Computerized System Validation : Understanding basics

AnandPandya7 2,134 views 24 slides Oct 27, 2018
Slide 1
Slide 1 of 24
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24

About This Presentation

Basics terminologies constantly used in computerized system validation . This is an initiative for all those IT, QA, facility managements


Slide Content

Computerized System Validation Understanding Basics in GXP Environment Level -01 Mail : [email protected] Phone : +91 8000656594

What is a Computerized System ? A computerized system is a function integrated with a computer system . Generation, measurement, calculation, assessment, transfer, processing, storage or archiving of data Intended for regulatory submission or to support regulatory decisions .

Why validate Computerized System ? ISO 13485 ; Clause 7.5.2.1 “validation of the application of computer software for service provision shall conform to specified requirements” ISO 17025 ; Clause 7.11.2 “The laboratory information management system(s) ……………… shall be validated for functionality …….. by the laboratory before introduction

Why validate Computerized System ? (contd..) OECD No.1 GLP : “ ensure that computerized systems used in the study have been validated” ICH E6(R2), GCP : “ A process of establishing and documenting that the specified requirements of a computerized system ……… of the system or transition to a new system. ICH Q7 (R2), GMP- related computerized systems should be validated. A NEED FOR EVERY REGULATED SYSTEM …!!!

Lets understand the responsibilities …!!!

Responsibilities IT Personnel : purchase, installation and maintenance of a computerized system. Supplier : Third parties, vendors, internal IT departments, service providers including hosted service providers . User : The personnel operating the computerized system. System Owner / IT Owner : The individual who is responsible for the availability, support and maintenance of a system and for the security of the data residing on that system. The System Owner acts on behalf of the management.

Responsibilities Validation Director : A delegated person responsible for a validation project. Facility Management person(s) who has the authority and formal responsibility for the organization and functioning of the test facility according to these Principles of Good Laboratory Practice. Quality Assurance (QA) has to review the validation documentation and inspect the validation activities for regulatory compliance. Personnel are responsible for performing activities with computerized systems in accordance with the GLP Principles and recognized technical standards

Understand This Picture …!!!!

Don’t Accept because it’s a definition Acceptance Criteria : The documented criteria that should be met to successfully complete a test phase or to meet delivery requirements. Acceptance testing Formal testing of a computerized system in its anticipated operating environment to determine whether all acceptance criteria of the test facility have been met .

Learning responsibilities ..!! Authorization concept : A formal procedure to define and control access rights to and privileges in a computerized system. Back-up Provision made as a part of contingency plan for the recovery of data files or software or to restart processing, or for the use of alternative computer equipment.

Change is a part of CSV…!!!! Change Control: Evaluation and documentation to determine whether a validation process is necessary following any changes to the computerized system. Change Management : Change management is the process for the life cycle of changes.

Cyber- Configuration Configuration: A configuration is an arrangement of functional units and pertains to the choice of hardware, software and documentation that affects function and performance of the system.

Correction is better, Prevention is Best Corrective and Preventive Actions (CAPA) The concept of corrective and preventive actions focuses on the systematic investigation of the root causes of identified problems or risks in an attempt to prevent their recurrence or to prevent occurrence.

Does Data migrate …????? Data migration Data migration is the activity of transporting electronic data from one system (computer) to another, transferring data between storage media or simply the transition of data from one state to another

Data Migration

Understand the Equivalents Data approval Data approval means locking data after collection and verification and e.g. transformation to make data suitable for use in records. Data capture Data capture are actions that typically take place to plan, collect, and verify data .

e-definitions Electronic record Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form. Electronic Signature An electronic measure that can be substituted for a handwritten signature or initials for the purpose of signifying approval, authorization or verification of specific data entries.

Best Solution is Hybridisation Hybrid system : Co-existence of paper and electronic record and signature components.

Life-Cycle Of a Robot…!!!!!! Life cycle : An approach to computerized system development that begins with identification of the user’s requirements, continues through design, integration, qualification, user validation, control and maintenance, and ends when use of the system is retired. Life cycle model : A life cycle model describes the phases or activities of a project from conception until the product is retired.

Not Reading, itself is a Risk Risk: Combination of the probability of occurrence of harm and the severity of that harm. Risk analysis: Estimation of the risk associated with the identified hazards. Risk assessment : Risk assessment consists of the identification of hazards and the analysis and evaluation of risks associated with exposure to those hazards .

Understanding leads to Low Risks

Security & Software Security: The protection of computer hardware and software from accidental or malicious access, use, modification, destruction or disclosure. Software A programme acquired for or developed, adapted or tailored to the facility requirements for the purpose of controlling processes, data collection, data manipulation, data reporting and/or archiving.

Human Error vs. Data Security

DISCLAIMER Views Expressed and errors , if any are attributable to author. If you rely on the above views without a personalize opinion or study and if you have benefits you are free to keep it for yourself without any ACKNOWLEDGEMENT !!!! It is a nutshell presentation for training and understanding purpose only . For training session please mail at [email protected] or contact +91 8000656594 Thank You ..!!!