SlideShare a Scribd company logo
1 of 22
Download to read offline
Risk based approach to
   electronic document
management system (EDMS)
         validation
 Presented by:
 Michael Zwetkow, VP Operations
 Montrium, Inc
Disclaimer



      The views and opinions expressed in the following PowerPoint slides are
      those of the individual presenter and should not be attributed to Drug
      Information Association, Inc. (“DIA”), its directors, officers, employees,
      volunteers, members, chapters, councils, Special Interest Area
      Communities or affiliates, or any organization with which the presenter is
      employed or affiliated.

      These PowerPoint slides are the intellectual property of the individual
      presenter and are protected under the copyright laws of the United States of
      America and other countries. Used by permission. All rights reserved. Drug
      Information Association, DIA and DIA logo are registered trademarks or
      trademarks of Drug Information Association Inc. All other trademarks are
      the property of their respective owners.




Drug Information Association          www.diahome.org                              2
Learning Objectives



• Overview of a risk based approach for
  validating an EDMS
• Identify regulatory requirements which
  apply to an EDMS
• Discuss high risk system functionality
  which must be validated
• Practical Example
• Good practices for maintaining a validated
  state via configuration and change control
Why use a Risk Based Approach?


1. Focus validation effort



                   2. Reduce time to implementation



                                         3. Reduce cost
What is Computer Systems Validation?



• Documented evidence which demonstrates:
  – systems consistently operate as intended
  – business and regulatory system requirements
    are met
  – information is secure and properly managed
  – procedures and processes are in place for the
    use and management of the system
What the regulations say…



• FDA: 21 CFR Part 11
   §11.10(a) Validation of systems to ensure accuracy,
     reliability, consistent intended performance, and the
     ability to discern invalid or altered records.
• ICH E6 – GCP
   §5.5.3(a) Ensure and document that the electronic
    data processing system(s) conforms to the
    sponsor’s established requirements for
    completeness, accuracy, reliability and consistent
    intended performance (i.e. validation)
• PIC/S Annex 11
   Validation should be considered as part of the
    complete life cycle of a computer system. This cycle
    includes the stages of planning, specification,
    programming, testing, commissioning,
    documentation, operation, monitoring and changing.
What is expected?



• Controls/procedures in place to validate
  system
• Individuals involved in CSV have adequate
  experience and training
• Level of testing based on system risk,
  complexity, and novelty
• Change/Configuration Control to maintain
  system validated state
Types of Risk Assessments


•   Initial system level
•   Component level
    – Hazard and Operability
      Analysis (HAZOP)
    – Failure Mode and Effects
      Analysis (FMEA)
    – Fault Tree Analysis (FTA)
    – Etc.
•   Supplier Audit/Assessment
System Level Assessment (Regulatory/GxP
Determination)



System Type - Configured OTS or Custom?


   Identify intended use of the system

       Determine which regulations apply based on
       the intended use

           Identify and define GxP electronic records
           and signatures, based on the predicate rules

               Identify the areas of the system that must be
               validated
Key areas of the regulations that should be focused
on


•   The definition of an electronic record
•   Audit trails
•   Electronic copies of records for inspection
•   Retention and maintenance of records
•   Hybrid and procedural solutions
•   Application of electronic signatures
Electronic Records within an EDMS


• Within the context of an EDMS electronic
  records could be in the form of:
   – Documents & Forms required to be
     maintained by predicate rule
   – Metadata used to perform regulated activities
     (or make regulated decisions)
   – Electronic / Digital Signatures used to sign
     records required by predicate rules
   – Audit Trails generated for electronic records
     being generated and/or managed in the
     EDMS
Key elements of a Risk Assessment



            Hazards




                      Impact



                               Probability of
                                  Failure



                                                Detectability


                                                Note: Must be detected
                                                before the consequences of
                                                the failure cause harm
GAMP Risk Evaluation Method




                            Probability                                               Detectability




                                                                                                Medium
                                  Medium




                                                                                         High
                                           High




                                                                                                         Low
                           Low




                                                               Risk Class
                             2   1         1                                             M      H        H


                                                  Risk Class




                                                                                                               Priority
       Severity




                    High                                                             1                                    Risk
                             3   2         1
                  Medium                                                                 L      M        H
                                                                                     2
                    Low
                             3   3         2
                                                                                     3   L      L        M                M

  Severity = Impact on Patient Safety,                                      Detectability = Likelihood that the
  Product Quality or Data Integrity                                         fault is detected
  Probability = Likelihood of fault
  occurring                                                                 Priority = Risk Class x Detectability

  Risk Class = Severity x Probability
Recommended Risk Evaluation Method for EDMS




                                                                               Probability of Detection before
                            Detectability                                           occurrence of harm




                                                                                                 Medium
                                  Medium




                                                                                          High




                                                                                                          Low
                                           Low
                           High




                                                              Risk Class
                              2   1        1                                              M      H        H


                                                 Risk Class




                                                                                                                Priority
       Severity




                    High                                                              1                                    Risk
                              3   2        1
                  Medium                                                                  L      M        H
                                                                                      2
                    Low
                              3   3        2
                                                                                      3   L      L        M                M

  Severity = Impact on Patient Safety,                                     Probability = Likelihood that the
  Product Quality or Data Integrity                                        fault is detected before the
  Detectability = How easily can fault                                     occurrence of harm
  be detected
                                                                           Priority = Risk Class x Probability
  Risk Class = Severity x Detectability
GAMP 5 - Risk Management Process Overview




         • Perform Initial Risk Assessment and Determine System Impact
Step 1

       • Identify Functions with Impact on Patient Safety, Product Quality and
Step 2   Data Integrity

         • Perform Functional Assessments and Identify Controls
Step 3

         • Implement and Verify Appropriate Controls
Step 4

         • Review Risks and Monitor Controls
Step 5


                                                       Ref. GAMP 5 - A Risk-Based Approach to Compliant GxP
                                                       Computerized Systems
Step 1 - Perform Initial Risk Assessment and
Determine System Impact


• The OTS EDMS will be used to:
   – Generate submission ready electronic PDF
     records that will be submitted to FDA as part of
     our INDs
   – Manage CAPA process and CAPA records
   – Manage Document Change Request process for
     controlled documents (i.e. SOPs, Policies,
     Validation Documents etc.)
• System Impact
   – Regulatory: Functions with regulatory impact will
     be validated
   – Business: Functions with business impact will not
     be validated (since it is an OTS and Vendor
     Assessment has been performed)
Step 2 - Identify Functions with Impact on Patient
Safety, Product Quality and Data Integrity


• Example (EDMS Functional Requirements
  with impact on Data Integrity)
   1. The system must be able convert the Final
      Draft Word document to a PDF format which
      will be submitted for approval
   2. The system must copy the metadata from
      the Word document to the PDF copy
Step 3 - Perform Functional Assessments and
 Identify Controls

                                                                       Probability
                                            Regulatory                                Risk      Validation
       Function           Risk scenario                  Detectability     of
                                              Impact                                 Priority   Required?
                                                                       Detection
Controlled Document The web service
Review workflow calls fails to send the
a web service which document to the
sends the Word                              Medium          High          High        Low          No
                      PDF Rendering
document to the PDF server and the PDF
Rendering Server,     is not generated
which returns the PDF The web service
and saves it in the   incorrectly renders
Controlled Documents the PDF and
library.                                      High        Medium          High       Medium        Yes
                      generates a inexact
                      copy of the Word
                      document.
Step 4- Implement and Verify Appropriate Controls



• Risks can be mitigated by implementing
  procedural or technical controls
   – The following standard operating should be in
     place to mitigate procedure risks:
       •   Documentation Management SOP
       •   Computer System Validation SOP
       •   Backup SOP
       •   Retention/Archiving SOP
       •   Logical & Physical Security SOP
       •   System Administration & Maintenance SOP
       •   Training SOP
• Technical controls must be validated to
  demonstrate that the risk has been mitigated
Step 5 - Review Risks and Monitor Controls



• Periodic review of systems in order to:
   – verify that controls are still effective
   – previously unrecognized hazards are present
   – previously identified hazards are no longer
     applicable
   – the estimated risk level associated with a
     hazard is no longer acceptable
Maintaining the validated state



• Implement SOPs and WIs which clearly define
  how the environment is administered
• Configuration / Change Control SOP to manage
  changes
• Same risk based approach should be used
  during Change Control process
• Should significant changes or additions be
  made, a new validation project may be required
To sum it all up…



• Follow a stage risk assessment process
• Make to have SME from each business
  unit
• Make sure individuals involved in the risk
  assessment & validation have relevant
  experience
• Be strict otherwise everything becomes
  high risk…
• Leverage Vendor Audit & Vendor Testing
                                               22

More Related Content

What's hot

Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummiesIvo Depoorter
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Enterprise Management Associates
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
What is Document Management
What is Document ManagementWhat is Document Management
What is Document ManagementRadix Software
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Centralized SOC Architectures on AWS
Centralized SOC Architectures on AWSCentralized SOC Architectures on AWS
Centralized SOC Architectures on AWSAmazon Web Services
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesWSO2
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 

What's hot (20)

Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
Unified Endpoint Management: Leading Solutions for Achieving Modern Managemen...
 
Building Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access ManagementBuilding Your Roadmap Sucessful Identity And Access Management
Building Your Roadmap Sucessful Identity And Access Management
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
What is Document Management
What is Document ManagementWhat is Document Management
What is Document Management
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Centralized SOC Architectures on AWS
Centralized SOC Architectures on AWSCentralized SOC Architectures on AWS
Centralized SOC Architectures on AWS
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
IT ASSET MANAGEMENT
IT ASSET MANAGEMENTIT ASSET MANAGEMENT
IT ASSET MANAGEMENT
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 

Viewers also liked

Implementation of an enterprise level EDMS solution
Implementation of an enterprise level EDMS solutionImplementation of an enterprise level EDMS solution
Implementation of an enterprise level EDMS solutionJose Valdivieso
 
Document Management at East Carolina University
Document Management at East Carolina UniversityDocument Management at East Carolina University
Document Management at East Carolina UniversityPaul Gipson
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsMontrium
 
Case Study – Deploying SharePoint Based eTMF in the Cloud
Case Study – Deploying SharePoint Based eTMF in the CloudCase Study – Deploying SharePoint Based eTMF in the Cloud
Case Study – Deploying SharePoint Based eTMF in the CloudMontrium
 
Initiative for an eTMF Exchange Mechanism from the TMF Reference Model
Initiative for an eTMF Exchange Mechanism from the TMF Reference ModelInitiative for an eTMF Exchange Mechanism from the TMF Reference Model
Initiative for an eTMF Exchange Mechanism from the TMF Reference ModelMontrium
 
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...Document Management in the Life Sciences - New Horizons for Small-Medium Ente...
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...Montrium
 
SharePoint for Pharma - Computer System Life Cycle Management
SharePoint for Pharma - Computer System Life Cycle ManagementSharePoint for Pharma - Computer System Life Cycle Management
SharePoint for Pharma - Computer System Life Cycle ManagementMontrium
 
SharePoint for Pharma - A Risk-Based Validation Approach for Life Sciences
SharePoint for Pharma - A Risk-Based Validation Approach for Life SciencesSharePoint for Pharma - A Risk-Based Validation Approach for Life Sciences
SharePoint for Pharma - A Risk-Based Validation Approach for Life SciencesMontrium
 
Executing Validation of GxP Systems Electronically using SharePoint
Executing Validation of GxP Systems Electronically using SharePointExecuting Validation of GxP Systems Electronically using SharePoint
Executing Validation of GxP Systems Electronically using SharePointMontrium
 
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...Montrium
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsMontrium
 
Implementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointImplementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointMontrium
 
Ssm Appliance Ssm Demo
Ssm Appliance Ssm DemoSsm Appliance Ssm Demo
Ssm Appliance Ssm Demojerrycarleo
 
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)An archivist's view on preserving archaeological data in Flanders (Inge Roosens)
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)Onroerend Erfgoed
 
Rethinking Document Management eBook
Rethinking Document Management eBookRethinking Document Management eBook
Rethinking Document Management eBookKimberly Jones
 
Archiveslegalsolutions plaquette a a 2012 1
Archiveslegalsolutions plaquette a a 2012 1Archiveslegalsolutions plaquette a a 2012 1
Archiveslegalsolutions plaquette a a 2012 1archiveslegalsolutions
 
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint PresentationStan Prager
 
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...Archiving as a Service - A Model for the Provision of Shared Archiving Servic...
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...janaskhoj
 
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...Amazon Web Services
 

Viewers also liked (20)

Implementation of an enterprise level EDMS solution
Implementation of an enterprise level EDMS solutionImplementation of an enterprise level EDMS solution
Implementation of an enterprise level EDMS solution
 
Document Management at East Carolina University
Document Management at East Carolina UniversityDocument Management at East Carolina University
Document Management at East Carolina University
 
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical TrialsBeyond Automation: Extracting Actionable Intelligence from Clinical Trials
Beyond Automation: Extracting Actionable Intelligence from Clinical Trials
 
Case Study – Deploying SharePoint Based eTMF in the Cloud
Case Study – Deploying SharePoint Based eTMF in the CloudCase Study – Deploying SharePoint Based eTMF in the Cloud
Case Study – Deploying SharePoint Based eTMF in the Cloud
 
Initiative for an eTMF Exchange Mechanism from the TMF Reference Model
Initiative for an eTMF Exchange Mechanism from the TMF Reference ModelInitiative for an eTMF Exchange Mechanism from the TMF Reference Model
Initiative for an eTMF Exchange Mechanism from the TMF Reference Model
 
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...Document Management in the Life Sciences - New Horizons for Small-Medium Ente...
Document Management in the Life Sciences - New Horizons for Small-Medium Ente...
 
SharePoint for Pharma - Computer System Life Cycle Management
SharePoint for Pharma - Computer System Life Cycle ManagementSharePoint for Pharma - Computer System Life Cycle Management
SharePoint for Pharma - Computer System Life Cycle Management
 
SharePoint for Pharma - A Risk-Based Validation Approach for Life Sciences
SharePoint for Pharma - A Risk-Based Validation Approach for Life SciencesSharePoint for Pharma - A Risk-Based Validation Approach for Life Sciences
SharePoint for Pharma - A Risk-Based Validation Approach for Life Sciences
 
Executing Validation of GxP Systems Electronically using SharePoint
Executing Validation of GxP Systems Electronically using SharePointExecuting Validation of GxP Systems Electronically using SharePoint
Executing Validation of GxP Systems Electronically using SharePoint
 
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...SharePoint Configuration Management – Effective Techniques for Regulated Shar...
SharePoint Configuration Management – Effective Techniques for Regulated Shar...
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences Applications
 
Implementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointImplementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePoint
 
Ssm Appliance Ssm Demo
Ssm Appliance Ssm DemoSsm Appliance Ssm Demo
Ssm Appliance Ssm Demo
 
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)An archivist's view on preserving archaeological data in Flanders (Inge Roosens)
An archivist's view on preserving archaeological data in Flanders (Inge Roosens)
 
Itas profile
Itas profileItas profile
Itas profile
 
Rethinking Document Management eBook
Rethinking Document Management eBookRethinking Document Management eBook
Rethinking Document Management eBook
 
Archiveslegalsolutions plaquette a a 2012 1
Archiveslegalsolutions plaquette a a 2012 1Archiveslegalsolutions plaquette a a 2012 1
Archiveslegalsolutions plaquette a a 2012 1
 
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation
“Resurrecting Lost Voices: DIY Digital Archiving” PowerPoint Presentation
 
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...Archiving as a Service - A Model for the Provision of Shared Archiving Servic...
Archiving as a Service - A Model for the Provision of Shared Archiving Servic...
 
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...
AWS Summit 2013 | India - Disaster Recovery, Backup and Archive in the Cloud,...
 

Similar to Risked Based Validation of EDMS - DIA Presentation

Annual Company Risk Assessment
Annual Company Risk AssessmentAnnual Company Risk Assessment
Annual Company Risk AssessmentMusavie Abdillah
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docxgertrudebellgrove
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docxgertrudebellgrove
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docxtarifarmarie
 

Similar to Risked Based Validation of EDMS - DIA Presentation (8)

Annual Company Risk Assessment
Annual Company Risk AssessmentAnnual Company Risk Assessment
Annual Company Risk Assessment
 
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Risk Management Insight FAIR(FACTOR ANA.docx
Risk Management Insight       FAIR(FACTOR ANA.docxRisk Management Insight       FAIR(FACTOR ANA.docx
Risk Management Insight FAIR(FACTOR ANA.docx
 
GSRM Abridged Report
GSRM Abridged ReportGSRM Abridged Report
GSRM Abridged Report
 
Risk Management Insight FAIR(FACTOR AN.docx
Risk Management Insight        FAIR(FACTOR AN.docxRisk Management Insight        FAIR(FACTOR AN.docx
Risk Management Insight FAIR(FACTOR AN.docx
 
Crisis Development 2008 02 06
Crisis Development 2008 02 06Crisis Development 2008 02 06
Crisis Development 2008 02 06
 
Risk Management in Project Management
Risk Management in Project ManagementRisk Management in Project Management
Risk Management in Project Management
 

More from Montrium

Monitoring Beyond COVID-19: Setting Yourself Up for the New-Normal
Monitoring Beyond COVID-19: Setting Yourself Up for the New-NormalMonitoring Beyond COVID-19: Setting Yourself Up for the New-Normal
Monitoring Beyond COVID-19: Setting Yourself Up for the New-NormalMontrium
 
Best Practices for Implementing Robust Governance Processes in Office 365
Best Practices for Implementing Robust Governance Processes in Office 365Best Practices for Implementing Robust Governance Processes in Office 365
Best Practices for Implementing Robust Governance Processes in Office 365Montrium
 
Strategies to Facilitate GxP Processes Deployment in Office 365
Strategies to Facilitate GxP Processes Deployment in Office 365Strategies to Facilitate GxP Processes Deployment in Office 365
Strategies to Facilitate GxP Processes Deployment in Office 365Montrium
 
How to Get Started with GxP Processes in Office 365 - The Discovery Phase
How to Get Started with GxP Processes in Office 365 - The Discovery PhaseHow to Get Started with GxP Processes in Office 365 - The Discovery Phase
How to Get Started with GxP Processes in Office 365 - The Discovery PhaseMontrium
 
How to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsHow to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsMontrium
 
Transforming eTMF Management: Moving to a Data-Driven Approach
Transforming eTMF Management: Moving to a Data-Driven ApproachTransforming eTMF Management: Moving to a Data-Driven Approach
Transforming eTMF Management: Moving to a Data-Driven ApproachMontrium
 
Best practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsBest practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsMontrium
 
Best practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsBest practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsMontrium
 
Implementing Metrics & Completeness Reporting in TMF Management​
Implementing Metrics & Completeness Reporting in TMF Management​Implementing Metrics & Completeness Reporting in TMF Management​
Implementing Metrics & Completeness Reporting in TMF Management​Montrium
 
Empowering Active TMF Management With an eTMF System
Empowering Active TMF Management With an eTMF SystemEmpowering Active TMF Management With an eTMF System
Empowering Active TMF Management With an eTMF SystemMontrium
 
Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365Montrium
 
Empowering active tmf management
Empowering active tmf managementEmpowering active tmf management
Empowering active tmf managementMontrium
 
Automation of document management paul fenton webinar
Automation of document management paul fenton webinarAutomation of document management paul fenton webinar
Automation of document management paul fenton webinarMontrium
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365Montrium
 
Practical Steps to Selecting and Implementing an eTMF
Practical Steps to Selecting and Implementing an eTMFPractical Steps to Selecting and Implementing an eTMF
Practical Steps to Selecting and Implementing an eTMFMontrium
 
Tools for Accelerating Validation of Office 365
Tools for Accelerating Validation of Office 365Tools for Accelerating Validation of Office 365
Tools for Accelerating Validation of Office 365Montrium
 
Implementing the TMF Reference Model
Implementing the TMF Reference ModelImplementing the TMF Reference Model
Implementing the TMF Reference ModelMontrium
 
Tmf Fundamentals - webinar
Tmf Fundamentals - webinarTmf Fundamentals - webinar
Tmf Fundamentals - webinarMontrium
 
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...TMF Fundamentals - An Introduction to Better Trial Master File Management - M...
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...Montrium
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Montrium
 

More from Montrium (20)

Monitoring Beyond COVID-19: Setting Yourself Up for the New-Normal
Monitoring Beyond COVID-19: Setting Yourself Up for the New-NormalMonitoring Beyond COVID-19: Setting Yourself Up for the New-Normal
Monitoring Beyond COVID-19: Setting Yourself Up for the New-Normal
 
Best Practices for Implementing Robust Governance Processes in Office 365
Best Practices for Implementing Robust Governance Processes in Office 365Best Practices for Implementing Robust Governance Processes in Office 365
Best Practices for Implementing Robust Governance Processes in Office 365
 
Strategies to Facilitate GxP Processes Deployment in Office 365
Strategies to Facilitate GxP Processes Deployment in Office 365Strategies to Facilitate GxP Processes Deployment in Office 365
Strategies to Facilitate GxP Processes Deployment in Office 365
 
How to Get Started with GxP Processes in Office 365 - The Discovery Phase
How to Get Started with GxP Processes in Office 365 - The Discovery PhaseHow to Get Started with GxP Processes in Office 365 - The Discovery Phase
How to Get Started with GxP Processes in Office 365 - The Discovery Phase
 
How to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsHow to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qms
 
Transforming eTMF Management: Moving to a Data-Driven Approach
Transforming eTMF Management: Moving to a Data-Driven ApproachTransforming eTMF Management: Moving to a Data-Driven Approach
Transforming eTMF Management: Moving to a Data-Driven Approach
 
Best practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsBest practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspections
 
Best practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspectionsBest practices for preparing for and surviving inspections
Best practices for preparing for and surviving inspections
 
Implementing Metrics & Completeness Reporting in TMF Management​
Implementing Metrics & Completeness Reporting in TMF Management​Implementing Metrics & Completeness Reporting in TMF Management​
Implementing Metrics & Completeness Reporting in TMF Management​
 
Empowering Active TMF Management With an eTMF System
Empowering Active TMF Management With an eTMF SystemEmpowering Active TMF Management With an eTMF System
Empowering Active TMF Management With an eTMF System
 
Governance Strategies for Office 365
Governance Strategies for Office 365Governance Strategies for Office 365
Governance Strategies for Office 365
 
Empowering active tmf management
Empowering active tmf managementEmpowering active tmf management
Empowering active tmf management
 
Automation of document management paul fenton webinar
Automation of document management paul fenton webinarAutomation of document management paul fenton webinar
Automation of document management paul fenton webinar
 
Continuous validation of office 365
Continuous validation of office 365Continuous validation of office 365
Continuous validation of office 365
 
Practical Steps to Selecting and Implementing an eTMF
Practical Steps to Selecting and Implementing an eTMFPractical Steps to Selecting and Implementing an eTMF
Practical Steps to Selecting and Implementing an eTMF
 
Tools for Accelerating Validation of Office 365
Tools for Accelerating Validation of Office 365Tools for Accelerating Validation of Office 365
Tools for Accelerating Validation of Office 365
 
Implementing the TMF Reference Model
Implementing the TMF Reference ModelImplementing the TMF Reference Model
Implementing the TMF Reference Model
 
Tmf Fundamentals - webinar
Tmf Fundamentals - webinarTmf Fundamentals - webinar
Tmf Fundamentals - webinar
 
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...TMF Fundamentals - An Introduction to Better Trial Master File Management - M...
TMF Fundamentals - An Introduction to Better Trial Master File Management - M...
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
 

Recently uploaded

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Risked Based Validation of EDMS - DIA Presentation

  • 1. Risk based approach to electronic document management system (EDMS) validation Presented by: Michael Zwetkow, VP Operations Montrium, Inc
  • 2. Disclaimer The views and opinions expressed in the following PowerPoint slides are those of the individual presenter and should not be attributed to Drug Information Association, Inc. (“DIA”), its directors, officers, employees, volunteers, members, chapters, councils, Special Interest Area Communities or affiliates, or any organization with which the presenter is employed or affiliated. These PowerPoint slides are the intellectual property of the individual presenter and are protected under the copyright laws of the United States of America and other countries. Used by permission. All rights reserved. Drug Information Association, DIA and DIA logo are registered trademarks or trademarks of Drug Information Association Inc. All other trademarks are the property of their respective owners. Drug Information Association www.diahome.org 2
  • 3. Learning Objectives • Overview of a risk based approach for validating an EDMS • Identify regulatory requirements which apply to an EDMS • Discuss high risk system functionality which must be validated • Practical Example • Good practices for maintaining a validated state via configuration and change control
  • 4. Why use a Risk Based Approach? 1. Focus validation effort 2. Reduce time to implementation 3. Reduce cost
  • 5. What is Computer Systems Validation? • Documented evidence which demonstrates: – systems consistently operate as intended – business and regulatory system requirements are met – information is secure and properly managed – procedures and processes are in place for the use and management of the system
  • 6. What the regulations say… • FDA: 21 CFR Part 11 §11.10(a) Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records. • ICH E6 – GCP §5.5.3(a) Ensure and document that the electronic data processing system(s) conforms to the sponsor’s established requirements for completeness, accuracy, reliability and consistent intended performance (i.e. validation) • PIC/S Annex 11 Validation should be considered as part of the complete life cycle of a computer system. This cycle includes the stages of planning, specification, programming, testing, commissioning, documentation, operation, monitoring and changing.
  • 7. What is expected? • Controls/procedures in place to validate system • Individuals involved in CSV have adequate experience and training • Level of testing based on system risk, complexity, and novelty • Change/Configuration Control to maintain system validated state
  • 8. Types of Risk Assessments • Initial system level • Component level – Hazard and Operability Analysis (HAZOP) – Failure Mode and Effects Analysis (FMEA) – Fault Tree Analysis (FTA) – Etc. • Supplier Audit/Assessment
  • 9. System Level Assessment (Regulatory/GxP Determination) System Type - Configured OTS or Custom? Identify intended use of the system Determine which regulations apply based on the intended use Identify and define GxP electronic records and signatures, based on the predicate rules Identify the areas of the system that must be validated
  • 10. Key areas of the regulations that should be focused on • The definition of an electronic record • Audit trails • Electronic copies of records for inspection • Retention and maintenance of records • Hybrid and procedural solutions • Application of electronic signatures
  • 11. Electronic Records within an EDMS • Within the context of an EDMS electronic records could be in the form of: – Documents & Forms required to be maintained by predicate rule – Metadata used to perform regulated activities (or make regulated decisions) – Electronic / Digital Signatures used to sign records required by predicate rules – Audit Trails generated for electronic records being generated and/or managed in the EDMS
  • 12. Key elements of a Risk Assessment Hazards Impact Probability of Failure Detectability Note: Must be detected before the consequences of the failure cause harm
  • 13. GAMP Risk Evaluation Method Probability Detectability Medium Medium High High Low Low Risk Class 2 1 1 M H H Risk Class Priority Severity High 1 Risk 3 2 1 Medium L M H 2 Low 3 3 2 3 L L M M Severity = Impact on Patient Safety, Detectability = Likelihood that the Product Quality or Data Integrity fault is detected Probability = Likelihood of fault occurring Priority = Risk Class x Detectability Risk Class = Severity x Probability
  • 14. Recommended Risk Evaluation Method for EDMS Probability of Detection before Detectability occurrence of harm Medium Medium High Low Low High Risk Class 2 1 1 M H H Risk Class Priority Severity High 1 Risk 3 2 1 Medium L M H 2 Low 3 3 2 3 L L M M Severity = Impact on Patient Safety, Probability = Likelihood that the Product Quality or Data Integrity fault is detected before the Detectability = How easily can fault occurrence of harm be detected Priority = Risk Class x Probability Risk Class = Severity x Detectability
  • 15. GAMP 5 - Risk Management Process Overview • Perform Initial Risk Assessment and Determine System Impact Step 1 • Identify Functions with Impact on Patient Safety, Product Quality and Step 2 Data Integrity • Perform Functional Assessments and Identify Controls Step 3 • Implement and Verify Appropriate Controls Step 4 • Review Risks and Monitor Controls Step 5 Ref. GAMP 5 - A Risk-Based Approach to Compliant GxP Computerized Systems
  • 16. Step 1 - Perform Initial Risk Assessment and Determine System Impact • The OTS EDMS will be used to: – Generate submission ready electronic PDF records that will be submitted to FDA as part of our INDs – Manage CAPA process and CAPA records – Manage Document Change Request process for controlled documents (i.e. SOPs, Policies, Validation Documents etc.) • System Impact – Regulatory: Functions with regulatory impact will be validated – Business: Functions with business impact will not be validated (since it is an OTS and Vendor Assessment has been performed)
  • 17. Step 2 - Identify Functions with Impact on Patient Safety, Product Quality and Data Integrity • Example (EDMS Functional Requirements with impact on Data Integrity) 1. The system must be able convert the Final Draft Word document to a PDF format which will be submitted for approval 2. The system must copy the metadata from the Word document to the PDF copy
  • 18. Step 3 - Perform Functional Assessments and Identify Controls Probability Regulatory Risk Validation Function Risk scenario Detectability of Impact Priority Required? Detection Controlled Document The web service Review workflow calls fails to send the a web service which document to the sends the Word Medium High High Low No PDF Rendering document to the PDF server and the PDF Rendering Server, is not generated which returns the PDF The web service and saves it in the incorrectly renders Controlled Documents the PDF and library. High Medium High Medium Yes generates a inexact copy of the Word document.
  • 19. Step 4- Implement and Verify Appropriate Controls • Risks can be mitigated by implementing procedural or technical controls – The following standard operating should be in place to mitigate procedure risks: • Documentation Management SOP • Computer System Validation SOP • Backup SOP • Retention/Archiving SOP • Logical & Physical Security SOP • System Administration & Maintenance SOP • Training SOP • Technical controls must be validated to demonstrate that the risk has been mitigated
  • 20. Step 5 - Review Risks and Monitor Controls • Periodic review of systems in order to: – verify that controls are still effective – previously unrecognized hazards are present – previously identified hazards are no longer applicable – the estimated risk level associated with a hazard is no longer acceptable
  • 21. Maintaining the validated state • Implement SOPs and WIs which clearly define how the environment is administered • Configuration / Change Control SOP to manage changes • Same risk based approach should be used during Change Control process • Should significant changes or additions be made, a new validation project may be required
  • 22. To sum it all up… • Follow a stage risk assessment process • Make to have SME from each business unit • Make sure individuals involved in the risk assessment & validation have relevant experience • Be strict otherwise everything becomes high risk… • Leverage Vendor Audit & Vendor Testing 22