SlideShare a Scribd company logo
1 of 28
Download to read offline
Apply Risk Management for Computerized and Automated Systems

                            IVT
 11th Annual Change Control & 3rd Annual Risk Management
                     January, 2013


 Presented By:




                                                         1
Agenda

I.
I Terms & Definitions - Q9 Quality Risk
   Management
II. GxP Assessment
III. Risk Identification and Prioritization
IV. Risk Based Test Planning
                           g
V. Periodic Reviews of Risks
VI. Interactive Exercise




                                              2
Agenda

Terms & Definitions - Q9 Quality Risk Management
ICH Q9 “Quality Risk Management”
GAMP 5
GxP Assessment
  Procedure
  Form
  21 CFR Part 11 relevance
Risk Identification and Prioritization
  Severity
  Probability
  Risk Class
  Detectability
  Risk Priority
Risk based Test Planning
  Examples
Periodic Reviews of Risks
  Maintaining appropriate risk levels.
Interactive Exercise
Using a real life example, participants study Life Cycle Risk Management
                                                                           3
Typical Risk Assessment Points throughout
System’s Life Cycle




                                            4
Terms & Definitions - Q9 Quality Risk Management


Risk Identification – What can go wrong?
Risk Evaluation – Severity, Occurrence, Delectability
Risk Analysis – Quantitative (1 -5)
              Qualitative (High – Low)
Risk Control – Reduction Acceptance
               Reduction,
Risk Communication/Review




                                                        5
GAMP Approach


Understand the process
Understand the product and data
Quality Management System
Scalable Life Science Activities
Science Based Quality Risk Management
Supplier Involvement




                                        6
7
GxP Assessment

GxP -- The collective requirements for p
                        q              processes, p
                                                , personnel, materials
                                                            ,
and equipment used in the manufacture and distribution of foods, drugs
and medical devices as defined in 21 CFR for Good Manufacturing
Practices (cGxP), Good Clinical Practices (GCP), Good Laboratory
Practices (GLP) and Good Distribution Practices (GDP) GxP may also
                                                (GDP).
include practices and procedures considered to be “industry standards”.


This procedure describes how computerized applications and
systems are assessed for GxP – relevance and 21 CFR
compliance.




                                                                          8
GxP Assessment

GxP Assessment Questions
Does the application control or monitor machinery or instrumentation used in the
manufacture of product? This includes critical support systems for steam,
compressed air, water for injection, and clean room air.
Is th
I the application used t d
           li ti       d to document or calculate product, production process, or
                                    t     l l t      d t      d ti
material quality information? This includes defect count, defect types, inspection
results, and QC sample information.
Is the application used to document or track which materials were used in
        pp
manufacture or testing of a product or in-process material?
Is the application used to document or calculate the results for a procedure
defined on a material specification?
Does th application schedule or t k th calibration or maintenance hi t
D     the    li ti     h d l    track the lib ti        i t       history of
                                                                           f
items used in product manufacture or testing?
Does the application track or control the issuance of GxP-related documents?
Examples: NLR issuance, p
     p                     procedure issuance.


                                                                                     9
GxP Assessment

GxP Assessment Questions
Does the application provide the original record of an activity required by GxPs?
Examples: GxP training, complaint investigations, procedurally required quality
trending reports.
Is th
I the application used t support th acceptability of products, materials, or
         li ti       d to      t the     t bilit f      d t      t i l
processes?
Does the application support (store e-records, perform calculations) a system or
p
process validation?
Does the application support issuance or distribution of product labeling,
marketing literature, directions for use, or other similar controlled product
literature?
Electronic Record Assessment
El t    i R     dA         t
Does the application retain a record on durable electronic media (i.e., disk, tape,
CD, network or other non-transient media)?
Does the application create, modify, store, archive, or transmit a GxP record?
                     create modify store archive


                                                                                      10
GxP Assessment

Electronic Signature Assessment
             g
Are signatures, initials, or other operator identification required for the operations
documented by this application?
Are decisions made on the information documented by this application prior to
operators signing any h d
     t     i i        hard-copy d
                                documents?
                                        t ?


Section E: GAMP-5 Category Assignment
1I f t t
 Infrastructure Software
                S ft
3* Non-Configured
4 Configured
5C
 Custom

*Category 2, from GAMP 4, was eliminated in the GAMP 5 revision



                                                                                         11
GxP Assessment

Assessment Conclusions

 The application is determined to be GxP-related. Validation and controls
 appropriate for     GxP-related applications apply.
 The application is determined NOT to be GxP-related. No additional controls
 are required by GxP.
 The application generates electronic records requiring the controls specified in
 21 CFR Part 11.
 The application does NOT generate electronic records requiring the controls
 specified in 21 CFR Part 11.
 The application incorporates or requires an electronic signature for a GxP-
 related function. The controls specified in 21 CFR Part 11 apply.
 The application does NOT use or require an electronic signature for a GxP-
 related function.



                                                                                    12
GxP Assessment

Assessment Conclusions

GAMP-5 Category Assignment




 1 Infrastructure Software

 3 Non-Configured

 4 Configured

 5 Custom




                             13
Risk Identification and Prioritization

Severity – Impact on p
       y     p       patient safety, p
                                  y, product q
                                             quality and data integrity
                                                   y              g y
Probability – Likelihood of the fault occurring
Risk Class – Determined by the relationship between Severity and
Probability
Detectability – Likelihood that the fault will be detected prior to harm
occurring
Risk Priority – Determined by the relationship between Risk Class and
Detectability
Successful execution of this method depends on the ability of the CSRA
team to ag ee o the meaning o High, Medium, a d Low for eac
 ea o agree on e ea g of g , ed u , and o o each
segment of the assessment.




                                                                           14
Risk Identification and Prioritization

Guidance for Functional Risk Assessment
Assess each of the hazards associated with a function in two stages.
Stage 1 – Severity of impact on patient safety, product quality and data integrity
is plotted against the likelihood that a fault will occur, giving Risk Class.
Stage 2 – Risk Class is then plotted against the likelihood that the fault will be
detected before harm occurs giving a Risk Priority.




                                                                                     15
Risk Identification and Prioritization




                                         16
Risk Identification and Prioritization

System or Data Destruction
 y
Destruction of system due to power surge
Loss of data due to power outage/brown-out
Loss of system access due to power outage
Loss of data due to storage fault
Loss of system access due to processor or memory failure
Destruction of system due to loss of environmental control
Destruction of system due to fire
Destruction of system due to earthquake or other disasters
Backup/Restore procedure ineffective




                                                             17
Risk Identification and Prioritization

Security
       y
Physical security breach of server/computer
Logical security breach from outside the organization
Logical security breach from inside the organization
Computer Virus infection
Execution of privileged functions by unauthorized person
Untrained operators using the system
Forgery of electronic signatures
Copying of electronic signatures
Tampering with completed records
Incomplete electronic signatures accepted


                                                           18
Risk Identification and Prioritization

Human Factors
Reliance on (only) color for critical alarms
Reliance on (only) audio for critical alarms
Critical faults do not require acknowledgement
Alarm conditions not captured in permanent record
Performance
System inability to service maximum number of concurrent users
Operation sequence impacted by system load
Alarms not provided to operators in real time
Time-critical events not serviced in time




                                                                 19
Risk Identification and Prioritization

Logical
  g
Improper user inputs or sequence corrupts or disrupts system
Throughput cannot meet demand
Operators not informed of system or data failure
Result algorithms incorrect
Safety
System fault creating an employee safety hazard
Safety interlock fails to disable machine
Improper wiring creates electrical hazard
System Specific
List hazards specific to system functionality


                                                               20
Severity

    Characteristic                    Low                           Medium                                  High
      Severity          Cosmetic affect, fault forces    Alarmed, readily recoverable          Unrecoverable or extended
                     excess operator documentation, failure of a key system function,
                                         documentation                           function        failure of primary system
                        occasional rejection of good   non-critical data loss, failure of a   function(s), severe regulatory
                       product, momentary operator            minor specification.               impact, critical data loss
                      intervention required to correct
                             non-critical function
   Severity              Expected to have a minor        Expected to have a moderate        Expected to have very significant
                     negative impact. Damage would        impact. Damage would be             negative impact. The impact
                       not be expected to have long-       expected to have short to            could be expected to have
                          term detrimental effects.    medium term detrimental effects. significant long-term effects and
                                                                                              potentially catastrophic short-
                                                                                                        term effects.
   Severity          Hazard is not expected to result    Hazard could directly result in       Hazard directly results in the
                             in negative medical        moderate injury to the patient or      death or serious injury of the
                            consequences or any                     operator                         patient or operator
                                 complications.
                                                       Hazard could indirectly affect the      Hazard indirectly affects the
                                                          patient such that delayed or         patient such that delayed or
                                                       incorrect information could result incorrect information could result
                                                       in moderate injury to the patient.    in the death or serious injury to
                                                                                                         the patient
   Severity          Hazard will cause small damage Hazard will cause considerable                     Hazard will/is;
                                to the business         business or image damage, but
                                                                                                      Endanger people
                                                        will not endanger the company
                                                                                               Contrary to law or regulation
                                                                                            Damage to company image with
                                                                                             unforeseeable consequences.
                                                                                                                                 21
Likelihood


  Characteristic                Low                               Medium                                  High
 Probability            <1 incident per month         <1 incident per week, but >1 per            Once or more per day
                                                                   month.
 Probability       Frequency of the event occurring   Frequency of the event occurring       Frequency of the event occurring
                    is perceived to be once per ten      is perceived to be once per            is perceived to be once per
                         thousand transactions              thousand transactions                   hundred transactions


 Probability        Not expected to, or will rarely     Likely to occur infrequently or      Likely to occur regularly or many
                      occur during the life of the    several times during the life of the       times during the life of the
                    product/system under normal         product/system under normal            product/system under normal
                        operating conditions.                operating conditions                   operating conditions




 Probability               ≥1:1001 – 5,000                     =1:101 – 1,000                            ≤1:100
 Probability        The problem will only occur if     The problem couldn’t really be         Failure will happen at regular
                    several events happen at the       excluded for a long time, even                    intervals
                             same time                   under normal conditions.




                                                                                                                               22
Detection



   Characteristic             Low                         Medium                          High
   Detectability      Very difficult or nearly     Some automated error              High level of error
                    impossible to capture the    checking processes exist.          checking processes
                                error            One-over-one review may
                                                 O                   i             exists. O
                                                                                     i     One-over-one
                                                 be required. It’s likely that   review required. Missed
                                                  the error will be captured      error will be obvious in
                                                    in review of outputted          review of outputted
                                                         information.                   information.




                                                                                                             23
Risk Identification and Prioritization




                                         24
RA Form - Example

       Project Title                   Example
                                           p                          Project Number                     XX-XX-XXXX


           Scope


                                                               Risk Assessment

                           Relevance                 Probability
                                           Risk                                  Risk
                  Sub-      GxP or                       of         Severity             Detectability   Priority
                                         Scenarios                               Class
Function        Function   Business                  Occurrence                                                       Comments
   A                                                     L             L           3          L            M
   B                                                     L             M           3          M            L
   C                                                     L             H           2          L            H
   D                                                     M             L           3          H            L
   E                                                     M             M           2          M            M
   F                                                     M             H           1          L            H
   G                                                     H             L           2          H            L
   H                                                     H             M           1          M            H
   I                                                     H             H           1          H            M
                                                                                                                                 25
Risk Based Test Planning



     Risk Level            Testing Strategy
                  Zero     Function is not related to a URS.
                           No testing required
                                      required.
                   4       PQ testing only

                   3       Positive OQ testing
                           Indirect PQ testing
                   2       Positive OQ testing
                           Direct PQ testing
                  High     Positive and Negative OQ testing
                           Direct
                           Di t PQ testing
                                     t ti




                                                               26
Risk Based Test Planning – Examples

       Function                Low Risk                Medium Risk                High Risk
  Input function with     Verify normal data is     Boundary testing: 1     Boundary testing: 9.9,
acceptable data range           accepted          value below 10, 1 value   10.0, 10.1, 19.9, 20.0,
    of 10.0 – 20.0                                in range, 1 value above            20.1
                                                             20.

                                                   Null l
                                                   N ll value challenge
                                                               h ll         Null l
                                                                            N ll value challenge
                                                                                        h ll
                                                                              Incorrect decimal
                                                                                  precision

                                                                               Alpha character
Temperature control for    Verify calibration         Verify accurate           Verify accurate
   an instrument             procedures           calibration throughout    calibration throughout
                                                     operating range           operating range


                                                     3-point boundary
                                                     3 i tb        d          6-point b
                                                                              6 i t boundaryd
                                                     testing for alarms       testing for alarms

                                                                              Challenge control
                                                                              precision against
                                                                              defined process
                                                                                       p
                                                                                 parameters


                                                                                                      27
Periodic Reviews of Risks


Change Control Assessments
     System Upgrades
     New Interface(s)
     New Modules




                             28

More Related Content

What's hot

21 CFR Part 11 Compliance
21 CFR Part 11 Compliance21 CFR Part 11 Compliance
21 CFR Part 11 ComplianceAITalent
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanWolfgang Kuchinke
 
IT Validation Training
IT Validation TrainingIT Validation Training
IT Validation TrainingRobert Sturm
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validationchitralekha48
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeMahesh B. Wazade
 
Risk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSRisk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSKatalyst HLS
 
Computer system validations
Computer system validations Computer system validations
Computer system validations Saikiran Koyalkar
 
21 cfr part 11
21 cfr part 1121 cfr part 11
21 cfr part 11Rohit K.
 
FDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesFDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesVidyasagar P
 
Equipment qualification of medical device
Equipment qualification of medical deviceEquipment qualification of medical device
Equipment qualification of medical deviceNahri Musyrif
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_finalDuy Tan Geek
 

What's hot (20)

21 CFR Part 11 Compliance
21 CFR Part 11 Compliance21 CFR Part 11 Compliance
21 CFR Part 11 Compliance
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master Plan
 
21 cfr part 11
21 cfr part 1121 cfr part 11
21 cfr part 11
 
IT Validation Training
IT Validation TrainingIT Validation Training
IT Validation Training
 
21 CFR Part 11.pptx
21 CFR Part 11.pptx21 CFR Part 11.pptx
21 CFR Part 11.pptx
 
21 cfr part 11 basic
21 cfr part 11 basic21 cfr part 11 basic
21 cfr part 11 basic
 
Understanding 21 cfr part 11
Understanding 21 cfr part 11Understanding 21 cfr part 11
Understanding 21 cfr part 11
 
Computer System Validation
Computer System ValidationComputer System Validation
Computer System Validation
 
Managing risk in cleaning validation
Managing risk in cleaning validationManaging risk in cleaning validation
Managing risk in cleaning validation
 
CFR-21 PART11.pptx
CFR-21 PART11.pptxCFR-21 PART11.pptx
CFR-21 PART11.pptx
 
Data Integrity
Data IntegrityData Integrity
Data Integrity
 
Computer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazadeComputer system validation review article by-mahesh b wazade
Computer system validation review article by-mahesh b wazade
 
Risk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLSRisk Based Approach CSV Training_Katalyst HLS
Risk Based Approach CSV Training_Katalyst HLS
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
21 cfr part 11
21 cfr part 1121 cfr part 11
21 cfr part 11
 
FDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesFDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixes
 
Equipment qualification of medical device
Equipment qualification of medical deviceEquipment qualification of medical device
Equipment qualification of medical device
 
Computerized system validation_final
Computerized system validation_finalComputerized system validation_final
Computerized system validation_final
 
Computer systems compliance
Computer systems complianceComputer systems compliance
Computer systems compliance
 
FDA GMP Training - The Quality Audit
FDA GMP Training - The Quality AuditFDA GMP Training - The Quality Audit
FDA GMP Training - The Quality Audit
 

Similar to Apply Risk Management to Computerized and Automated Systems

Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideProPharma Group
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...sazalsutra
 
Amergamalpres1 130129172315-phpapp01
Amergamalpres1 130129172315-phpapp01Amergamalpres1 130129172315-phpapp01
Amergamalpres1 130129172315-phpapp01Fasika Alemu
 
Regulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsRegulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsInstitute of Validation Technology
 
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...Greenlight Guru
 
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorks
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorksQbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorks
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorksSun Kim
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
2014_NVF_III_Session_3_Risk_Assessment.pdf
2014_NVF_III_Session_3_Risk_Assessment.pdf2014_NVF_III_Session_3_Risk_Assessment.pdf
2014_NVF_III_Session_3_Risk_Assessment.pdfGobu Devarajan
 
GxP Assessment.docx
GxP Assessment.docxGxP Assessment.docx
GxP Assessment.docxWisdo2
 
Risk minor major critical
Risk minor major criticalRisk minor major critical
Risk minor major criticalyasser mekky
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Quality by Design Course Preview
Quality by Design Course PreviewQuality by Design Course Preview
Quality by Design Course PreviewInvensis Learning
 
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...Shay Ginsbourg
 
Good Automated Manufacturing Practices
Good Automated Manufacturing PracticesGood Automated Manufacturing Practices
Good Automated Manufacturing PracticesPrashant Tomar
 

Similar to Apply Risk Management to Computerized and Automated Systems (20)

Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
 
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...A GAMP Approach to Data Integrity, Electronic Records & Signatures &  Operati...
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
 
Amergamalpres1 130129172315-phpapp01
Amergamalpres1 130129172315-phpapp01Amergamalpres1 130129172315-phpapp01
Amergamalpres1 130129172315-phpapp01
 
CAPA: A Risk Mitigating Quality System
CAPA: A Risk Mitigating Quality SystemCAPA: A Risk Mitigating Quality System
CAPA: A Risk Mitigating Quality System
 
Regulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS EnvironmentsRegulatory Considerations for use of Cloud Computing and SaaS Environments
Regulatory Considerations for use of Cloud Computing and SaaS Environments
 
Application of Quality Risk Management in Commissioning & Qualifcation
Application of Quality Risk Management in Commissioning & QualifcationApplication of Quality Risk Management in Commissioning & Qualifcation
Application of Quality Risk Management in Commissioning & Qualifcation
 
ASTM Standard E 2500 for Commissioning and Qualifications
ASTM Standard E 2500 for Commissioning and QualificationsASTM Standard E 2500 for Commissioning and Qualifications
ASTM Standard E 2500 for Commissioning and Qualifications
 
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...
Software as a Medical Device (SaMD) Challenges and Opportunities for 2021 and...
 
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorks
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorksQbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorks
QbD in Generics IFPAC 2015 Teva Inna Ben Anat QbDWorks
 
Gamp5 new
Gamp5 newGamp5 new
Gamp5 new
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
2014_NVF_III_Session_3_Risk_Assessment.pdf
2014_NVF_III_Session_3_Risk_Assessment.pdf2014_NVF_III_Session_3_Risk_Assessment.pdf
2014_NVF_III_Session_3_Risk_Assessment.pdf
 
GxP Assessment.docx
GxP Assessment.docxGxP Assessment.docx
GxP Assessment.docx
 
Risk minor major critical
Risk minor major criticalRisk minor major critical
Risk minor major critical
 
Application of Q R M in Manufacturing Operations
Application of Q R M in Manufacturing Operations Application of Q R M in Manufacturing Operations
Application of Q R M in Manufacturing Operations
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Services catalogue 2019
Services catalogue 2019Services catalogue 2019
Services catalogue 2019
 
Quality by Design Course Preview
Quality by Design Course PreviewQuality by Design Course Preview
Quality by Design Course Preview
 
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...
Ginsbourg.com - Presentation of Medical Software Validation Challenges in 201...
 
Good Automated Manufacturing Practices
Good Automated Manufacturing PracticesGood Automated Manufacturing Practices
Good Automated Manufacturing Practices
 

More from Institute of Validation Technology

Incorporate Domestic and International Regulations for Effective GMP Auditing
Incorporate Domestic and International Regulations for Effective GMP AuditingIncorporate Domestic and International Regulations for Effective GMP Auditing
Incorporate Domestic and International Regulations for Effective GMP AuditingInstitute of Validation Technology
 
Notification Tactics for Improved Notification Tactics For Improved Field Act...
Notification Tactics for Improved Notification Tactics For Improved Field Act...Notification Tactics for Improved Notification Tactics For Improved Field Act...
Notification Tactics for Improved Notification Tactics For Improved Field Act...Institute of Validation Technology
 
Computer System Validation Then and Now — Learning Management in the Cloud
Computer System Validation Then and Now — Learning Management in the CloudComputer System Validation Then and Now — Learning Management in the Cloud
Computer System Validation Then and Now — Learning Management in the CloudInstitute of Validation Technology
 
Management Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementManagement Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementInstitute of Validation Technology
 
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...Institute of Validation Technology
 
Designing Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentDesigning Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentInstitute of Validation Technology
 
Incorporate CPV and Continual Improvement into your Validation Plan
Incorporate CPV and Continual Improvement into your Validation PlanIncorporate CPV and Continual Improvement into your Validation Plan
Incorporate CPV and Continual Improvement into your Validation PlanInstitute of Validation Technology
 
Introduction to Statistical Applications for Process Validation
Introduction to Statistical Applications for Process ValidationIntroduction to Statistical Applications for Process Validation
Introduction to Statistical Applications for Process ValidationInstitute of Validation Technology
 
GMP Systems Integration–Combine Results and Utilize as a Compliance Tool
GMP Systems Integration–Combine Results and Utilize as a Compliance ToolGMP Systems Integration–Combine Results and Utilize as a Compliance Tool
GMP Systems Integration–Combine Results and Utilize as a Compliance ToolInstitute of Validation Technology
 

More from Institute of Validation Technology (20)

Incorporate Domestic and International Regulations for Effective GMP Auditing
Incorporate Domestic and International Regulations for Effective GMP AuditingIncorporate Domestic and International Regulations for Effective GMP Auditing
Incorporate Domestic and International Regulations for Effective GMP Auditing
 
Notification Tactics for Improved Notification Tactics For Improved Field Act...
Notification Tactics for Improved Notification Tactics For Improved Field Act...Notification Tactics for Improved Notification Tactics For Improved Field Act...
Notification Tactics for Improved Notification Tactics For Improved Field Act...
 
Lifecycle Approach to Cleaning Validation
Lifecycle Approach to Cleaning ValidationLifecycle Approach to Cleaning Validation
Lifecycle Approach to Cleaning Validation
 
Computer System Validation Then and Now — Learning Management in the Cloud
Computer System Validation Then and Now — Learning Management in the CloudComputer System Validation Then and Now — Learning Management in the Cloud
Computer System Validation Then and Now — Learning Management in the Cloud
 
Applying QbD to Biotech Process Validation
Applying QbD to Biotech Process ValidationApplying QbD to Biotech Process Validation
Applying QbD to Biotech Process Validation
 
Management Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality ImprovementManagement Strategies to Facilitate Continual Quality Improvement
Management Strategies to Facilitate Continual Quality Improvement
 
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...
Understand the Evolving Regulations for Aseptic Cleaning and Environmental Mo...
 
Effective Use of Environmental Monitoring Data Trending
Effective Use of Environmental Monitoring Data TrendingEffective Use of Environmental Monitoring Data Trending
Effective Use of Environmental Monitoring Data Trending
 
Mock Inspection Case Studies
Mock Inspection Case StudiesMock Inspection Case Studies
Mock Inspection Case Studies
 
Validation Master Plan
Validation Master PlanValidation Master Plan
Validation Master Plan
 
Designing Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentDesigning Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical Development
 
Determine Exceptions to Validation
Determine Exceptions to ValidationDetermine Exceptions to Validation
Determine Exceptions to Validation
 
Conduct a Gap Analysis of a Validation Programme
Conduct a Gap Analysis of a Validation ProgrammeConduct a Gap Analysis of a Validation Programme
Conduct a Gap Analysis of a Validation Programme
 
FDA Inspection
FDA InspectionFDA Inspection
FDA Inspection
 
Incorporate CPV and Continual Improvement into your Validation Plan
Incorporate CPV and Continual Improvement into your Validation PlanIncorporate CPV and Continual Improvement into your Validation Plan
Incorporate CPV and Continual Improvement into your Validation Plan
 
Compliance by Design and Compliance Master Plan
Compliance by Design and Compliance Master PlanCompliance by Design and Compliance Master Plan
Compliance by Design and Compliance Master Plan
 
Introduction to Statistical Applications for Process Validation
Introduction to Statistical Applications for Process ValidationIntroduction to Statistical Applications for Process Validation
Introduction to Statistical Applications for Process Validation
 
Risk-Based Approaches in GMP’s Project Life Cycles
Risk-Based Approaches in GMP’s Project Life CyclesRisk-Based Approaches in GMP’s Project Life Cycles
Risk-Based Approaches in GMP’s Project Life Cycles
 
GMP Systems Integration–Combine Results and Utilize as a Compliance Tool
GMP Systems Integration–Combine Results and Utilize as a Compliance ToolGMP Systems Integration–Combine Results and Utilize as a Compliance Tool
GMP Systems Integration–Combine Results and Utilize as a Compliance Tool
 
A Lifecycle Approach to Process Validation
A Lifecycle Approach to Process ValidationA Lifecycle Approach to Process Validation
A Lifecycle Approach to Process Validation
 

Recently uploaded

Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowSonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowRiya Pathan
 
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableNehru place Escorts
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Gabriel Guevara MD
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...narwatsonia7
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbaisonalikaur4
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceNehru place Escorts
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Miss joya
 
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Booking
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment BookingHousewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Booking
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any Time
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any TimeCall Girls Budhwar Peth 7001305949 All Area Service COD available Any Time
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any Timevijaych2041
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowNehru place Escorts
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfMedicoseAcademics
 

Recently uploaded (20)

Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowSonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Sonagachi Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hsr Layout Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
 
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
Call Girls Frazer Town Just Call 7001305949 Top Class Call Girl Service Avail...
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
 
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Electronic City Just Call 7001305949 Top Class Call Girl Service A...
 
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Booking
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment BookingHousewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Booking
Housewife Call Girls Hoskote | 7001305949 At Low Cost Cash Payment Booking
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
 
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any Time
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any TimeCall Girls Budhwar Peth 7001305949 All Area Service COD available Any Time
Call Girls Budhwar Peth 7001305949 All Area Service COD available Any Time
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
 

Apply Risk Management to Computerized and Automated Systems

  • 1. Apply Risk Management for Computerized and Automated Systems IVT 11th Annual Change Control & 3rd Annual Risk Management January, 2013 Presented By: 1
  • 2. Agenda I. I Terms & Definitions - Q9 Quality Risk Management II. GxP Assessment III. Risk Identification and Prioritization IV. Risk Based Test Planning g V. Periodic Reviews of Risks VI. Interactive Exercise 2
  • 3. Agenda Terms & Definitions - Q9 Quality Risk Management ICH Q9 “Quality Risk Management” GAMP 5 GxP Assessment Procedure Form 21 CFR Part 11 relevance Risk Identification and Prioritization Severity Probability Risk Class Detectability Risk Priority Risk based Test Planning Examples Periodic Reviews of Risks Maintaining appropriate risk levels. Interactive Exercise Using a real life example, participants study Life Cycle Risk Management 3
  • 4. Typical Risk Assessment Points throughout System’s Life Cycle 4
  • 5. Terms & Definitions - Q9 Quality Risk Management Risk Identification – What can go wrong? Risk Evaluation – Severity, Occurrence, Delectability Risk Analysis – Quantitative (1 -5) Qualitative (High – Low) Risk Control – Reduction Acceptance Reduction, Risk Communication/Review 5
  • 6. GAMP Approach Understand the process Understand the product and data Quality Management System Scalable Life Science Activities Science Based Quality Risk Management Supplier Involvement 6
  • 7. 7
  • 8. GxP Assessment GxP -- The collective requirements for p q processes, p , personnel, materials , and equipment used in the manufacture and distribution of foods, drugs and medical devices as defined in 21 CFR for Good Manufacturing Practices (cGxP), Good Clinical Practices (GCP), Good Laboratory Practices (GLP) and Good Distribution Practices (GDP) GxP may also (GDP). include practices and procedures considered to be “industry standards”. This procedure describes how computerized applications and systems are assessed for GxP – relevance and 21 CFR compliance. 8
  • 9. GxP Assessment GxP Assessment Questions Does the application control or monitor machinery or instrumentation used in the manufacture of product? This includes critical support systems for steam, compressed air, water for injection, and clean room air. Is th I the application used t d li ti d to document or calculate product, production process, or t l l t d t d ti material quality information? This includes defect count, defect types, inspection results, and QC sample information. Is the application used to document or track which materials were used in pp manufacture or testing of a product or in-process material? Is the application used to document or calculate the results for a procedure defined on a material specification? Does th application schedule or t k th calibration or maintenance hi t D the li ti h d l track the lib ti i t history of f items used in product manufacture or testing? Does the application track or control the issuance of GxP-related documents? Examples: NLR issuance, p p procedure issuance. 9
  • 10. GxP Assessment GxP Assessment Questions Does the application provide the original record of an activity required by GxPs? Examples: GxP training, complaint investigations, procedurally required quality trending reports. Is th I the application used t support th acceptability of products, materials, or li ti d to t the t bilit f d t t i l processes? Does the application support (store e-records, perform calculations) a system or p process validation? Does the application support issuance or distribution of product labeling, marketing literature, directions for use, or other similar controlled product literature? Electronic Record Assessment El t i R dA t Does the application retain a record on durable electronic media (i.e., disk, tape, CD, network or other non-transient media)? Does the application create, modify, store, archive, or transmit a GxP record? create modify store archive 10
  • 11. GxP Assessment Electronic Signature Assessment g Are signatures, initials, or other operator identification required for the operations documented by this application? Are decisions made on the information documented by this application prior to operators signing any h d t i i hard-copy d documents? t ? Section E: GAMP-5 Category Assignment 1I f t t Infrastructure Software S ft 3* Non-Configured 4 Configured 5C Custom *Category 2, from GAMP 4, was eliminated in the GAMP 5 revision 11
  • 12. GxP Assessment Assessment Conclusions The application is determined to be GxP-related. Validation and controls appropriate for GxP-related applications apply. The application is determined NOT to be GxP-related. No additional controls are required by GxP. The application generates electronic records requiring the controls specified in 21 CFR Part 11. The application does NOT generate electronic records requiring the controls specified in 21 CFR Part 11. The application incorporates or requires an electronic signature for a GxP- related function. The controls specified in 21 CFR Part 11 apply. The application does NOT use or require an electronic signature for a GxP- related function. 12
  • 13. GxP Assessment Assessment Conclusions GAMP-5 Category Assignment 1 Infrastructure Software 3 Non-Configured 4 Configured 5 Custom 13
  • 14. Risk Identification and Prioritization Severity – Impact on p y p patient safety, p y, product q quality and data integrity y g y Probability – Likelihood of the fault occurring Risk Class – Determined by the relationship between Severity and Probability Detectability – Likelihood that the fault will be detected prior to harm occurring Risk Priority – Determined by the relationship between Risk Class and Detectability Successful execution of this method depends on the ability of the CSRA team to ag ee o the meaning o High, Medium, a d Low for eac ea o agree on e ea g of g , ed u , and o o each segment of the assessment. 14
  • 15. Risk Identification and Prioritization Guidance for Functional Risk Assessment Assess each of the hazards associated with a function in two stages. Stage 1 – Severity of impact on patient safety, product quality and data integrity is plotted against the likelihood that a fault will occur, giving Risk Class. Stage 2 – Risk Class is then plotted against the likelihood that the fault will be detected before harm occurs giving a Risk Priority. 15
  • 16. Risk Identification and Prioritization 16
  • 17. Risk Identification and Prioritization System or Data Destruction y Destruction of system due to power surge Loss of data due to power outage/brown-out Loss of system access due to power outage Loss of data due to storage fault Loss of system access due to processor or memory failure Destruction of system due to loss of environmental control Destruction of system due to fire Destruction of system due to earthquake or other disasters Backup/Restore procedure ineffective 17
  • 18. Risk Identification and Prioritization Security y Physical security breach of server/computer Logical security breach from outside the organization Logical security breach from inside the organization Computer Virus infection Execution of privileged functions by unauthorized person Untrained operators using the system Forgery of electronic signatures Copying of electronic signatures Tampering with completed records Incomplete electronic signatures accepted 18
  • 19. Risk Identification and Prioritization Human Factors Reliance on (only) color for critical alarms Reliance on (only) audio for critical alarms Critical faults do not require acknowledgement Alarm conditions not captured in permanent record Performance System inability to service maximum number of concurrent users Operation sequence impacted by system load Alarms not provided to operators in real time Time-critical events not serviced in time 19
  • 20. Risk Identification and Prioritization Logical g Improper user inputs or sequence corrupts or disrupts system Throughput cannot meet demand Operators not informed of system or data failure Result algorithms incorrect Safety System fault creating an employee safety hazard Safety interlock fails to disable machine Improper wiring creates electrical hazard System Specific List hazards specific to system functionality 20
  • 21. Severity Characteristic Low Medium High Severity Cosmetic affect, fault forces Alarmed, readily recoverable Unrecoverable or extended excess operator documentation, failure of a key system function, documentation function failure of primary system occasional rejection of good non-critical data loss, failure of a function(s), severe regulatory product, momentary operator minor specification. impact, critical data loss intervention required to correct non-critical function Severity Expected to have a minor Expected to have a moderate Expected to have very significant negative impact. Damage would impact. Damage would be negative impact. The impact not be expected to have long- expected to have short to could be expected to have term detrimental effects. medium term detrimental effects. significant long-term effects and potentially catastrophic short- term effects. Severity Hazard is not expected to result Hazard could directly result in Hazard directly results in the in negative medical moderate injury to the patient or death or serious injury of the consequences or any operator patient or operator complications. Hazard could indirectly affect the Hazard indirectly affects the patient such that delayed or patient such that delayed or incorrect information could result incorrect information could result in moderate injury to the patient. in the death or serious injury to the patient Severity Hazard will cause small damage Hazard will cause considerable Hazard will/is; to the business business or image damage, but Endanger people will not endanger the company Contrary to law or regulation Damage to company image with unforeseeable consequences. 21
  • 22. Likelihood Characteristic Low Medium High Probability <1 incident per month <1 incident per week, but >1 per Once or more per day month. Probability Frequency of the event occurring Frequency of the event occurring Frequency of the event occurring is perceived to be once per ten is perceived to be once per is perceived to be once per thousand transactions thousand transactions hundred transactions Probability Not expected to, or will rarely Likely to occur infrequently or Likely to occur regularly or many occur during the life of the several times during the life of the times during the life of the product/system under normal product/system under normal product/system under normal operating conditions. operating conditions operating conditions Probability ≥1:1001 – 5,000 =1:101 – 1,000 ≤1:100 Probability The problem will only occur if The problem couldn’t really be Failure will happen at regular several events happen at the excluded for a long time, even intervals same time under normal conditions. 22
  • 23. Detection Characteristic Low Medium High Detectability Very difficult or nearly Some automated error High level of error impossible to capture the checking processes exist. checking processes error One-over-one review may O i exists. O i One-over-one be required. It’s likely that review required. Missed the error will be captured error will be obvious in in review of outputted review of outputted information. information. 23
  • 24. Risk Identification and Prioritization 24
  • 25. RA Form - Example Project Title Example p Project Number XX-XX-XXXX Scope Risk Assessment Relevance Probability Risk Risk Sub- GxP or of Severity Detectability Priority Scenarios Class Function Function Business Occurrence Comments A L L 3 L M B L M 3 M L C L H 2 L H D M L 3 H L E M M 2 M M F M H 1 L H G H L 2 H L H H M 1 M H I H H 1 H M 25
  • 26. Risk Based Test Planning Risk Level Testing Strategy Zero Function is not related to a URS. No testing required required. 4 PQ testing only 3 Positive OQ testing Indirect PQ testing 2 Positive OQ testing Direct PQ testing High Positive and Negative OQ testing Direct Di t PQ testing t ti 26
  • 27. Risk Based Test Planning – Examples Function Low Risk Medium Risk High Risk Input function with Verify normal data is Boundary testing: 1 Boundary testing: 9.9, acceptable data range accepted value below 10, 1 value 10.0, 10.1, 19.9, 20.0, of 10.0 – 20.0 in range, 1 value above 20.1 20. Null l N ll value challenge h ll Null l N ll value challenge h ll Incorrect decimal precision Alpha character Temperature control for Verify calibration Verify accurate Verify accurate an instrument procedures calibration throughout calibration throughout operating range operating range 3-point boundary 3 i tb d 6-point b 6 i t boundaryd testing for alarms testing for alarms Challenge control precision against defined process p parameters 27
  • 28. Periodic Reviews of Risks Change Control Assessments System Upgrades New Interface(s) New Modules 28