El-Nile Computerized System Data Integrity (Blank)
El-Nile Computerized System Data Integrity (Blank)
DOCUMENT HISTORY
Issue No. Effective Date Page No. Changes History
001
QA001/F01
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
1. Purpose:
1.1. To describe the framework for ensure compliance of GXP computerized systems with data
integrity regulatory requirements
2. Scope:
2.1. All El-Nile pharmaceutical Co. GXP computerized systems and associated records including
both legacy and new systems.
2.2. Manual records are excluded from this SOP as they are covered in data integrity governance of
manual records SOP
3. Responsibilities:
3.1. QA specialist
3.2. QA section head
3.3. All departments’ managers and Section Heads
3.4. QA Manager or designee
3.5. IT Manager
4. ATTACHMENTS
4.1. Attachment 1: Computerized system data integrity program template
4.2. Attachment 2: List of authorized personnel template
4.3. Attachment 3: Archiving request form
4.4. Attachment 4: Data integrity assessment survey
4.5. Attachment 5: Data integrity program deployment flowchart
4.6. Attachment 6: Legacy system data integrity governance flowchart.
5. DEFINITIONS
5.1. Data integrity: is the degree of completeness, consistency, and accuracy of data. Complete,
consistent, and accurate data should be attributable, legible, contemporaneously recorded, original
or a true copy, and accurate.
5.2. Data governance: the general arrangements to ensure that data (irrespective of the format in
which they are generated) are recorded, processed, retained and used to ensure the record
throughout the data lifecycle.
5.3. Computerized system: a system that collectively controls the performance of one or more
automated processes and/or functions. It includes computer hardware, software, peripheral devices,
networks and documentation, e.g. manuals and standard operating procedures, as well as the
personnel interfacing with the hardware and software, e.g. users and information technology
support personnel.
5.4. Original record (primary record): a record which can be described as the first-capture of
information, whether recorded on paper or electronically.
5.5. True copy: a copy (irrespective of the type of media used) of the original record that has been
verified (i.e. by a dated signature or by generation through a validated process) to have the same
information, including data that describe the context, content, and structure, as the original.
5.6. Metadata: is the contextual information required to understand data. A data value is by itself
meaningless without additional information about the data. Metadata is often described as “data
about data”. Metadata is structured information that describes, explains, or otherwise makes it
easier to retrieve, use, or manage data e.g. the number “89” is meaningless without metadata, such
as an indication of the unit “ml.” Among other things, metadata for a particular piece of data could
include a date/time stamp for when the data were acquired, a user ID of the person who conducted
the test or analysis that generated the data, the instrument ID used to acquire the data, audit trails,
etc.
5.7. Audit trail: is a secure, computer-generated, time-stamped electronic record that allows for
reconstruction of the course of events relating to the creation, modification, or deletion of an
electronic record. An audit trail can be considered a form of metadata that is provided for secure
recording of data life cycle details. An audit trail is a chronology of the “who, what, when, and
why” of a record.
5.8. Good practices (GXP): It is a term (or acronym) describing the group of good practice guides
governing activities for regulated pharmaceuticals, biological and medical devices, such as good
laboratory practices, good clinical practices, good manufacturing practices, good
pharmacovigilance practices and good distribution practices.
5.9. Backup: a copy of current (editable) data, metadata and system configuration settings maintained
for recovery including disaster recovery.
5.10. Archive: a designated secure area or facility (e.g. computerized system) for the long term, retention
of data and metadata for the purposes of verification of the process or activity.
5.11. Process owner: personnel who is responsible for managing the process or processes using a
specific system.
5.12. System owner: personnel who is responsible for the availability and readiness of the system to be
used or operated by the process owner.
5.13. Administrator: personnel who has full access rights over a specific system. The main role for
system administrator is access management and system configurations. System owner granted the
administration when system owner is from two different functional area, otherwise system owner
cannot be the administrator due to the likelihood of conflict of interest. In this case, administration is
granted to independent personnel.
Prepared by: xxxxxxxx Reviewed by: xxxxxxxx Approved by: xxxxxxxx
Title: Compliance & Validation Section Head Title: Documentation Section Head Title: Quality Assurance Manager
Signature: Signature: Signature:
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
5.14. Data Owner: personnel who is responsible for backup and archival handling, storage and retrieval.
Data owner is usually the administrator, unless otherwise specified.
5.15. Conflict of interest: A situation in which a person is in a position to derive benefit from actions or
decisions made in their official capacity.
5.16. System SOP: an SOP that sets detailed procedure for operating the system (detailed low-level
SOP).
6. ABBREVIATIONS:
CSV : Computerized System Validation
DI : Date Integrity
DQ : Design Qualification
FA : Functional Area
FAH : Functional Area Head
GLP : Good Laboratory Practices
GMP : Good Manufacturing Practices
GXP : Good Practices
IQ : Installation Qualification
IT : Information Technology
KSH : Key stakeholder
OQ : Operation Qualification
PQ : Performance Qualification
QA : Quality Assurance
QC : Quality Control
SOP : Standard Operating Procedure
URS : User Requirement Specifications.
7. REFERENCES:
International Society for Pharmaceutical Engineering (ISPE). (2017). GAMP Records and data
integrity guide.
World Health Organization, WHO technical report series. Annex5: Guidance on good data and
record management practice. Extracted from: WHO expert committee on specifications for
pharmaceutical preparations, TRs 996 (fifth report).
GOOD PRACTICES FOR DATA MANAGEMENT AND INTEGRITY IN REGULATED
GMP/GDP ENVIRONMENTS PIC/S July 2021
8. Procedures:
Introduction:
o El-Nile pharmaceutical Co. Computerized system categories:
El-Nile pharmaceutical Co. computerized systems greatly vary depending on complexity and function. El-Nile pharmaceutical Co. adopts the
categorization illustrated in the following organogram and table for their computerized systems and equipment.
QA001/F01
Company Logo
Standard Operating Procedure QA Dept.
manufacturing or processing
manufacturing systems
(Non GMP).
M1 Systems that indirectly affect Building management - All requirements of this SOP.
the product during system (BMS) - Validation for data integrity
manufacturing or processing specifications (as a part of system
(GMP). validation).
M2 Systems that directly affect Autoclave - All requirements of this SOP.
the product during Preparation system - Validation for data integrity
manufacturing or processing Filling system specifications (as a part of system
(GMP). validation).
Category IT0 Systems that are not GXP PCs that are used for typing, None
IT: printing, etc.
Information
IT1 Systems that are GXP ERP system - All requirements of this SOP.
technology
(directly or indirectly) - Validation for data integrity
Systems
specifications (as a part of system
validation).
*: the
table determines only the minimum requirements for each category. A system may be in a
subcategory with few requirements and provide features of a higher subcategory (e.g. balance with
access levels). In such case, the requirements of the higher subcategory shall be required.
QA001/F01
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
2. Deployment:
2.1. Date and time security and password policy:
RESPONSIBILITY ACTIVITY
Administrator 1. Adjust date and time according to an accurate clock or via synchronization
with reference clock.
2. Restrict date and time change to an administrator user account which is
accessed only by a person with no conflict of interest.
3. If applicable, use the following format for date and time stamp:
Date dd/mm/yyyy or dd/mmm/yyyy e.g. 27/12/2018 or 27-Dec-2018
Time HH:mm:ss (24 hours) e.g.14:55:43
4. If applicable, set the user account passwords to be automatically changed
every 90 days. Otherwise, procedural controls should be in place (system
SOP) to control password change periodically.
5. Set screensaver or automatic logout time to be 10 minutes.
RESPONSIBILITY ACTIVITY
template and type N/A instead.
RESPONSIBILITY ACTIVITY
System owner and 1. Determine in the data integrity program (attachment 1) batch audit trail
process owner program which should include: Parameters that impact GXP decision (critical
process parameters) to be reviewed by batch (e.g. change in method, change in
set temperature, change in flowrate, reprocessing…etc.)
2. Set a procedure for reviewing batch audit trail in the system SOP as a
part of normal operational data review which should include:
2.1. The method of extraction of the audit trail record (usually by
determining the time boundaries between which the lot is tested or
manufactured).
2.2. The available evidence to batch audit trail review to support decision
making.
System owner and 3. Determine in the data integrity program (attachment 1) system audit
process owner trail program:
3.1. Activities that indicate intentional on unintentional abuse of the system
and may impact GXP records, for example:
o Unauthorized access.
o Uncontrolled change of system configuration.
o Uncontrolled deletion of data.
o Reprocessing of data,
o Audit trail disabling.
o Any disabled accounts for successive failed login.
o Ensuring that backups are per the defined program
3.2. Frequency of system audit trail based on risk assessment with a
maximum interval of 12 months (the attachment 1 provides a risk
assessment-based matrix for determining the review frequency).
RESPONSIBILITY ACTIVITY
IT Manager 2. Review the backup program to ensure that all associated records and
infrastructure are to be stored or located in secured location.
5. Archival:
RESPONSIBILITY ACTIVITY
Process owner 1. If applicable, standardize method for naming and specify location for
saving the records the system generated and document it in the operation
procedure (system SOP).
Note: Some systems have unmodified (fixed) standardization method for
saving location and naming which shall not require standardization by the
Prepared by: xxxxxxxx Reviewed by: xxxxxxxx Approved by: xxxxxxxx
Title: Compliance & Validation Section Head Title: Documentation Section Head Title: Quality Assurance Manager
Signature: Signature: Signature:
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
RESPONSIBILITY ACTIVITY
user.
System owner 2. If required (e.g. due to limited space on the storage drive) or if
preferred (e.g. for sorting and ease of access to records), use Archiving
Request Form (attachment no.3) to request archiving of generated records
defining the archived period.
FAH 3. Review and approve or disapprove the request based on acceptable
rationale.
Administrator 4.Conduct the archiving as requested, indicating the location of archive in the
request form.
5. Retain the archive along the retention period of the records.
I. El-Nile pharmaceutical Co. Legacy Computerized System Governance:
RESPONSIBILITY ACTIVITY
FAH 1. Identify the legacy computerized systems in the FA or the department.
2. Assign a team to lead a project for addressing data integrity gaps and
risks in the legacy computerized system. The team shall at least be structured
as follow:
o FAH as project manager
o Project lead
o Process and system owners
o IT specialist
o QA manager for approval
Process owner and system 3. Create a master plan according to Master Document SOP which
owner should include the following:
o Purpose of the project
o Scope of the project
o Team structure
o Approval sheet
o Project phases
o Project deliverables
o Project timeline
o Project documentation
4. Take in consideration these milestones when determining project
phases:
a.Gap analysis or system assessment: using Gap analysis tool (attachment 4)
to identify the gaps in the system by answering with commenting on 48
questions covering the following topics about the system:
o Access control and security
o Data ownership
RESPONSIBILITY ACTIVITY
o Records management
o Record creation
o Repeat testing
o Record review
o Audit trail
o Validation
o Change control management
o System clock
o Record retention
o Back up and retrieval
o Records archival
o Data migration
b. Risk evaluation: risk is evaluated (high, medium or low) based on its
impact on data integrity. The following table gives examples for illustration
only and it is not exhaustive. The true risk associating a specific gap should
be determined by the project team carefully and case by case based on their
full understanding of the system.
RESPONSIBILITY ACTIVITY
9. Distribution List:
ATTACHMENT (xxxxxx)
System Code
System Location
System
Owner
Process
Issued by Owner
IT specialist
Functional
Area Head
Reviewed
by Information
Technology
Manager
Quality
Approved
Assurance
by
Manager
QA001/F01
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
Access levels
Access rights
Prerequisite Training
V. ELECTRONIC BACKUP PROGRAM: <if not applicable, remove the table and write NA>
Data to be backed up 1.
2.
3.
Backup frequency
Backup procedure
Backup location
VI. AUDIT TRAIL REVIEW PROGRAM: <if not applicable, remove the table and write NA>
Batch audit trail review System audit trail review
(Critical process parameters) (System functionality)
VII. SYSTEM AUDIT TRAIL FREQUENCY CALCULATION: <if not applicable, remove the table and write
NA>
Score
Question Answer
(Yes = 2, No = 1)
ATTACHMENT (xxxxxxx)
System Code
System Location
System Owner
System Owner FA
Process Owner
Data Owner
Authorization List:
Employee ID Name FA Username Access Level
Approvals:
FAH : ………………….………………..
ATTACHMENT (xxxxxxx)
Prepared by: xxxxxxxx Reviewed by: xxxxxxxx Approved by: xxxxxxxx
Title: Compliance & Validation Section Head Title: Documentation Section Head Title: Quality Assurance Manager
Signature: Signature: Signature:
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
Archiving Request
System Name
System Code
Records to be archived
Archiving to (dd/mm/yyyy)
Archiving location
Data Owner
Requested by
Approved by FAH
ATTACHMENT (xxxxxxx)
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 1 Is access to use the system Consider operator, technician, engineer, Yes
& Security software application(s) recipe inputs editing, and security admin
controlled through unique type access for the system software
user ID's and passwords? applications but do not consider any
higher-level administration type functions
such as accessing the operating system
and database which are covered later
questions. Apply question to other
software applications that compose the
system.
Some systems will not require a user to
login to routinely use the equipment but
will require a user to login or authenticate
when changing GXP settings, this is likely
to be acceptable with an appropriate
rationale.
Access 2 Is access to use the system Record if there are any shared logins used No
& Security software application(s) and the nature of those logins. Consider if
controlled through generic the shared user password is it unique for
or shared user ID's and the system, or shared across multiple
passwords? systems.
QA001/F01
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 3 Is access to the system Record the automatic logout or automatic Yes
& Security software application(s) lock duration. Consider if the logout time
configured for automatic is appropriate to the process. Typically,
logout or lock after a period this would be 20 minutes or less, If the
of user inactivity? system does not log off users for inactivity,
or if the log off period is more than 20
minutes due to business necessity, record
the data integrity gap or rationale for the
extended log off timeframe.
Access 4 If the system can be directly Consider if the system can be accessed Yes
& Security accessed remotely by EL- remotely, for example for support purposes
NILE PHARMACEUTICAL via the network from the office or at home.
CO. Staff, is this access Record how the system is remotely
appropriately controlled? accessed, such as via remote desktop
across the Special Function Network. A
procedure should be in place to control
remote access. Record the procedure in
the comment column. Consider if remote
access is secure and restricted to the
appropriate individuals.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 5 If the system can be directly Remote vendor access must always Yes
& Security accessed remotely by remain disabled so uncontrolled remote
vendors, is this access vendor access is not possible. Remote
appropriately controlled? vendor access may be allowed for a
List procedure in Comments specified time period to address a specific
column. issue and access must be granted through
the appropriate system access procedure
or any remote vendor sessions directly
supervised and monitored by EL-NILE
PHARMACEUTICAL CO. Staff throughout
the full access period. Record if there is
remote access capability using modem or
network. Record how remote vendor
access is provided, e.g., LiveMeeting using
VNC.
Access 6 Is there a documented Answer for routine use only, not system Yes
& Security process that ensures that administration accounts. The procedure
only appropriately trained should cover levels of access, user access
and approved users are requests and approvals, user removal
granted access to the (movers, leavers and long-term sick),
system software training requirements, periodic access
application(s) , and that reviews and any access control
access is removed when no requirements such as password
longer needed. List complexity.
procedure in Comments
column.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 7 Do users have access only Consider if the available levels of access Yes
& Security to system software are appropriate to prevent conflicts of
application functionality that interest and that the access for each level
is appropriate and is documented. Confirmation may require
necessary for their job role? checking the system to verify that users
have the appropriate access levels
granted.
Access 8 If there are any enabled Vendor access should be controlled as Yes
& Security vendor user accounts on the with any other users. Record if the vendor
system, do they only have accounts are individual or generic. If the
access to the system vendor is an embedded member of staff
software application or then it would be appropriate for them to
system administration have access providing, they are trained in
functionality that is all the relevant procedures as EL-NILE
appropriate and necessary PHARMACEUTICAL CO. Staff would be.
for their job role? Typically, any vendor accounts used for
system deployment activities should be
removed or disabled at end of validation
activities. Record if there are any
procedures in place for the control of
vendor accounts.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 9 Does anyone with a Consider for example if the routine user No
& Security potential conflict of interest can edit security settings. Consider if you
have system access to know what levels of access each role has
modify or delete GXP and whether there is a conflict of interest.
records; or modify For example, could a supervisor change
configuration, recipes, data created by an operator in order for it
critical process parameters, to be changed to a pass rather than fail. If
machine settings, critical the reviewer of the data works for a
alarms, validated different area of the organization, e.g.
parameters or methods? quality then they would not deemed to
have a conflict of interest. Consider if
system functionality for recording GXP
critical alarm and events enabled and
protected from being disabled by anyone
with a conflict of interest.
Access 10 Are access rights for each This may be found in an approved lifecycle Yes
& Security access level utilized within document the FDS, RTM, IQ/OQ. Also
the system software record if it is available in an unapproved
applications documented in document, for example in the user manual.
an approved document? List
document in Comments
column.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 11 If system administration Answer this question for true system Yes
& Security accounts exist on the administrator accounts only, for example
system, is access restricted operating system or database accounts
to the minimum number of that have access to potentially modify
users necessary? data, disable audit trails, reconfigure the
application etc.
The number of administrators should be
minimized and users should have an
appropriate level of knowledge or
competency to be given access.
Access 12 Does the system provide a You should be able to show who currently Yes
& Security viewable record of current has access to a system and the access
system users and granted levels granted. Consider if the system
access levels or is a maintains viewable record of access levels
procedure in place that currently granted to individuals either on a
provides this information? If screen or on a printed report. Or, is a
procedurally controlled, list procedure in place that requires a
procedure in Comments documented record of access levels for all
column. individuals currently granted access to the
system?
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Access 13 Does the system maintain a You should be able to show who Yes
& Security viewable record of historical historically had access to a system and the
system users and granted access levels granted. Consider if an audit
access levels or is a trail exists on the system or if functionality
procedure in place that on the system exists to generate this data.
provides this information? If It is likely that a date range or specific date
procedurally controlled, list will be given. Consider if procedure
procedure in Comments related forms for access requests can be
column. used to build the required list.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Primary 16 If the same information is The designated GXP primary record that Yes
Record recorded in more than one takes precedence in the event of conflict
record, is the GXP primary between content of two or more records
record designated in an representing the same data or the
approved document? List record(s) GXP decisions are to be based.
document in Comments If there is only one source of data then it is
column. not necessary to specify that it is the
primary record.
Primary 17 Does the data used to make Often GXP records are created manually Yes
Record a GXP decision come from on paper where there is an electronic
most appropriate source in record that contains more relevant details
terms of being the most or of more suitable quality to inform the
complete and accurate GXP GXP decision than that contained on the
record? paper report. Consider if there is more
data in the system than currently on the
designated primary record which should be
included.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Records electronic records are used metadata such as batch number, product
for GXP purposes, does the number, time & dates, process order
printed record include number and test number.
information that uniquely
links it to its respective
electronic record?
Paper 20 If a printed report or pdf Consider that a system may be validated, Yes
Records report from the system is but when it was installed, there was no
being used to make a GXP intention to use the system reports (data
decision is there formal report but also alarm reports or audit trail
documented evidence (e.g. reports) so they were not included in the
validation testing) that scope of the validation. Consider if the
demonstrates the contents accuracy of the data, for example rounding
of the report accurately has been verified against the electronic
represent the source data.
electronic data? Record
reference to any supporting
documentation.
Record 21 Is GXP data recorded and Consider where data is recorded over Yes
Creation saved at the time it is multiple steps in a process that the
created so that it is a unique individual data points are recorded, rather
single transaction? than save at the end of multiple
transactions. Each transaction should be
recorded contemporaneously. Particularly
relevant for manual confirmations or data
entry. Consider what the timestamp
records for these processes.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Record 22 Does the system facilitate Consider if recording of data from a screen Yes
Creation accessibility of GXP can be done at the screen directly into the
records, or means to record GXP document and rather than use
data, at locations where manual transcription from one record to
activities that require another. Consider the use of radios /
recording take place so that telephones during calibration or cleaning
ad hoc data recording and activates. Where transcription is used the
later transcription to official original record should also be maintained
GXP records is not for traceability purposes.
necessary?
Record 23 Does the system save Consider if a user can view data and make Yes
Creation system generated GXP data a decision not to save it. For example,
automatically through a manual IPC's where an operator can view
validated process rather that the result and know if a pass/fail has
relying on a user to occurred before saving or recording the
manually save the data? data.
Record 24 Does the system store all It is important that any metadata is stored Yes
Creation necessary metadata to give to give the GXP record context. Consider
stored GXP records context user ID, batch name, process order
and meaning? number, material code, units, date, time,
limits, recipe, etc.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Record 27 Is there a procedure Consider if the review of the GXP record is Yes
Review describing the process for documented. The procedure must include
the review and approval of any technical requirements for the review
GXP records generated by along with the specific review
the system including review requirements.
of raw data, metadata and
any modification to GXP
records? If procedurally
controlled, list procedure in
Comments column.
Record 28 Does the system provide Staff performing data review need to be Yes
Review access to all GXP raw data able to access complete raw data,
(or true copy) for staff including metadata. Some GXP decisions
performing data checking may be made on a summary of the raw
activities? data but all relevant raw data must be
available to the reviewer.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Audit 29 If GXP records can be For the purposed of this survey, recipes Yes
Trail created, is the data are to be viewed and GXP records. All
attributable to the individual GXP records created should be
who performed the action to attributable to the user creating the record.
create the record? Often this is recorded in an audit trail.
Audit 30 If GXP electronic records The detail in the audit trail should include Yes
Trail are modifiable in the key information such as who made the
system, does an electronic change, time & date that the change was
audit trail document who made, the reason for the change (unless
made the change, when obvious), and the original value. Review of
change was made, reason the audit trail is covered in a later question.
for change (unless obvious), The audit trail does not need to contain
while preserving what the every key stroke or button press for
previous data was? If example.
procedurally controlled,
describe and list procedure
in Comments column.
Audit 31 Are audit trails associated Consider who could edit the audit trail Yes
Trail with GXP records enabled without detection and whether there is any
such that they cannot be conflicts of interest. For example; it is not
disabled by users with a acceptable for a technician to be able to
conflict of interest and are edit an audit trail via the operating system.
locked from
editing/modification/deletion
by users with a conflict of
interest?
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Audit 32 For systems that have audit Current regulatory guidance has increased Yes
Trail trail capability, is there a the requirements for audit trail review
routine and/or periodic audit (routine and periodic review). You may
trail review performed per have already completed an audit trail
site procedure? review assessment against legacy
guidance (pre-2015 MHRA guidance).
Answer "No" if your audit trail review does
not meet current regulatory guidance.
Audit 33 If audit trail review is This may be covered as part of the Yes
Trail required, are Data procedures governing normal business
Reviewers trained in the processes (e.g., batch documentation
procedure(s) for reviewing review procedure, laboratory testing
audit trails? If procedurally procedures).
controlled, list procedure in
Comments column.
Audit 34 Is there a documented This may be incorporated into existing Yes
Trail process that incorporates procedures (e.g., periodic review, L2
review of a sample of audit).
relevant system audit trails
by the quality unit? List
procedure in Comments
column.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
Validation 35 Are the system software Consider if anyone with conflict of interest Yes
application(s) configurations is able to modify configuration or system
and critical system settings settings outside of allowable ranges and
defined and tested to ensure that this has been demonstrated through
they are locked from validation.
alteration by users with a
conflict of interest as part of
validation?
Validation 36 If GXP data is saved or Consider if data is also transferred to an Yes
transferred to an external external system such as a data historian,
system, has the save or data warehouse and whether the transfer
transfer process been process has been validated. Do not
validated. consider if the external system itself has
been validated for its intended use, since if
it is GXP it should be subject to its own
assessment.
Change 37 Are changes to system The change control procedure must Yes
Control code, configuration, recipes, require system changes be made under
critical machine settings, change control. The change control must
validated parameters and be approved by QA to assure proper
methods only allowed verification, testing and documentation;
through a quality approved and should include steps to ensure that
change control or any impact to any GXP records is
procedure? List change considered.
control method or procedure If there is the need to be able to adjust a
in Comments column. system within predefined validated limits, a
change control is not required if the
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
System 39 Are system clocks (time & Record if the system is capable of being Yes
Clocks date) utilized to time stamp synchronized with an NTP time source if it
GXP records maintained isn't currently configured to do so. System
accurate either via clocks must be synchronized to an
automatic synchronization approved standard to assure accuracy and
or via procedural control? If alignment of time sensitive events. A local
procedurally controlled, list procedure must define the site process for
procedure in Comments the following:
column. Ensure controls (e.g., procedure) are be in
place to periodically check and where
appropriate adjust the clock to coincide
with an identified standard.
Record 40 Are there at least 2 years of Record how long GXP records are is Yes
Prepared by: xxxxxxxx Reviewed by: xxxxxxxx Approved by: xxxxxxxx
Title: Compliance & Validation Section Head Title: Documentation Section Head Title: Quality Assurance Manager
Signature: Signature: Signature:
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
modified or deleted by
anyone with a conflict of
interest.
Backup 44 Is there a validated backup Disaster recovery typically consist of Yes
and recovery process for multiple steps. For example; restore the
system GXP records, operating system and software application,
metadata, settings and restore settings/ configuration and restore
configuration for disaster the system database containing historical
recovery purposes? data.
Archival 45 If archival is in place, is it Consider for global supply products the Yes
possible to recover and read retention period is typically batch expiry
archived GXP records and plus 1 year but for NPI / clinical trails the
metadata throughout the retention period can be 30 years. Consider
retention period? if the format of the data can only be read
by the specific system so if the system is
decommissioned how will the data be
recoverable and readable.
Archival 46 If archival is in place, are Record how the data is achieved by the Yes
there validated automated system. Record if there is a procedure for
processes or procedures recovering the archived data. Record if any
which cover the GXP data printed reports are archived. Consider if
archive? If procedurally any automated archival and retrieval of the
controlled, list procedure in data has been validated.
Comments column.
Archival 47 If GXP records are archived, Consider who has access to alter or delete Yes
are the archived records the archived data and any conflicts of
secured so they cannot be interest.
Prepared by: xxxxxxxx Reviewed by: xxxxxxxx Approved by: xxxxxxxx
Title: Compliance & Validation Section Head Title: Documentation Section Head Title: Quality Assurance Manager
Signature: Signature: Signature:
Company Logo Standard Operating Procedure
Computerized System Data Integrity
QA Dept.
DI Category Question Assessment Question Response Guidance Expected Site Response Gap Proposed
Response Response Comments Score actions (if
applicable)
modified or deleted by
anyone with a conflict of
interest?
Archival 48 If system GXP records are Record if records are stored by a 3rd party. Yes
stored at a 3rd party is the Consider both archiving of paper records
ownership and retrieval and physical media (e.g. tapes) that may
process clearly defined and be stored by a third party.
documented? The responsibilities of any 3rd party
archive contract giver and acceptor must
be defined in a contract (e.g. TTS or
Quality Agreement).
ATTACHMENT (xxxx)
ATTACHMENT (xxxxx)