SlideShare a Scribd company logo
1 of 10
Download to read offline
Accelerating the Development of
Medical Devices: The Value
of Proactive Risk Management
For medical-device manufacturers, fast-tracking product development
requires controls and processes that address risks early on, reduce
exposures, and improve the odds of success in the marketplace.
Executive Summary
For medical-device manufacturers worldwide,
risk management must be preemptive and
detailed. The U.S. Federal Drug Administration
(FDA) requires adherence to the industry’s cur-
rent risk-management standard (ISO 14971:
2007-Application of Risk Management to Medical
Devices), which specifies a process for identifying,
assessing and controlling risk. These require-
ments apply throughout the life of a medical
device.1
While statistics show that 60% of risk manage-
ment takes place in the detailed design phase,
only 30% of medical-device companies employ
it during concept development.2
Spotting risks
after problems arise, at the validation stage, is a
reactive approach that in our view is sub-optimal.
Identifying hazards and working to mitigate them
during the initial phases of new product develop-
ment can help alleviate issues down the road.
There is also the possibility of running into risks
prior to concept development, when companies
gather customer, technology and regulatory
requirements. If appropriately managed, these
exposures can be effectively dealt with very
early in the product lifecycle. This can result in
“risk-proof concepts” driven by four risk-mitiga-
tion strategies: risk limitation, risk transfer, risk
avoidance and risk acceptance.3
Using these four
strategies, companies can evaluate risk effec-
tively and reduce the time and cost associated
with new product development (NPD).
This white paper offers a proactive approach that
medical-device companies can use to identify,
treat and resolve risks upstream, in the earlier
stages of product development, by categorizing
them as requirements or constraints. Our method
is based on best practices and the experience we
have gained in numerous client engagements
across the medical-device field.
Risk Prioritization, Mitigation & Cost
In the global medical-device industry, proactive
risk management is critical to maximizing value
and fast-tracking new product development
upstream.
Risk prioritization, mitigation and cost are three
interlinked dimensions typically used to deal with
this issue. They play a major role in determining
if risk should be limited, transferred, avoided or
cognizant 20-20 insights | march 2016
• Cognizant 20-20 Insights
High
Medium
Low
Risk Prioritization
(Severity & Occurrence)
Risk Cost
Impact
Risk Mitigation
Impact
cognizant 20-20 insights 2
accepted. Figure 1 illustrates how these strategies
can be applied, depending on the priority of the
risk and the cost involved to control it. Usually,
managing a high risk consumes more costs. In
this situation, companies can attempt to split
the risk by applying various combinations of the
aforementioned strategies. Similarly, risks that
are deemed limited, transferrable, avoidable, or
acceptable must be sorted. Once this is done, the
actions required to limit and/or avoid the risk can
be proposed.
Risk analysis as such is not a primary activity, but
part of the risk-assessment phase. Prior to risk
assessment, business needs and intended use
must be confirmed. At this point, various require-
ments are gathered, followed by risk assessment
and evaluation. In our view, defining intended use,
analyzing preliminary hazards and evaluating risk
before the detailed design phase are upstream
activities. The concept we propose emphasizes
accelerating new product development (NPD) by
controlling risk during this stage, as described in
the following section.
Upstream Activities
Upstream activities include the following tasks:
•	 Defining intended use. Intended use is the
basis for any medical-product design, and the
reference for all design activities that follow.
Intended use or indication for use can apply to
a clinical condition that a device is intended to
help diagnose, treat, reconstruct or improve
upon. Once defined, the next step is to gather
requirements.
•	 Requirements-gathering analysis. Require-
ments and intended use go hand in hand, since
the design of a medical device is constructed
around requirement specifications. A predicate
study of an equivalent, or virtually equivalent,
model and a benchmarking analysis can also
be useful when gathering technical require-
ments. Regulatory requirements are based on
industry standards, specific geographic regula-
tions, functional requirements, the class of the
device, intended use and the user environment.
Figure 1
Weighing Risk
High
Medium
Low
High
Medium
Low Acceptance
Avoidance
Transfer
Limitation
cognizant 20-20 insights 3
•	 Developing a risk management plan. An
effective risk management plan typically relies
on numerous strategies to define various risk
scenarios, acceptability criteria and targets so
that risks can be resolved or headed off early
on. Sufficient time and effort should be given
to evaluating realistic scenarios and timelines
ratherthanmakingassumptions.(Newproducts
typically fail due to improper planning, unreal-
istic timelines, infrastructure shortcomings,
communication disconnects among cross-func-
tional teams, and/or insufficient knowledge of
the product and product standards. Using non-
conformed medical devices can result in any
number of hazards, including inherently risky
medical treatment, device failures/malfunc-
tions and poor interactions between the device
and users. If risk management is viewed as a
mere formality, mainstream risk identification
can be overlooked — often requiring companies
to revisit their risk-management tools. A risk-
management expert is expected to anticipate
all the foreseeable consequences and events
that can occur during the entire NPD process.
Incorporating human factors engineering (HFE)
into risk management can help identify most
device- and use-related hazards (see Figure 2).
Figure 2
Identifying Device and Use-Related Hazards
Hazard | Anything that can cause harm Risk | How great the chance that someone
will be harmed by the hazard
HFE aligns the design of devices, systems and
working conditions with the capabilities and
requirements of users. This takes place in the
development stage, which must take into account
a device’s technologies, human interactions, the
environment in which the technology will be used,
potential dangers and, of course, the criticality of
patient care.
•	 Risk evaluation. The risk-evaluation process
can involve qualitative decision making or a
quantitative assessment applying probabilistic
and statistical tools. Depending on the depth
and complexity of the assessment, practitio-
ners can use a number of tools: comparison
matrix (CM); fault tree analysis (FTA); event
tree analysis (ETA); failure mode and effects
analysis (FMEA); hazard analysis and operabil-
ity study (HAZOP); or a hazard analysis critical
control point study (HACCP) (see Figure 3).
Figure 3 (next page) depicts a risk-management
tools matrix that can be applied in various stages
of product development. An Ishikawa diagram can
be used in almost all phases to identify associated
risks. PHA (preliminary hazard analysis) can be
employed in design planning, retrofitting design
development and to enhance existing designs,
for example. CM, REM and FMEA can be used
once risks have been identified, and applied in
various phases to determine marketing, design
and process exposures. HACCP and HAZOP can
be employed in different stages once risks are
ascertained.
4cognizant 20-20 insights
Problem Definition
If upstream activities related to risk management
are wrongly perceived as adding less value, they
may be deemed unworthy of further exploration.
In fact, it is likely that risk-management practitio-
ners consider FMEA as the only significant tool
they need, and ignore attempts to assess risk
until the design has matured.4
Low-risk medical
devices (whether used in hospital settings or busi-
ness/safety-related environments) do not apply
to this discussion.
Managing Risk at Every Stage
New product development typically starts with
identifying a set of risks (negative voice of cus-
tomer, unknown vulnerabilities from a new
technology or mechanism, a first-in-market chal-
lenge, for example). Apart from these concerns,
there are the risks associated with usability,
energy interactions, regulatory mandates and
system integration, which must be analyzed
before product design begins and prior to the
concept phase. In Figure 4, the slope (red line) in
the first two phases means that risks are identi-
fied, but not assessed and controlled.
Figure 3
A Subset of Risk Management Tools Used in Product Development
Figure 4
Proactive Risk Management
Upstream Activities (Top-Bottom) Downstream Activities (Bottom-Top)
VolumeofRisks
Requirements Gathering
& Analysis
PHA
Concept Generation
& Selection
FTA
Detail Design
& Optimization
xFMEA
HAACP
Design V & V
xFMEA
HAZOP
NPD Phases Reactive Proactive
More iterations in the
design cycle as more
risks are encountered.
Proactive application of
risk management reduces
the volume of risks.
GAP: Risks transferred or
converted to requirements.
Volume of risks increases
since they are not acted upon.
(A reactive approach). Less iterations and
fewer risks through
a proactive approach.
Ishikawa
Failure Mode & Effects Analysis
Preliminary Hazard Analysis
Comparison Matrix
Risk Evaluation Matrix
Fault Tree Analysis
Design &
Development
Planning
Design
Input
Design
Output
Design
Verification &
Validation
Design
Transfer
cognizant 20-20 insights 5
Figure 5
Primary Risk Strategies
Risk Transfer Risk Avoidance
Risk Limitation Risk Acceptance
Risk
To clarify, consider this scenario: A customer is
unhappy with the weight of a portable medical
device. If the device engineer doesn’t address
this issue during the concept phase, rework will
be required at a later stage — carrying the risk
forward. Risks that can be addressed in the initial
phases of product design are represented in the
larger slope in Figure 4 (previous page).
The wavy lines in Figure 4 represent rework. In
our experience, this is usually caused by delaying
the implementation of risk-mitigation strategies.
For example, if the housing of a medical device is
burned in a “heat distortion” or “burn out“ test,
changing the material will be proposed — poten-
tially leading to changes in the design. Earlier in
the process, the material did not suit the ther-
mal requirements — forcing the team to find an
alternative. Dealing with risk effectively in each
phase can reduce the time and costs associated
with overall design-implementation and rework.5
As mentioned earlier and illustrated in Figure 5
below, this involves four main strategies: risk
limitation, risk transfer, risk avoidance and risk
acceptance.
To address the risks cited earlier, we recommend
the following:
•	 Requirements-gathering and analysis: This
is the stage where MDD companies confirm
requirements based on a device’s intended
use, applicability and class. This helps assure
the viability of the input during concept and
design. Once requirements are collected, we
recommend a preliminary analysis to help
anticipate and detect hazards, confirm their
primary cause, and more accurately identify
and quantify risk (see Figure 6, next page).
During this initial stage, risks can be ranked as
high, medium or low. Each risk must then be
analyzed to determine if it is limited, should be
transferred, avoided or accepted.
As discussed, the application of risk-mitigation
strategies in the requirements-gathering phase
involves the following:
Risk Limitation
Consider a portable medical device that proj-
ects readouts on a display screen. If there is a
potential issue regarding visibility, it could have
been detected much earlier at the requirements-
gathering phase. Action items for limiting the
cognizant 20-20 insights 6
level of risk could then be determined and
addressed. For example:
•	 Adjusting the angle of the screen.
•	 Enlarging the size of the screen font.
•	 Adjusting the clarity of the screen.
Risk Transfer
A risk-transfer strategy can be applied in cases
that require a third party. A medical device that
involves a pump has a high level of risk during
the design and development stage. Managing risk
can be time-consuming and costly. It makes sense
to transfer the task to a capable external source.
Risk Avoidance
In some instances risk should be avoided at all
costs. For example, an MRI machine emits pow-
erful magnetic fields that must be carefully
controlled during the imaging process to protect
the patient, as well as the medical staff, in the MRI
suite. Risk avoidance is a top priority, and a strat-
egy that must be applied at every stage of design
and development.
Risk Acceptance
A risk acceptance strategy is appropriate when,
for example, a medical device permeates sensible
heat (heat that alters a body’s temperature with-
out causing harm).
Prepared and Proactive
Addressing risk through the aforementioned
strategies can head off hazards and set require-
ments before concept development — affording
the opportunity to apply actions at the initial
phase of NPD.
During requirements-gathering, risks are vali-
dated at the unit level, since the design is in the
very early stages. By taking a proactive approach
to risk management, companies can transfer
risks, convert them into requirements, or elimi-
nate them — reducing the number of potential
and real hazards they have to deal with. Risks
converted to action items become input for prod-
uct requirement specification (PRS), which serves
as the basis for concept generation.
Concept Generation and Selection
In order to convert a risk into an action item, it
must first be analyzed to determine its root cause.
If the issue that originated at the subsystem level
is identified at the component level, failures or
accidents could be attributed to various factors.
To mitigate these risks, we use tools such as fault
tree analysis (FTA) and event tree analysis (ETA),
as shown in Figures 7 and 8 on the following
pages. These can be applied in parallel during the
concept phase.
Figure 6
Preliminary Hazard Analysis
FORSEEABLECONSEQUENCES
High Level Risk
Quantification
Hazard
Identified
Identify
Associated
Harm
Source of
Hazard
Human Factors
Technical
Regulatory
Usability
Apply Four Strategies
OutputIdentified
Requirements
Risks to be
Processed Further
Risk
Output
Risk
Transfer
Risk
Avoidance
Risk
Limitation
Risk
Acceptance
cognizant 20-20 insights 7
Implementing the four strategies described here
(limitation, transfer, avoidance and acceptance)
can further reduce the number of risks. This raises
the question, “If these strategies can be applied
at once, in a single phase, why apply repetitively?”
The answer is that the risks analyzed at each stage
of product development become more detailed
as product development progresses through dif-
ferent phases. Take the example of the risk that
“readings are not visible on a display screen.”
While this could be considered a high risk during
the requirements-gathering phase, it could not be
classified as a design requirement because the
problem could be traced to various root causes.
These risks should be analyzed and identified
through a fault tree analysis, which can confirm
the cause of the risk, be it due to the inclination of
the display screen, the screen’s level of clarity, or
a hardware or software issue, for example.
New risks should be managed alongside mitiga-
tion strategies. “Inclination of the display screen”
could be converted to a requirement; hardware
and software problems could be transferred to
the appropriate vendor. “Display screen not clear”
could be dealt with either by accepting or avoiding
the risk. A risk-avoidance strategy might involve
adding an extra shield to avoid dust accumula-
tion and an extra layer of protection, for example.
These measures are then converted into require-
ments, which can be applied to the concepts. If
needed, further analysis can be carried forward.
This process not only reduces the volume of risks,
but also ensures that the right tools are employed
to mitigate them in the early phases of product
design. It would be unwise and ineffective to ana-
lyze a risk through fault tree analysis when there
is no possibility of various fault modes. Similarly,
FMEA cannot be used for risk identification, since
its purpose is to evaluate risk.
Not all risks identified at the conclusion of
requirements-gathering can be managed through
FTA; Those that require more detailed analysis
using tools like FTA and ETA are handled during
the concept phase, which does not entail much
risk. However, the comparative decrease in risk
is the result of a proactive, rather than reactive,
approach to risk mitigation.
Detailing Design & Optimization
In the requirements-gathering phase, risk is typi-
cally analyzed at the product level, whereas in the
concept phase, it is assessed at the subsystem and
component levels. Risk analysis is handled from
the top down until the concept phase. The next
step is analyzing risk from the component level
to the top levels (i.e., from bottom to top) using
FMEA, HACCP and HAZOP tools. In this stage
of product development, failures are converted
into action items. Risk limitation and risk avoid-
ance strategies are generally deployed during this
stage.
Through FMEA, risk priorities are quantified and
action items identified against it. For example,
a medical device that takes input from a user
through a button can experience various commu-
nication failures, which are initially analyzed using
FTA. The results indicate “improper assembly of
buttons,” “buttons hard to operate” and “loose
connection between the button and the board.”
Figure 7
Fault Tree Analysis
Apply Four Strategies
Identified
RequirementsTop Event
Identify
Various
Consequences
Risks
Identified
Risks to be
Processed Further
Risk
Risk
Transfer
Risk
Avoidance
Risk
Limitation
Risk
Acceptance
cognizant 20-20 insights 8
These issues can be drilled down further in FMEA.
For instance, the anticipated failure “buttons hard
to operate” can be resolved with another, more
appropriate material or through a design change.
“Loose connections” and “improper assembly”
can be avoided through poka-yoke features,
which provide a fail-safe method for preventing
errors.
A good practice for companies to follow during
the decision-making process or when proposing
an action item in a failure mode and effects analy-
sis is to refer to industry publications, databases
and technical forums that offer relevant informa-
tion on a product or product failures. Addressing
risks through appropriate use of risk-controlling
tools can help MDD companies move forward with
more confidence and less assumptions, which
lessens the risk of product failure in the valida-
tion phase.
Apart from the business requirement and
intended use, risk quantification and action items
that are identified through the tools we described
will play a major role in developing a detailed,
risk-averse design. Figure 8 shows how the four
strategies we cited can be applied to reduce the
volume of risks using a failure mode and effects
analysis. At this point, risks are already identified
and processed; we only evaluate risk in this phase.
The design engineer will ensure that the design
is incorporated, and identify the necessary action
items to avoid risk. Once the design is completed,
the team creates a virtual design, which often
reveals that additional changes are needed. At
this stage, iterations
to the design should
be minimal, but none-
theless help ensure
that risks are limited
and avoided.
Design Verification & Validation
No matter how effectively proactive risk assess-
ment is embraced and executed, possibilities still
exist for risks to flow into the validation phase.
This issue can originate at the risk-transfer and
risk-acceptance stage, or be the result of poor
design assumptions. Here, the goal is to address
all risks and bring in a solution without modifying
the overall design.
The objective is to correlate risk with real-world
scenarios and assess how they could have been
proactively mitigated early on using the tools we
cited earlier.
These examples help build confidence in the sig-
nificance of upstream risk management tools,
which can reduce the time and cost of new prod-
uct development (see Figure 9, next page).
Looking Forward
The FDA has set huge expectations for medical
device companies on the risk-management front.
These expectations can be met by applying new
concepts and theories to make the process more
effective. Potential areas of investigation include:
•	 Addressing the need for a risk-management
model in line with ISO 14971, which is capable
of controlling risk at each and every phase.
The fewer assumptions
made, the less the risk
of product failure in the
validation phase.
Figure 8
Failure Mode & Effects Analysis
Apply Four Strategies
Quantify
Risks Based
on RPN
Severity
Occurrence
Detection
Risks Identified
Action Items
Risk
Risk
Transfer
Risk
Avoidance
Risk
Limitation
Risk
Acceptance
cognizant 20-20 insights 9
Proactive Risk Management
S.no
Risks that can be converted to
action items before FMEA
Application of Upstream tools
Scenario
Problem
Detected in the
Downstream
Process
Foreseeable
Consequences/Causes
Risk
Identification
Through PHA
FTA Action Item/s for Design
1
A medical
device uses a
rubber keypad
or common
base to com-
municate user
input.
The user’s input
is incorrect.
•	Ineffective communication
caused by human error at
the back end.
•	Tactile buttons are adja-
cent to one another; while
using one button, the
user mistakenly activates
another.
Inappropriate
functionality.
A fault tree analysis (FTA)
could have helped avoid
these consequences.
Output from a preliminary
hazard analysis (PHA)
could be used to identify
and resolve the issue
through appropriate
action items.
•	Rubber keypad base
should have sufficient
distance between buttons
— helping to eliminate the
potential for error.
•	If possible, see that keypad
buttons do not share a
common base.
•	Alternative keypads with
high response and low
error rates can be used.
•	Control critical dimensions
of the rubber pad.
•	Perform a lifecycle test of
the rubber pad.
2
A medical
device uses
tubes for trans-
porting fluid
(liquid or air).
Fluid leakage.
•	Degradation of tubes.
•	Unexpected pressure of
the fluid.
•	Improper maintenance.
•	Chemical reaction be-
tween the tubes and the
fluid.
Exposure
to reactive
fluids(alkalis/
acids).
Exposure to high-
pressure fluids.
A fault tree analysis (FTA)
could have helped avoid
these consequences.
Output from a preliminary
hazard analysis (PHA)
could be used to identify
and resolve the issue
through appropriate
action items.
•	Material selection should
consider reactive fluids.
•	Assembly of the tubes
should withstand worst-
case scenarios identified.
3
An enclosure
ruptures after
being used for
only a short
period of time.
Enclosures fail
due to lack of
stability to bear
the vibrational
load.
Considering the possibility
of many root causes, FTA
is used.
Structural
instability.
Action items identified by
using FTA:
•	Inappropriate material.
•	Vibration not considered
a primary noise factor.
•	Enclosure not designed
for worst-case situations
•	Manufacturing defect.
•	Sudden variation in
vibration due to mal-
functioning pump.
•	Appropriate material
selection.
•	Thorough design consid-
erations.
•	High-quality pump with
good durability.
4
A medical
device shows
low accuracy/
high error or
deviation.
Errors due to
improper calibra-
tion.
•	Use of non-standard cali-
bration device.
•	Improper method of cali-
brating.
•	Defective calibrating
device.
Inappropriate
output/
functionality.
Foreseeable conse-
quences are not many
using FTA.
Employ a high-quality cali-
brating device.
5
Exposed plug-in
points or USB
port.
Users experience
shock.
•	Earth leakage current
•	Enclosure leakage current.
•	Patient leakage current.
Current leakage.
•	Improper grounding.
Single-fault condition
failure.
•	Defective parts.
•	Improper measuring
devices (which measure
voltage/current).
•	Insulation not provided.
Leakage tests not per-
formed.
The output from FTA can be
used as action items here.
Figure 9
•	 Managing risk upstream — from requirements-
gathering to concept-generation — to reduce
the time and costs involved in new product
development.
•	 Applying risk management in conjunction with
design controls.
•	 Applying all necessary risk-management tools
at all levels to avoid and overcome hazards.
When properly applied, these practices can mini-
mize the probability of unexpected or harmful
events and improve a company’s overall benefit-
risk profile.
About Cognizant
Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process out-
sourcing services, dedicated to helping the world’s leading companies build stronger businesses. Headquartered in
Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry
and business process expertise, and a global, collaborative workforce that embodies the future of work. With over
100 development and delivery centers worldwide and approximately 221,700 employees as of December 31, 2015,
Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked
among the top performing and fastest growing companies in the world. Visit us online at www.cognizant.com or follow
us on Twitter: Cognizant.
World Headquarters
500 Frank W. Burr Blvd.
Teaneck, NJ 07666 USA
Phone: +1 201 801 0233
Fax: +1 201 801 0243
Toll Free: +1 888 937 3277
Email: inquiry@cognizant.com
European Headquarters
1 Kingdom Street
Paddington Central
London W2 6BD
Phone: +44 (0) 20 7297 7600
Fax: +44 (0) 20 7121 0102
Email: infouk@cognizant.com
India Operations Headquarters
#5/535, Old Mahabalipuram Road
Okkiyam Pettai, Thoraipakkam
Chennai, 600 096 India
Phone: +91 (0) 44 4209 6000
Fax: +91 (0) 44 4209 6060
Email: inquiryindia@cognizant.com
­­© Copyright 2016, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is
subject to change without notice. All other trademarks mentioned herein are the property of their respective owners.	 TL Codex 1756
Footnotes
1	 http://www.iso.org/iso/catalogue_detail?csnumber=38193.
2	 “Risk Management Current Thinking and Practices.” https://www.pda.org/docs/default-source/website-
document-library/chapters/presentations/ireland/risk-management-current-thinking-and-experiences.
pdf?sfvrsn=6.
3	 “Four Types of Risk Mitigation.” http://www.mha-it.com/2013/05/four-types-of-risk-mitigation/.
4	 “Use and Misuse of FMEA.” http://www.mddionline.com/article/use-and-misuse-fmea-risk-analysis/.
5	 “Basics of Medical Device Risk Management.” http://www.mddionline.com/article/basics-medical-device-
risk-management.
Reference
•	“Guidance for Industry Q9 Quality Risk Management,” FDA Guideline, June, 2006.
About the Authors
Madan Unde is a Senior Manager of Projects, within the Product Engineering Practice of Cognizant’s
Engineering and Manufacturing Solutions business unit. He has over 13 years of engineering industry
experience, working in both the engineering OEM as well as engineering services. Madan’s work experi-
ence spans industries — from life sciences (medical devices), high technology and industrial automation,
to machine tools. In these roles, he has provided solutions across various technical areas, including prod-
uct design and development, innovation (front end), continuous improvement, complaints investigation
and resolution, CAPA management and product sustenance engineering. Madan is well acquainted with
medical-devices standards such as e ISO13485 and ISO14971, and practices like Six Sigma, DFx, Risk
Management, Value Engineering / Value Analysis and Problem Solving. Madan holds a mechanical engi-
neering and industrial engineering post graduate from the University of Pune and is a certified, Six Sigma
Black Belt Professional (MSME India) and Value Engineering Associate Value Specialist (SAVE & INVEST).
He can be reached at Madan.Unde@cognizant.com.
Ujjain Kumar Bidila is an Associate within the Product Engineering Practice of Cognizant’s Engineering
and Manufacturing Solutions business unit. He has over eight years of experience in engineering
services, and currently focuses on applying risk management practices in the medical device space.
Previously, he worked as a value engineer and a cost reduction engineer. Ujjain has experience working
with international clients in new product development, and brings a strong understanding of Six Sigma
and value engineering to his client work, where his experience spans the heavy-engineering, appli-
ances and medical-device industries. He received a degree in mechanical engineering from Jawaharlal
Technological University. Ujjain can be reached at UjjainKumar.B@cognizant.com.

More Related Content

What's hot

Clinically Integrated Supply Chain
Clinically Integrated Supply ChainClinically Integrated Supply Chain
Clinically Integrated Supply ChainFajar Anzari
 
C suite of the future barbara anderman
C suite of the future barbara andermanC suite of the future barbara anderman
C suite of the future barbara andermanTrimed Media Group
 
Serialization: Driving Business Value Beyond Compliance
Serialization: Driving Business Value Beyond ComplianceSerialization: Driving Business Value Beyond Compliance
Serialization: Driving Business Value Beyond ComplianceCognizant
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in PharmaDhiren Gala
 
Fighting FWA in the Payer Industry Using Big Data
Fighting FWA in the Payer Industry Using Big DataFighting FWA in the Payer Industry Using Big Data
Fighting FWA in the Payer Industry Using Big DataCitiusTech
 
Member Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health PlansMember Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health PlansCitiusTech
 
IRJET- Importance of IT in Supply Chain Management Improvement
IRJET- Importance of IT in Supply Chain Management ImprovementIRJET- Importance of IT in Supply Chain Management Improvement
IRJET- Importance of IT in Supply Chain Management ImprovementIRJET Journal
 
Prescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsPrescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsCognizant
 
Nine Novel Tactics for Software Product Managment in the New Digital Age
Nine Novel Tactics for Software Product Managment in the New Digital AgeNine Novel Tactics for Software Product Managment in the New Digital Age
Nine Novel Tactics for Software Product Managment in the New Digital AgeCognizant
 
Health insurance compliance
Health insurance complianceHealth insurance compliance
Health insurance complianceMetricStream Inc
 
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...Cognizant
 
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...Covance
 
From Chaos to Catalyst: Five Imperatives for Healthcare
From Chaos to Catalyst: Five Imperatives for HealthcareFrom Chaos to Catalyst: Five Imperatives for Healthcare
From Chaos to Catalyst: Five Imperatives for HealthcareCognizant
 
EMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC
 
Virtusa Provider Lifecycle Management
Virtusa Provider Lifecycle ManagementVirtusa Provider Lifecycle Management
Virtusa Provider Lifecycle ManagementVirtusa Corporation
 
2016 MIPS Final Rule: What you need to know NOW
2016 MIPS Final Rule: What you need to know NOW2016 MIPS Final Rule: What you need to know NOW
2016 MIPS Final Rule: What you need to know NOWBen Quirk
 

What's hot (20)

Clinically Integrated Supply Chain
Clinically Integrated Supply ChainClinically Integrated Supply Chain
Clinically Integrated Supply Chain
 
C suite of the future barbara anderman
C suite of the future barbara andermanC suite of the future barbara anderman
C suite of the future barbara anderman
 
Serialization: Driving Business Value Beyond Compliance
Serialization: Driving Business Value Beyond ComplianceSerialization: Driving Business Value Beyond Compliance
Serialization: Driving Business Value Beyond Compliance
 
Business Intelligence in Pharma
Business Intelligence in PharmaBusiness Intelligence in Pharma
Business Intelligence in Pharma
 
Fighting FWA in the Payer Industry Using Big Data
Fighting FWA in the Payer Industry Using Big DataFighting FWA in the Payer Industry Using Big Data
Fighting FWA in the Payer Industry Using Big Data
 
Member Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health PlansMember Engagement Using Sentiment Analysis for Health Plans
Member Engagement Using Sentiment Analysis for Health Plans
 
Risk_Technology
Risk_TechnologyRisk_Technology
Risk_Technology
 
IRJET- Importance of IT in Supply Chain Management Improvement
IRJET- Importance of IT in Supply Chain Management ImprovementIRJET- Importance of IT in Supply Chain Management Improvement
IRJET- Importance of IT in Supply Chain Management Improvement
 
Optum Award Write Up
Optum Award Write UpOptum Award Write Up
Optum Award Write Up
 
Prescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOsPrescriptions for Healthcare's Digital CIOs
Prescriptions for Healthcare's Digital CIOs
 
Nine Novel Tactics for Software Product Managment in the New Digital Age
Nine Novel Tactics for Software Product Managment in the New Digital AgeNine Novel Tactics for Software Product Managment in the New Digital Age
Nine Novel Tactics for Software Product Managment in the New Digital Age
 
Health insurance compliance
Health insurance complianceHealth insurance compliance
Health insurance compliance
 
Solution for effective revenue cycle management
Solution for effective revenue cycle managementSolution for effective revenue cycle management
Solution for effective revenue cycle management
 
The 10 most innovative healthcare solution providers 2019
The 10 most innovative healthcare solution providers 2019The 10 most innovative healthcare solution providers 2019
The 10 most innovative healthcare solution providers 2019
 
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...
A Practical Approach for Power Utilities Seeking to Create Sustaining Busines...
 
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
Pharmacovigilance Smart Sourcing Strategy: Vendor Selection for Safety & Risk...
 
From Chaos to Catalyst: Five Imperatives for Healthcare
From Chaos to Catalyst: Five Imperatives for HealthcareFrom Chaos to Catalyst: Five Imperatives for Healthcare
From Chaos to Catalyst: Five Imperatives for Healthcare
 
EMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial ModelEMC Perspective: Big Data Transforms the Life Science Commercial Model
EMC Perspective: Big Data Transforms the Life Science Commercial Model
 
Virtusa Provider Lifecycle Management
Virtusa Provider Lifecycle ManagementVirtusa Provider Lifecycle Management
Virtusa Provider Lifecycle Management
 
2016 MIPS Final Rule: What you need to know NOW
2016 MIPS Final Rule: What you need to know NOW2016 MIPS Final Rule: What you need to know NOW
2016 MIPS Final Rule: What you need to know NOW
 

Similar to Accelerating the Development of Medical Devices: The Value of Proactive Risk Management

Running the risk | Insight, issue 2
Running the risk | Insight, issue 2Running the risk | Insight, issue 2
Running the risk | Insight, issue 2Team Consulting Ltd
 
Quality Management System.pptx
Quality Management System.pptxQuality Management System.pptx
Quality Management System.pptxDipansiTembharne
 
Quality risk management
Quality risk managementQuality risk management
Quality risk managementKarunaMane1
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentAshvin Bhoge
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesKeerthi Gunasekaran
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
ISO: 14971 Quality risk management of medical devices
ISO: 14971 Quality risk management  of medical devicesISO: 14971 Quality risk management  of medical devices
ISO: 14971 Quality risk management of medical devicesAtul Bhombe
 
Qualification of analytical instrument UV spectrophotometer.pptx
Qualification of analytical instrument UV spectrophotometer.pptxQualification of analytical instrument UV spectrophotometer.pptx
Qualification of analytical instrument UV spectrophotometer.pptxAjayGhuge9
 
Risk managements documents required for the market placement of a medical dev...
Risk managements documents required for the market placement of a medical dev...Risk managements documents required for the market placement of a medical dev...
Risk managements documents required for the market placement of a medical dev...PEPGRA Healthcare
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systemsScott Althouse
 
Quality Risk Management.pptx
Quality Risk Management.pptxQuality Risk Management.pptx
Quality Risk Management.pptxSyedMohammadRahat
 
Session 08_Risk Assessment Program for YSP_Risk Treatment and Communication
Session 08_Risk Assessment Program for YSP_Risk Treatment and CommunicationSession 08_Risk Assessment Program for YSP_Risk Treatment and Communication
Session 08_Risk Assessment Program for YSP_Risk Treatment and CommunicationMuizz Anibire
 
IRJET- Assessing the Workplace Risk in Food Industry
IRJET-  	  Assessing the Workplace Risk in Food IndustryIRJET-  	  Assessing the Workplace Risk in Food Industry
IRJET- Assessing the Workplace Risk in Food IndustryIRJET Journal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxprasannroy1
 

Similar to Accelerating the Development of Medical Devices: The Value of Proactive Risk Management (20)

Running the risk | Insight, issue 2
Running the risk | Insight, issue 2Running the risk | Insight, issue 2
Running the risk | Insight, issue 2
 
Quality Management System.pptx
Quality Management System.pptxQuality Management System.pptx
Quality Management System.pptx
 
Quality risk management
Quality risk managementQuality risk management
Quality risk management
 
Hazards and risk management
Hazards and risk managementHazards and risk management
Hazards and risk management
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangment
 
Understanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical DevicesUnderstanding Risk Management & Cyber security Principles in Medical Devices
Understanding Risk Management & Cyber security Principles in Medical Devices
 
9 .docx
9                                   .docx9                                   .docx
9 .docx
 
18 .docx
18                                  .docx18                                  .docx
18 .docx
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
ISO: 14971 Quality risk management of medical devices
ISO: 14971 Quality risk management  of medical devicesISO: 14971 Quality risk management  of medical devices
ISO: 14971 Quality risk management of medical devices
 
Qualification of analytical instrument UV spectrophotometer.pptx
Qualification of analytical instrument UV spectrophotometer.pptxQualification of analytical instrument UV spectrophotometer.pptx
Qualification of analytical instrument UV spectrophotometer.pptx
 
Risk managements documents required for the market placement of a medical dev...
Risk managements documents required for the market placement of a medical dev...Risk managements documents required for the market placement of a medical dev...
Risk managements documents required for the market placement of a medical dev...
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systems
 
Quality Risk Management.pptx
Quality Risk Management.pptxQuality Risk Management.pptx
Quality Risk Management.pptx
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
Session 08_Risk Assessment Program for YSP_Risk Treatment and Communication
Session 08_Risk Assessment Program for YSP_Risk Treatment and CommunicationSession 08_Risk Assessment Program for YSP_Risk Treatment and Communication
Session 08_Risk Assessment Program for YSP_Risk Treatment and Communication
 
IRJET- Assessing the Workplace Risk in Food Industry
IRJET-  	  Assessing the Workplace Risk in Food IndustryIRJET-  	  Assessing the Workplace Risk in Food Industry
IRJET- Assessing the Workplace Risk in Food Industry
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
ETPM1
ETPM1ETPM1
ETPM1
 

More from Cognizant

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Cognizant
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingCognizant
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesCognizant
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition EngineeredCognizant
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...Cognizant
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesCognizant
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateCognizant
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...Cognizant
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Cognizant
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityCognizant
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersCognizant
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalCognizant
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueCognizant
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachCognizant
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudCognizant
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedCognizant
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the FutureCognizant
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformCognizant
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...Cognizant
 

More from Cognizant (20)

Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
Using Adaptive Scrum to Tame Process Reverse Engineering in Data Analytics Pr...
 
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-makingData Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
Data Modernization: Breaking the AI Vicious Cycle for Superior Decision-making
 
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional ExperiencesIt Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
It Takes an Ecosystem: How Technology Companies Deliver Exceptional Experiences
 
Intuition Engineered
Intuition EngineeredIntuition Engineered
Intuition Engineered
 
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
The Work Ahead: Transportation and Logistics Delivering on the Digital-Physic...
 
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital InitiativesEnhancing Desirability: Five Considerations for Winning Digital Initiatives
Enhancing Desirability: Five Considerations for Winning Digital Initiatives
 
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility MandateThe Work Ahead in Manufacturing: Fulfilling the Agility Mandate
The Work Ahead in Manufacturing: Fulfilling the Agility Mandate
 
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
The Work Ahead in Higher Education: Repaving the Road for the Employees of To...
 
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...Engineering the Next-Gen Digital Claims Organisation for Australian General I...
Engineering the Next-Gen Digital Claims Organisation for Australian General I...
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for Sustainability
 
Policy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for InsurersPolicy Administration Modernization: Four Paths for Insurers
Policy Administration Modernization: Four Paths for Insurers
 
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with DigitalThe Work Ahead in Utilities: Powering a Sustainable Future with Digital
The Work Ahead in Utilities: Powering a Sustainable Future with Digital
 
AI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to ValueAI in Media & Entertainment: Starting the Journey to Value
AI in Media & Entertainment: Starting the Journey to Value
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
 
Five Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the CloudFive Priorities for Quality Engineering When Taking Banking to the Cloud
Five Priorities for Quality Engineering When Taking Banking to the Cloud
 
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining FocusedGetting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
Getting Ahead With AI: How APAC Companies Replicate Success by Remaining Focused
 
Crafting the Utility of the Future
Crafting the Utility of the FutureCrafting the Utility of the Future
Crafting the Utility of the Future
 
Utilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data PlatformUtilities Can Ramp Up CX with a Customer Data Platform
Utilities Can Ramp Up CX with a Customer Data Platform
 
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
The Work Ahead in Intelligent Automation: Coping with Complexity in a Post-Pa...
 

Accelerating the Development of Medical Devices: The Value of Proactive Risk Management

  • 1. Accelerating the Development of Medical Devices: The Value of Proactive Risk Management For medical-device manufacturers, fast-tracking product development requires controls and processes that address risks early on, reduce exposures, and improve the odds of success in the marketplace. Executive Summary For medical-device manufacturers worldwide, risk management must be preemptive and detailed. The U.S. Federal Drug Administration (FDA) requires adherence to the industry’s cur- rent risk-management standard (ISO 14971: 2007-Application of Risk Management to Medical Devices), which specifies a process for identifying, assessing and controlling risk. These require- ments apply throughout the life of a medical device.1 While statistics show that 60% of risk manage- ment takes place in the detailed design phase, only 30% of medical-device companies employ it during concept development.2 Spotting risks after problems arise, at the validation stage, is a reactive approach that in our view is sub-optimal. Identifying hazards and working to mitigate them during the initial phases of new product develop- ment can help alleviate issues down the road. There is also the possibility of running into risks prior to concept development, when companies gather customer, technology and regulatory requirements. If appropriately managed, these exposures can be effectively dealt with very early in the product lifecycle. This can result in “risk-proof concepts” driven by four risk-mitiga- tion strategies: risk limitation, risk transfer, risk avoidance and risk acceptance.3 Using these four strategies, companies can evaluate risk effec- tively and reduce the time and cost associated with new product development (NPD). This white paper offers a proactive approach that medical-device companies can use to identify, treat and resolve risks upstream, in the earlier stages of product development, by categorizing them as requirements or constraints. Our method is based on best practices and the experience we have gained in numerous client engagements across the medical-device field. Risk Prioritization, Mitigation & Cost In the global medical-device industry, proactive risk management is critical to maximizing value and fast-tracking new product development upstream. Risk prioritization, mitigation and cost are three interlinked dimensions typically used to deal with this issue. They play a major role in determining if risk should be limited, transferred, avoided or cognizant 20-20 insights | march 2016 • Cognizant 20-20 Insights
  • 2. High Medium Low Risk Prioritization (Severity & Occurrence) Risk Cost Impact Risk Mitigation Impact cognizant 20-20 insights 2 accepted. Figure 1 illustrates how these strategies can be applied, depending on the priority of the risk and the cost involved to control it. Usually, managing a high risk consumes more costs. In this situation, companies can attempt to split the risk by applying various combinations of the aforementioned strategies. Similarly, risks that are deemed limited, transferrable, avoidable, or acceptable must be sorted. Once this is done, the actions required to limit and/or avoid the risk can be proposed. Risk analysis as such is not a primary activity, but part of the risk-assessment phase. Prior to risk assessment, business needs and intended use must be confirmed. At this point, various require- ments are gathered, followed by risk assessment and evaluation. In our view, defining intended use, analyzing preliminary hazards and evaluating risk before the detailed design phase are upstream activities. The concept we propose emphasizes accelerating new product development (NPD) by controlling risk during this stage, as described in the following section. Upstream Activities Upstream activities include the following tasks: • Defining intended use. Intended use is the basis for any medical-product design, and the reference for all design activities that follow. Intended use or indication for use can apply to a clinical condition that a device is intended to help diagnose, treat, reconstruct or improve upon. Once defined, the next step is to gather requirements. • Requirements-gathering analysis. Require- ments and intended use go hand in hand, since the design of a medical device is constructed around requirement specifications. A predicate study of an equivalent, or virtually equivalent, model and a benchmarking analysis can also be useful when gathering technical require- ments. Regulatory requirements are based on industry standards, specific geographic regula- tions, functional requirements, the class of the device, intended use and the user environment. Figure 1 Weighing Risk High Medium Low High Medium Low Acceptance Avoidance Transfer Limitation
  • 3. cognizant 20-20 insights 3 • Developing a risk management plan. An effective risk management plan typically relies on numerous strategies to define various risk scenarios, acceptability criteria and targets so that risks can be resolved or headed off early on. Sufficient time and effort should be given to evaluating realistic scenarios and timelines ratherthanmakingassumptions.(Newproducts typically fail due to improper planning, unreal- istic timelines, infrastructure shortcomings, communication disconnects among cross-func- tional teams, and/or insufficient knowledge of the product and product standards. Using non- conformed medical devices can result in any number of hazards, including inherently risky medical treatment, device failures/malfunc- tions and poor interactions between the device and users. If risk management is viewed as a mere formality, mainstream risk identification can be overlooked — often requiring companies to revisit their risk-management tools. A risk- management expert is expected to anticipate all the foreseeable consequences and events that can occur during the entire NPD process. Incorporating human factors engineering (HFE) into risk management can help identify most device- and use-related hazards (see Figure 2). Figure 2 Identifying Device and Use-Related Hazards Hazard | Anything that can cause harm Risk | How great the chance that someone will be harmed by the hazard HFE aligns the design of devices, systems and working conditions with the capabilities and requirements of users. This takes place in the development stage, which must take into account a device’s technologies, human interactions, the environment in which the technology will be used, potential dangers and, of course, the criticality of patient care. • Risk evaluation. The risk-evaluation process can involve qualitative decision making or a quantitative assessment applying probabilistic and statistical tools. Depending on the depth and complexity of the assessment, practitio- ners can use a number of tools: comparison matrix (CM); fault tree analysis (FTA); event tree analysis (ETA); failure mode and effects analysis (FMEA); hazard analysis and operabil- ity study (HAZOP); or a hazard analysis critical control point study (HACCP) (see Figure 3). Figure 3 (next page) depicts a risk-management tools matrix that can be applied in various stages of product development. An Ishikawa diagram can be used in almost all phases to identify associated risks. PHA (preliminary hazard analysis) can be employed in design planning, retrofitting design development and to enhance existing designs, for example. CM, REM and FMEA can be used once risks have been identified, and applied in various phases to determine marketing, design and process exposures. HACCP and HAZOP can be employed in different stages once risks are ascertained.
  • 4. 4cognizant 20-20 insights Problem Definition If upstream activities related to risk management are wrongly perceived as adding less value, they may be deemed unworthy of further exploration. In fact, it is likely that risk-management practitio- ners consider FMEA as the only significant tool they need, and ignore attempts to assess risk until the design has matured.4 Low-risk medical devices (whether used in hospital settings or busi- ness/safety-related environments) do not apply to this discussion. Managing Risk at Every Stage New product development typically starts with identifying a set of risks (negative voice of cus- tomer, unknown vulnerabilities from a new technology or mechanism, a first-in-market chal- lenge, for example). Apart from these concerns, there are the risks associated with usability, energy interactions, regulatory mandates and system integration, which must be analyzed before product design begins and prior to the concept phase. In Figure 4, the slope (red line) in the first two phases means that risks are identi- fied, but not assessed and controlled. Figure 3 A Subset of Risk Management Tools Used in Product Development Figure 4 Proactive Risk Management Upstream Activities (Top-Bottom) Downstream Activities (Bottom-Top) VolumeofRisks Requirements Gathering & Analysis PHA Concept Generation & Selection FTA Detail Design & Optimization xFMEA HAACP Design V & V xFMEA HAZOP NPD Phases Reactive Proactive More iterations in the design cycle as more risks are encountered. Proactive application of risk management reduces the volume of risks. GAP: Risks transferred or converted to requirements. Volume of risks increases since they are not acted upon. (A reactive approach). Less iterations and fewer risks through a proactive approach. Ishikawa Failure Mode & Effects Analysis Preliminary Hazard Analysis Comparison Matrix Risk Evaluation Matrix Fault Tree Analysis Design & Development Planning Design Input Design Output Design Verification & Validation Design Transfer
  • 5. cognizant 20-20 insights 5 Figure 5 Primary Risk Strategies Risk Transfer Risk Avoidance Risk Limitation Risk Acceptance Risk To clarify, consider this scenario: A customer is unhappy with the weight of a portable medical device. If the device engineer doesn’t address this issue during the concept phase, rework will be required at a later stage — carrying the risk forward. Risks that can be addressed in the initial phases of product design are represented in the larger slope in Figure 4 (previous page). The wavy lines in Figure 4 represent rework. In our experience, this is usually caused by delaying the implementation of risk-mitigation strategies. For example, if the housing of a medical device is burned in a “heat distortion” or “burn out“ test, changing the material will be proposed — poten- tially leading to changes in the design. Earlier in the process, the material did not suit the ther- mal requirements — forcing the team to find an alternative. Dealing with risk effectively in each phase can reduce the time and costs associated with overall design-implementation and rework.5 As mentioned earlier and illustrated in Figure 5 below, this involves four main strategies: risk limitation, risk transfer, risk avoidance and risk acceptance. To address the risks cited earlier, we recommend the following: • Requirements-gathering and analysis: This is the stage where MDD companies confirm requirements based on a device’s intended use, applicability and class. This helps assure the viability of the input during concept and design. Once requirements are collected, we recommend a preliminary analysis to help anticipate and detect hazards, confirm their primary cause, and more accurately identify and quantify risk (see Figure 6, next page). During this initial stage, risks can be ranked as high, medium or low. Each risk must then be analyzed to determine if it is limited, should be transferred, avoided or accepted. As discussed, the application of risk-mitigation strategies in the requirements-gathering phase involves the following: Risk Limitation Consider a portable medical device that proj- ects readouts on a display screen. If there is a potential issue regarding visibility, it could have been detected much earlier at the requirements- gathering phase. Action items for limiting the
  • 6. cognizant 20-20 insights 6 level of risk could then be determined and addressed. For example: • Adjusting the angle of the screen. • Enlarging the size of the screen font. • Adjusting the clarity of the screen. Risk Transfer A risk-transfer strategy can be applied in cases that require a third party. A medical device that involves a pump has a high level of risk during the design and development stage. Managing risk can be time-consuming and costly. It makes sense to transfer the task to a capable external source. Risk Avoidance In some instances risk should be avoided at all costs. For example, an MRI machine emits pow- erful magnetic fields that must be carefully controlled during the imaging process to protect the patient, as well as the medical staff, in the MRI suite. Risk avoidance is a top priority, and a strat- egy that must be applied at every stage of design and development. Risk Acceptance A risk acceptance strategy is appropriate when, for example, a medical device permeates sensible heat (heat that alters a body’s temperature with- out causing harm). Prepared and Proactive Addressing risk through the aforementioned strategies can head off hazards and set require- ments before concept development — affording the opportunity to apply actions at the initial phase of NPD. During requirements-gathering, risks are vali- dated at the unit level, since the design is in the very early stages. By taking a proactive approach to risk management, companies can transfer risks, convert them into requirements, or elimi- nate them — reducing the number of potential and real hazards they have to deal with. Risks converted to action items become input for prod- uct requirement specification (PRS), which serves as the basis for concept generation. Concept Generation and Selection In order to convert a risk into an action item, it must first be analyzed to determine its root cause. If the issue that originated at the subsystem level is identified at the component level, failures or accidents could be attributed to various factors. To mitigate these risks, we use tools such as fault tree analysis (FTA) and event tree analysis (ETA), as shown in Figures 7 and 8 on the following pages. These can be applied in parallel during the concept phase. Figure 6 Preliminary Hazard Analysis FORSEEABLECONSEQUENCES High Level Risk Quantification Hazard Identified Identify Associated Harm Source of Hazard Human Factors Technical Regulatory Usability Apply Four Strategies OutputIdentified Requirements Risks to be Processed Further Risk Output Risk Transfer Risk Avoidance Risk Limitation Risk Acceptance
  • 7. cognizant 20-20 insights 7 Implementing the four strategies described here (limitation, transfer, avoidance and acceptance) can further reduce the number of risks. This raises the question, “If these strategies can be applied at once, in a single phase, why apply repetitively?” The answer is that the risks analyzed at each stage of product development become more detailed as product development progresses through dif- ferent phases. Take the example of the risk that “readings are not visible on a display screen.” While this could be considered a high risk during the requirements-gathering phase, it could not be classified as a design requirement because the problem could be traced to various root causes. These risks should be analyzed and identified through a fault tree analysis, which can confirm the cause of the risk, be it due to the inclination of the display screen, the screen’s level of clarity, or a hardware or software issue, for example. New risks should be managed alongside mitiga- tion strategies. “Inclination of the display screen” could be converted to a requirement; hardware and software problems could be transferred to the appropriate vendor. “Display screen not clear” could be dealt with either by accepting or avoiding the risk. A risk-avoidance strategy might involve adding an extra shield to avoid dust accumula- tion and an extra layer of protection, for example. These measures are then converted into require- ments, which can be applied to the concepts. If needed, further analysis can be carried forward. This process not only reduces the volume of risks, but also ensures that the right tools are employed to mitigate them in the early phases of product design. It would be unwise and ineffective to ana- lyze a risk through fault tree analysis when there is no possibility of various fault modes. Similarly, FMEA cannot be used for risk identification, since its purpose is to evaluate risk. Not all risks identified at the conclusion of requirements-gathering can be managed through FTA; Those that require more detailed analysis using tools like FTA and ETA are handled during the concept phase, which does not entail much risk. However, the comparative decrease in risk is the result of a proactive, rather than reactive, approach to risk mitigation. Detailing Design & Optimization In the requirements-gathering phase, risk is typi- cally analyzed at the product level, whereas in the concept phase, it is assessed at the subsystem and component levels. Risk analysis is handled from the top down until the concept phase. The next step is analyzing risk from the component level to the top levels (i.e., from bottom to top) using FMEA, HACCP and HAZOP tools. In this stage of product development, failures are converted into action items. Risk limitation and risk avoid- ance strategies are generally deployed during this stage. Through FMEA, risk priorities are quantified and action items identified against it. For example, a medical device that takes input from a user through a button can experience various commu- nication failures, which are initially analyzed using FTA. The results indicate “improper assembly of buttons,” “buttons hard to operate” and “loose connection between the button and the board.” Figure 7 Fault Tree Analysis Apply Four Strategies Identified RequirementsTop Event Identify Various Consequences Risks Identified Risks to be Processed Further Risk Risk Transfer Risk Avoidance Risk Limitation Risk Acceptance
  • 8. cognizant 20-20 insights 8 These issues can be drilled down further in FMEA. For instance, the anticipated failure “buttons hard to operate” can be resolved with another, more appropriate material or through a design change. “Loose connections” and “improper assembly” can be avoided through poka-yoke features, which provide a fail-safe method for preventing errors. A good practice for companies to follow during the decision-making process or when proposing an action item in a failure mode and effects analy- sis is to refer to industry publications, databases and technical forums that offer relevant informa- tion on a product or product failures. Addressing risks through appropriate use of risk-controlling tools can help MDD companies move forward with more confidence and less assumptions, which lessens the risk of product failure in the valida- tion phase. Apart from the business requirement and intended use, risk quantification and action items that are identified through the tools we described will play a major role in developing a detailed, risk-averse design. Figure 8 shows how the four strategies we cited can be applied to reduce the volume of risks using a failure mode and effects analysis. At this point, risks are already identified and processed; we only evaluate risk in this phase. The design engineer will ensure that the design is incorporated, and identify the necessary action items to avoid risk. Once the design is completed, the team creates a virtual design, which often reveals that additional changes are needed. At this stage, iterations to the design should be minimal, but none- theless help ensure that risks are limited and avoided. Design Verification & Validation No matter how effectively proactive risk assess- ment is embraced and executed, possibilities still exist for risks to flow into the validation phase. This issue can originate at the risk-transfer and risk-acceptance stage, or be the result of poor design assumptions. Here, the goal is to address all risks and bring in a solution without modifying the overall design. The objective is to correlate risk with real-world scenarios and assess how they could have been proactively mitigated early on using the tools we cited earlier. These examples help build confidence in the sig- nificance of upstream risk management tools, which can reduce the time and cost of new prod- uct development (see Figure 9, next page). Looking Forward The FDA has set huge expectations for medical device companies on the risk-management front. These expectations can be met by applying new concepts and theories to make the process more effective. Potential areas of investigation include: • Addressing the need for a risk-management model in line with ISO 14971, which is capable of controlling risk at each and every phase. The fewer assumptions made, the less the risk of product failure in the validation phase. Figure 8 Failure Mode & Effects Analysis Apply Four Strategies Quantify Risks Based on RPN Severity Occurrence Detection Risks Identified Action Items Risk Risk Transfer Risk Avoidance Risk Limitation Risk Acceptance
  • 9. cognizant 20-20 insights 9 Proactive Risk Management S.no Risks that can be converted to action items before FMEA Application of Upstream tools Scenario Problem Detected in the Downstream Process Foreseeable Consequences/Causes Risk Identification Through PHA FTA Action Item/s for Design 1 A medical device uses a rubber keypad or common base to com- municate user input. The user’s input is incorrect. • Ineffective communication caused by human error at the back end. • Tactile buttons are adja- cent to one another; while using one button, the user mistakenly activates another. Inappropriate functionality. A fault tree analysis (FTA) could have helped avoid these consequences. Output from a preliminary hazard analysis (PHA) could be used to identify and resolve the issue through appropriate action items. • Rubber keypad base should have sufficient distance between buttons — helping to eliminate the potential for error. • If possible, see that keypad buttons do not share a common base. • Alternative keypads with high response and low error rates can be used. • Control critical dimensions of the rubber pad. • Perform a lifecycle test of the rubber pad. 2 A medical device uses tubes for trans- porting fluid (liquid or air). Fluid leakage. • Degradation of tubes. • Unexpected pressure of the fluid. • Improper maintenance. • Chemical reaction be- tween the tubes and the fluid. Exposure to reactive fluids(alkalis/ acids). Exposure to high- pressure fluids. A fault tree analysis (FTA) could have helped avoid these consequences. Output from a preliminary hazard analysis (PHA) could be used to identify and resolve the issue through appropriate action items. • Material selection should consider reactive fluids. • Assembly of the tubes should withstand worst- case scenarios identified. 3 An enclosure ruptures after being used for only a short period of time. Enclosures fail due to lack of stability to bear the vibrational load. Considering the possibility of many root causes, FTA is used. Structural instability. Action items identified by using FTA: • Inappropriate material. • Vibration not considered a primary noise factor. • Enclosure not designed for worst-case situations • Manufacturing defect. • Sudden variation in vibration due to mal- functioning pump. • Appropriate material selection. • Thorough design consid- erations. • High-quality pump with good durability. 4 A medical device shows low accuracy/ high error or deviation. Errors due to improper calibra- tion. • Use of non-standard cali- bration device. • Improper method of cali- brating. • Defective calibrating device. Inappropriate output/ functionality. Foreseeable conse- quences are not many using FTA. Employ a high-quality cali- brating device. 5 Exposed plug-in points or USB port. Users experience shock. • Earth leakage current • Enclosure leakage current. • Patient leakage current. Current leakage. • Improper grounding. Single-fault condition failure. • Defective parts. • Improper measuring devices (which measure voltage/current). • Insulation not provided. Leakage tests not per- formed. The output from FTA can be used as action items here. Figure 9 • Managing risk upstream — from requirements- gathering to concept-generation — to reduce the time and costs involved in new product development. • Applying risk management in conjunction with design controls. • Applying all necessary risk-management tools at all levels to avoid and overcome hazards. When properly applied, these practices can mini- mize the probability of unexpected or harmful events and improve a company’s overall benefit- risk profile.
  • 10. About Cognizant Cognizant (NASDAQ: CTSH) is a leading provider of information technology, consulting, and business process out- sourcing services, dedicated to helping the world’s leading companies build stronger businesses. Headquartered in Teaneck, New Jersey (U.S.), Cognizant combines a passion for client satisfaction, technology innovation, deep industry and business process expertise, and a global, collaborative workforce that embodies the future of work. With over 100 development and delivery centers worldwide and approximately 221,700 employees as of December 31, 2015, Cognizant is a member of the NASDAQ-100, the S&P 500, the Forbes Global 2000, and the Fortune 500 and is ranked among the top performing and fastest growing companies in the world. Visit us online at www.cognizant.com or follow us on Twitter: Cognizant. World Headquarters 500 Frank W. Burr Blvd. Teaneck, NJ 07666 USA Phone: +1 201 801 0233 Fax: +1 201 801 0243 Toll Free: +1 888 937 3277 Email: inquiry@cognizant.com European Headquarters 1 Kingdom Street Paddington Central London W2 6BD Phone: +44 (0) 20 7297 7600 Fax: +44 (0) 20 7121 0102 Email: infouk@cognizant.com India Operations Headquarters #5/535, Old Mahabalipuram Road Okkiyam Pettai, Thoraipakkam Chennai, 600 096 India Phone: +91 (0) 44 4209 6000 Fax: +91 (0) 44 4209 6060 Email: inquiryindia@cognizant.com ­­© Copyright 2016, Cognizant. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the express written permission from Cognizant. The information contained herein is subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. TL Codex 1756 Footnotes 1 http://www.iso.org/iso/catalogue_detail?csnumber=38193. 2 “Risk Management Current Thinking and Practices.” https://www.pda.org/docs/default-source/website- document-library/chapters/presentations/ireland/risk-management-current-thinking-and-experiences. pdf?sfvrsn=6. 3 “Four Types of Risk Mitigation.” http://www.mha-it.com/2013/05/four-types-of-risk-mitigation/. 4 “Use and Misuse of FMEA.” http://www.mddionline.com/article/use-and-misuse-fmea-risk-analysis/. 5 “Basics of Medical Device Risk Management.” http://www.mddionline.com/article/basics-medical-device- risk-management. Reference • “Guidance for Industry Q9 Quality Risk Management,” FDA Guideline, June, 2006. About the Authors Madan Unde is a Senior Manager of Projects, within the Product Engineering Practice of Cognizant’s Engineering and Manufacturing Solutions business unit. He has over 13 years of engineering industry experience, working in both the engineering OEM as well as engineering services. Madan’s work experi- ence spans industries — from life sciences (medical devices), high technology and industrial automation, to machine tools. In these roles, he has provided solutions across various technical areas, including prod- uct design and development, innovation (front end), continuous improvement, complaints investigation and resolution, CAPA management and product sustenance engineering. Madan is well acquainted with medical-devices standards such as e ISO13485 and ISO14971, and practices like Six Sigma, DFx, Risk Management, Value Engineering / Value Analysis and Problem Solving. Madan holds a mechanical engi- neering and industrial engineering post graduate from the University of Pune and is a certified, Six Sigma Black Belt Professional (MSME India) and Value Engineering Associate Value Specialist (SAVE & INVEST). He can be reached at Madan.Unde@cognizant.com. Ujjain Kumar Bidila is an Associate within the Product Engineering Practice of Cognizant’s Engineering and Manufacturing Solutions business unit. He has over eight years of experience in engineering services, and currently focuses on applying risk management practices in the medical device space. Previously, he worked as a value engineer and a cost reduction engineer. Ujjain has experience working with international clients in new product development, and brings a strong understanding of Six Sigma and value engineering to his client work, where his experience spans the heavy-engineering, appli- ances and medical-device industries. He received a degree in mechanical engineering from Jawaharlal Technological University. Ujjain can be reached at UjjainKumar.B@cognizant.com.