Computer System Validation Whitepaper
Computer System Validation Whitepaper
Confirmation of conformity to user needs (“intended use”) Organizations can enlist third parties to design and perform
is obtained by comparing actual system performance to system validation, but responsibility for the validation,
predetermined requirements. This is accomplished by compliance, and maintenance of a compliant validated state
executing test procedures and collecting objective evidence cannot be delegated and remains with the system owner.
(computer-screen captures, printed reports, data files, etc.) to
demonstrate that validation activities were properly planned, and
that the tests were executed according to the plan.
Change control The 3500 Series Data Collection Software System provides
Validation efforts for an instrument should encompass the entire command-line interface (CLI) utilities that allow automation or
system lifecycle, from inception to retirement. Yet, change is semi-automation of certain tasks. These utilities can be used to
inherent in any computerized system. As new requirements customize the application. Custom software (GAMP 5 category 5)
are identified, errors are found, and procedures are revised, requires an even greater validation effort.
changes to the system could become necessary. It is essential
to carefully control any changes to a validated system through
documentation, analysis, and testing. Furthermore, since
changes to one subsystem might affect other, seemingly
unrelated parts of the system could present risk. A change
analysis should be performed including risk assessment of
impacts to the entire system. It is not adequate to test only the
change; testing should also include any potentially impacted
functionality. The most important tool for maintaining a system
in its validated state is the change control procedure. Typically,
changes would be requested in writing via a change request.
These should be analyzed and approved by the technical
personnel and key stakeholders involved. In addition, the risk
assessment for the system may need to be updated. Finally,
change requests should be approved by the quality assurance
unit and the system owner or equivalent, and the change
Risk management
are now based on configurable packages that utilize computer
networks (Figure 1). Therefore, it recommends that software
validation testing should focus on the specific configuration
of the software program rather than on its core operational
Specify Verify
characteristics, especially when the system supplier can
demonstrate that its core operational functionality was tested [9].
Because of these revisions, supplier audit programs have more
importance in the GAMP 5 guide; increasingly, system-supplier
certificates are accepted in lieu of actual supplier audits.
Configure
Important validation documents
The validation documentation set contains documents 01 through
08, 10, and 12 described in Table 1. We provide documents 09 Figure 1. GAMP 5 validation lifecycle [1]. Because the GAMP 5 guide
recognizes that most systems are configurable software, it suggests a
and 11 for CSV of the applicable instrument software. Table 1
simplified “V” validation lifecycle as shown here.
also includes a mapping of these documents to the GAMP 5
validation lifecycle.
Table 1. Software validation document descriptions and their relation to the GAMP 5 validation lifecycle.
09. 21 CFR Part 11 Configure and verify US FDA 21 CFR Part 11 provides guidance to industry on the
security, reliability, and integrity of laboratory data as it relates
to use of electronic records and electronic signatures. When
software developed with essential 21 CFR Part 11 features are
configured correctly and SOPs are in place, this assists with
laboratory compliance.
The Part 11 Assessment (Table 2) contains a checklist that assists
with compliance through system functionality and procedural
control.
10. T
raceability matrix Plan, verify, and report The TM makes it possible to confirm that each identified testable
(TM) user requirement has been executed and documented in
accordance with the validation plan.
11. Q
uality assurance Verify and report QAU review is essential to the success of the validation project. A
unit (QAU) review customer’s quality department’s engagement in the development,
review, and approvals of the validation steps and documentation
determines the effectiveness of validation for use of applicable
features and functions in the defined environment.
12. V
alidation summary Report The VSR contains an executive summary of results for the
report (VSR) software validation. The executive summary includes high-level
plan execution and decision recommendations for pass, fail, and
exceptions noted.
The VSR is often the starting point for regulatory auditors.
System Defined in the System Configuration Specification • Changes to the “V” validation lifecycle using
risk management
CMPY-SCS-01
• Simplified document approval process
IQ The 3500 Series Data Collection Software System
Installation Qualification created by the Team in accordance In addition to regulatory compliance, the processes and business
with the Software Validation Plan CMPY-SVP-01 objectives of the organization could be enhanced by proper
validation, and much of the overall risk to a business and its
Figure 2. Example of a typical introduction section in the document processes could be mitigated.
set of the 3500 Series Data Collection Software System.
There should be two sets of IQ/OQ/PQ protocols, one for the first
Table 2. Recommendations on how the 3500 Series Data Collection Software System can be implemented to
support compliance with FDA 21 CFR Part 11.
21 CFR Part 11
section reference 21 CFR Part 11 requirement Technical and procedural controls
§ 11.10 Controls for Closed Systems
Persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to
ensure the authenticity, integrity, and when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily
repudiate the signed record as not genuine. Such procedures and controls shall include:
11.10(a) • Validation of the system to ensure accuracy, This is demonstrated through the entire process of validation
reliability, and consistent intended performance including IQ, OQ, and PQ testing.
The 3500 Series Data Collection Software System
• Validation of the system with the ability to discern programmatically prevents alteration of records outside the
invalid or altered records system. The data are not accessible. In addition, security,
audit trails, and electronic signature functionality prevent the
unauthorized alteration of records from within the application.
Each file has a checksum built in, and if the file is changed outside
the application, it will fail to open the file and inform the user that
the file has been modified outside the application.
11.10(b) The ability to generate accurate and complete copies When configured correctly, reporting functionality can satisfy this
of records in both human readable and electronic form requirement.
suitable for inspection, review, and copying by agency.
11.10(c) Protection of records to enable their accurate and This can be satisfied through customer SOPs for record backup
ready retrieval throughout the records retention period. and data archiving.
11.10(d) System access limited to authorized individuals. The software includes user authentication and access permission
functionality that could be configured to limit system access.
11.10(e) Audit trails shall be used that: The 3500 Series Data Collection Software System includes this
• Are secure, computer generated, and time stamped audit trail functionality.
This could be satisfied through customer SOPs for record backup
• Independently record the date and time of operator and data archiving. Audit trail information is stored by the software
entries and actions that: in the same manner as actual data.
– Create electronic records
• Alter a record