establishment of documented evidence, which provides a high degree of
assurance, that a specific process will consistently produce a product meeting its predeter-
mined specifications and quality characteristics.
POL-2.3 Verified – confirmed or authenticated by human review and inspection or by direct observa-
tion (dual witnessing). Human verification is not required when automated systems are pro-
vided and validated that achieve the verification function.
V. REGULATORY EXCERPTS
Regulatory
Reference
AUS Where a computer is used in connection with any procedure or process associated with the produc-
900 tion of therapeutic goods, the computer system…should meet the requirements of this Code for those
manual functions which it replaces.
AUS The development, implementation, and operation of a computer system should be carefully docu-
903 mented…and each step proven to achieve its written objective…
AUS Software development should follow the principles of Australian Standard AS 3563: Software
903 Quality Management System…
AUS A control document should be prepared specifying the objectives of a proposed computer system, the
905 data to be entered and stored, the flow of data, the information to be produced, the limits of any vari-
ables and the operating…and test programs…
AUS Any change to an existing computer system should be made in accordance with a defined change con-
907 trol procedure which should document the details of each change made, its purpose, and its date of
effect, and should provide for a check to confirm that the change has been applied correctly.
AUS Where development has progressed to a point, where the system cannot readily be assessed by read-
908 ing the control, and development documents together, a new control document…should be prepared
AUS Data collected directly from manufacturing or monitoring equipment should be checked by verifying
908 circuits or software to confirm that it has been accurately and reliably transferred.
AUS Similarly, data or control signals transmitted from a computer to equipment involved in the manu-
909 facturing process should be checked to ensure accuracy and reliability.
AUS The entry of critical data...by an authorized person…should require independent verification and
910 release for use by a second authorised person.
AUS The recovery procedure to be followed in the event of a system breakdown should be defined in writ-
913 ing…
AUS The computer system should be able to provide printed copies of relevant data and information...
914
AUS Records should be available for the following aspects of a computer system validation:
917
■ Protocol for validation
■ General description of the system, the components, and the operating characteristics
■ Diagrams of hardware layout/interaction
■ List of programs with a brief description of each
■ System logic diagrams or other schematic form for software packages
■ Current configuration for hardware and software
■ Review of historical logs of hardware and software for development, start-up, and normal
run periods
■ Records of evaluation data to demonstrate system does as intended (verification stage and
ongoing monitoring)
■ Range of limits for operating variables
■ Details of formal change control procedure
■ Records of operator training
■ Details of access security levels/controls
■ Procedure for ongoing evaluation
CAN C.02.005
C.02.005 [E]quipment...shall be...maintained...in a manner that...permits it to function in accordance with
[i 5.4] its intended use.
INTERPRETATION
5.4 [C]omputerized systems...are routinely calibrated, inspected, or checked according to
a written program designed to assure proper performance...
CAN C.02.004
C.02.004 [P]remises…shall be designed, constructed and maintained in a manner that...permits the opera-
[i 10] tions therein to be performed under…orderly conditions…
INTERPRETATION
10 Where necessary, separate rooms are provided to protect analytical instruments and
associated control systems from vibration, electrical interference, and contact with
excessive moisture or other external factors.
EC 4.26. There should be written procedures…for…validation…
4.26
EC 4.9 Data may be recorded by electronic data processing systems, photographic, or other reliable
4.9 means, but detailed procedures relating to the system in use should be available, and the accura-
cy of the records should be checked. If documentation is handled by electronic data processing
methods, only authorized persons should be able to enter or modify data in the computer, and
there should be a record of changes and deletions; access should be restricted by passwords or
other means, and the result of entry of critical data should be independently checked. Batch
records electronically stored should be protected by backup transfer on magnetic tape, microfilm,
paper, or other means. It is particularly important that the data are readily available throughout
the period of retention.
ECAx11 [E]quipment [should be sited]…where extraneous factors cannot interface with the system.
Ax11-3
ECAx11 A written detailed description of the system should…[include] principles, objectives, security
Ax11-4 measures… scope[,]…main features…and how it interacts with other systems and procedures.
ECAx11 …The…software should [be] produced in accordance with a system of Quality Assurance.
Ax11-5
ECAx11 The system should include…built-in checks of… correct entry and processing of data.
Ax11-6
ECAx11 Before a system using a computer is…use[d], it should be…tested and confirmed as…achieving
Ax11-7 the desired results. If a manual system is being replaced, the two should be run in parallel for a
time, as a part of this testing and validation.
ECAx11 Data should only be entered or amended by [authorized persons]. [M]ethods of deterring unau-
Ax11-8 thorized entry of data include the use of keys, pass cards, personal codes and restricted access to
computer terminals. There should be a defined procedure for the issue, cancellation, and alter-
ation of authorization to enter and amend data, including the changing of personal passwords.
Consideration should be given to systems allowing for recording of attempts to access by unau-
thorized persons.
ECAx11 When critical data are...entered manually...there should be an additional check [of] accuracy
Ax11-9 [which] may be...by a second operator or ...validated electronic means.
ECAx11 Alterations to a system or to a computer program should only be made in accordance with a
Ax11-11 defined procedure which should include provision for validating, checking, approval, and imple-
menting the change. Such an alteration should only be implemented with the agreement of the
person responsible for the part of the system concerned, and the alteration should be recorded.
Every significant modification should be validated.
ECAx11 [I]t should be possible to obtain clear printed copies of electronically stored data.
Ax11-12
ECAx11 Data should be secured by physical or electronic means against willful or accidental damage, in
Ax11-13 accordance with Item 4.9. of the Guide. Stored data should be checked for accessibility, durability,
and accuracy. If changes are proposed to the computer equipment or its programs, the above men-
tioned checks should be performed at a frequency appropriate to the storage medium being used
ECAx11 Data should be protected by backing-up at regular intervals. Back-up data should be stored… at
Ax11-14 a separate[,] secure location.
ECAx11 There should be…adequate alternative (arrangements) for systems…in the event of a breakdown.
Ax11-15 The time required to bring [them] into use should be related to the…urgency of the need to use
them…
ECAx11 [P]rocedures to be followed if the system fails or breaks down should be defined and validated.
Ax11-16 [F]ailures and remedial action taken should be recorded.
ECAx11 A procedure should be established to record and analyze errors and [effect] corrective action…
Ax11-17
ECAx11 When outside agencies are used to provide a computer service, there should be a formal agree-
Ax11-18 ment including a clear statement of… responsibilities…
ECAx11 When the release of batches…[uses a] computerized system, the system should allow… only a
Ax11-19 Qualified Person to release the batches and… should clearly identify and record the person
releasing the batches.
US
211.68(b) § 211.68 Automatic, mechanical, and electronic equipment
(b) Appropriate controls shall be exercised over computer or related systems to assure that
changes in master production and control records or other records are instituted only by autho-
rized personnel. Input to and output from the computer or related system of formulas or other
records or data shall be checked for accuracy. A backup file of data entered into the computer or
related system shall be maintained except where certain data, such as calculations performed in
connection with laboratory analysis, are eliminated by computerization or other automated
processes. In such instances, a written record of the program shall be maintained along with
appropriate validation data. Hard copy or alternative systems, such as duplicates, tapes, or micro-
film, designed to assure that backup data are exact and complete and that it is secure from alter-
ation, inadvertent erasures, or loss shall be maintained.
(a) Validation of systems to ensure accuracy, reliability, consistent intended performance, and the
ability to discern invalid or altered records.
WHO Data may be recorded by electronic data-processing systems, photographic, or other reliable
14.9 means. Master formulae and detailed standard operating procedures relating to the system in use
should be available, and the accuracy of the records should be checked. If documentation is han-
dled by electronic data-processing methods, only authorized persons should be able to enter or
modify data in the computer, and there should be a record of changes and deletions; access
should be restricted by passwords or other means and the entry of critical data should be inde-
pendently checked. Batch records electronically stored should be protected by backup transfer on
magnetic tape, microfilm, paper print-outs, or other means. It is particularly important that, dur-
ing the period of retention, the data is readily available.