Software Validation in Accredited Laboratories A Practical Guide Greg Gogates Fasor Inc. 26 Sept 2001 A copy of this paper will be maintained.

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Configuration Management
PRINCIPLES OF A CALIBRATION MANAGEMENT SYSTEM
Software Quality Assurance Plan
Radiopharmaceutical Production
Document Control DAP Quality Conference May 12, 2008 Debbie Penn.
Audit of IT Systems SARQA / DKG Scandinavian Conference, October 2002, Copenhagen Sue Gregory.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
QMS Documentation Click the mouse to advance slides and animations in this slide show…
OHT 3.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The need for comprehensive software quality requirements Classification.
Factors to be taken into account when designing ICT Security Policies
Transmille Training Quality System.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Testing - an Overview September 10, What is it, Why do it? Testing is a set of activities aimed at validating that an attribute or capability.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
Technical requirements  Sampling  Analysis  Reporting of the results.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
5.2 Personnel Use competent staff Supervise as necessary
Instructions and forms
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Configuration Management, Logistics, and Universal CM Issues Larry Bauer Boeing Commercial Airplanes NDIA Conference Miami March 4-5, 2005
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Module 13: Configuring Availability of Network Resources and Content.
Seattle Area Software Quality Assurance Group Release and Configuration Management, The Acceleration of Change and Its Contribution To Software Quality.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Dan Parish Program Manager Microsoft Session Code: OFC 304.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Raven Services Update December 2003 David Wallis Senior Systems Consultant Raven Computers Ltd.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
Implications of Information Technology for the Audit Process
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Performing Software Installation with Group Policy BAI516.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Getting Started with REACH Delivery. Free to Receive messages and files Easy and completely free to install Comprehensive online help Free Support Forum.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
Software quality factors
SAAMF Roadshow Durban CSIR NML Eddie Tarnow Metrologist: Torque & Automotive 14 June 2006 ISO/TS 16949:2002 certification – Meeting the requirements of.
Chapter 2 Securing Network Server and User Workstations.
Electronic Records and Signatures: Warning Letters and Observations including proposed solutions.
VALIDATIONS: TOWARDS RELAIBLE QUALITY OUTCOMES DR. SHIVPRAKASH MANAGING DIRECTOR SYNCHRON RESEARCH SERVICES PVT. LTD., INDIA.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Configuration Management- Basic Concepts. Agenda  Configuration Management process Overview  Process Stages  Planning & Setup  Control  Audit  Case.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Chapter 7: Delivery, Installation, and Documentation Ronald J. Leach Copyright Ronald J. Leach, 1997, 2009, 2014,
HAMILTON VENUS Security Settings. Security Settings are set in the System Configuration Editor.
DOCUMENTATION ISO/IEC 17025:2005 Documentation.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
1 Determining a client’s peripheral requirements  Determine current business practices  Determine peripheral requirements  Analyse and document existing.
FDA 21 CFR Part 11 Compliance
DOCUMENT AND DATA CONTROL
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Software Quality Assurance Software Quality Factor
Release Management Release Management.
Managing the IT Function
The Certified Quality Process Handbook 2nd edition Ch. 1: pp
Software Validation in Accredited Laboratories
Chapter 11: Printers IT Essentials v6.0 Chapter 11: Printers
Radiopharmaceutical Production
Presentation transcript:

Software Validation in Accredited Laboratories A Practical Guide Greg Gogates Fasor Inc. 26 Sept 2001 A copy of this paper will be maintained on ftp.fasor.com/pub/iso25/validation/

26 Sept 2001NCSL Presentation2 Preamble l ISO guide 25 “Adequate for Use” l ISO “Suitably Validated” l Validation - Reasonable Assurance l Maintain Design Control l Know what's where! l Keep it Simple l EA/GA(98)95 Draft “EA Guidelines for the use of Computers and Computer Systems in Accredited Laboratories”

26 Sept 2001NCSL Presentation3 Software Classifications l COTS - Commercial Off the Shelf l MOTS - Modified Off the Shelf l CUSTOM - Written from scratch

26 Sept 2001NCSL Presentation4 COTS l Use as delivered l No modifications/customizations l Verify functionality l Verify menu contents l Verify parameter files l Lock down changes l Installation checkout

26 Sept 2001NCSL Presentation5 MOTS l Needs configuration/customization prior to use. l Customizations require validation. l Non-modified portion treated as COTS l Installation checkout.

26 Sept 2001NCSL Presentation6 CUSTOM l Home Brew or Consultant code l Functional Requirements l Software Design l Traceability Matrix l Structural / Functional Tests l Installation Checkout

26 Sept 2001NCSL Presentation7 Software Life Cycle

26 Sept 2001NCSL Presentation8 Products / Systems

26 Sept 2001NCSL Presentation9 Software Configuration Management l What software is on what machine l Store originals on Network Share, Tape, or CD-R l Maintain all published versions l Control Access l Ensure user access

26 Sept 2001NCSL Presentation10 Documentation Configuration Management l Evidence of validation l Evidence of adequate for use l Owners / User manuals l Software Lifecycle documents l Test Evidence

26 Sept 2001NCSL Presentation11 Good Practices - 1  Treat each software product a piece of calibration equipment.  Do checks to ensure nothing changes.  Place software product masters in a read only directory.  Network computers that access a shared program on a server.

26 Sept 2001NCSL Presentation12 Good Practices - 2  Lock spreadsheet cells that contain math.  Password protect configuration files or setup screens.  Backup, back-up, and backup off site!  Plan for hardware/software disaster recovery.  Good information ftp://ftp.fasor.com/pub/iso25/validation

26 Sept 2001NCSL Presentation13 Software Checklist Has the Firmware been validated via the calibration by a cal lab who has the capability to thoroughly check the software (i.e. OEM or Authorized partner) (Note: for non-calibratable device Firmware, treat as Software) 2.Have all of the "used" firmware parameters been documented and confirmed that they are correct? 3.Does a Software Requirements document exist for the Software? 4.Does a Software Design document exist detailing either the full design or details of the configuration? 5.Does software testing documents exists describing completed, unique, test cases that exercise the design both +/- and confirms the requirements? 6.Is there a test log showing test failures and corresponding retests/dispositions? 7.Does evidence exist confirming correct software deployment at each target installation? [5.5.11]

26 Sept 2001NCSL Presentation14 Software Checklist Has configuration control been applied to all of their Software/Firmware to ensure that: [ ] a)The Software source code location is access controlled. [ b] b)Firmware/Software formulas & parameters are "locked" to prevent inadvertent changes. [5.5.12] c)Equipment lists identify Software as a separate line item showing correct version and location. [5.5.5] 9.Does evidence exist showing that personnel involved in Custom Software development have adequate training? 10.Do Databases and spreadsheets include "audit trails" to not allow previously data to be obscured? [ ] 11.Do adequate instructions exist for the operation & maintenance of the Software? [5.4.1] 12.Does the accuracy of the Firmware/Software meet or exceed the accuracy required by the test method? [5.5.2]

26 Sept 2001NCSL Presentation15 S U M A R Y

26 Sept 2001NCSL Presentation16 QUESTIONS?