Computer System Validation (CSV) Presentation
Computer System Validation (CSV) Presentation
Validation (CSV)
Guidelines &
Documents
Table of Content
1. Introduction to Computer System Validation
(CSV)
2. Why Do We Require Validation?
3. What Should We Validate?
4. Regulatory Overview for CSV
5. Key Phases of Computer System Validation
6. Essential CSV Documentation
7. Approach to CSV
8. Best Practices for Good Documentation
Introduction to Computer System
Validation (CSV)
Purpose of Validation is to
• Generating Documentary evidence
• Compliance of requirements
• Provide high degree of assurance accordance with expected results
A L C O A
COMPLETE CONSISTENT
Data must be complete without any Data should be in Sequential manual
deletion, manipulation with sign & date and follow GDP
TRACEABLE
Easy to traceable any type of
data
AVAILABLE ENDURING
Available for review at any time Make Sure Records for the entire
period
GAMP
Good Automated Manufacturing Practices (GAMP) Published by International Society of Pharmaceutical
Engineering (ISPE)
Evolution of GAMP
GAMP 5 (2008):
It is a risk-based
GAMP 4 (2008): approach for the
Focused on IT implementation,
systems, including operation, and
GAMP 3 (2001): integrated systems and validation of GxP
Introduced a risk- databases. It promoted Computer Systems in
based approach to integrating validation regulated industries –
validation, categorized with software including the Life
systems by development life Sciences.
GAMP 2 (1995): complexity, and cycles and
strengthened risk GAMP 5 2nd
Expanded on emphasized system
management Edition, published in
GAMP 1, providing lifecycle management
practices. July 2022
more detailed and documented
guidance on the evidence of system
GAMP 1 (1991) validation of performance.
Introduced the need for automation and
systematic validation of control systems,
software and hardware and introduced the
in pharmaceutical concept of
manufacturing, laying computerized
the foundation for systems
GAMP principles. validation.
GAMP 5
GAMP categories classify computerized systems by complexity, allowing validation efforts to focus on
the highest-risk areas.
The more complex a system is, the greater its risks will be. These risks primarily involve data integrity,
product quality, and patient safety.
Software Categories
These applications
Default Configuration can are customized to
Operating System configuration can be be done to meet the meet specific needs
used user specific needs of regulated
company
Firmware, TLC,
Windows, Database LIMS, SCADA, Custom Build
Empower, Lab
Manager, Linux DCS Amazon, Flipkart
Solution
Hardware Categories
Hardware
Category 2
Category 1
Custom Build Hardware
Standard Hardware Components
Components
ANY QUESTION