Computer System Validation in GxP Environment
Computer System Validation in GxP Environment
VALIDATION (CSV)
in
cGMP ENVIRONMENT
Overview
Computer System General Requirements and
Validation Documentation
Password Policy
Validation plan
Initial Risk assessment
Vendor Audit
URS, FS and SDS
Functional risk assessment
IQ.OQ.PQ
Traceability Matrix
Validation Summary Reports (IQ, OQ, PQ)
Maintenance : SOPs
Training Records
To ensure authenticity and integrity, All
software controlled instruments should have
Trainings
System Design
Functional/System
Vendor Assessment Specification
(Software/Hardware) Functional
Risk Assessment
Functional/System Design Specification
Requirement
System configuration specification Traceability
Module/ Unit testing Matrix
Source code review
Configuration freeze notification
Installation Qualification Protocol and Report
Draft SOP Prepare
Operational Qualification Protocol and Report
Final SOPs and Training
Performance Qualification Protocol and Report
Validation summary report
System Release or Rollout
The User Requirements
Not Recommended :
Requirement only states WHAT happens on power fail
Recommended :
Requirements states WHAT happens on power Fail & Power
restore
ATTRIBUTE : Unambiguous
Not Recommended
1. User shall be able to upload documents of maximum size of 2 MB
2. User shall be able to upload the Legacy (Scanned) documents of
size maximum 20 MB
Recommended
1. Maximum file size for files upload is as follows :
a. 20 MB for Legacy/ Scanned documents
b. 2 MB for the rest of the document types
Elements of a well written URS
Not Recommended :
Maximum file size for files upload is as follows :
• 20 MB for Legacy/ Scanned documents
• 2 MB for the rest of the document types
Recommended :
1.0 Maximum file size for files upload is as follows
1.1 20 MB for Legacy/ Scanned documents
1.2 2 MB for the rest of the document types
Installation Qualification
Purpose
Scope
Reference
System Description
Identification of Test Participants
Execution procedure
Pre-requisites
Test scripts
• Verification of system documentation
• Verification of installation of hardware and software components
Discrepancy Handling
Summary and conclusion
Document History
Approvals
Operation Qualification
Purpose
Scope
Reference
System Description
Identification of Test Participants
Execution procedure
Pre-requisites
Test scripts
• Verification of system functionality (positive and negative testing)
• Verification of workflow scenarios
• Verification of access rights and privileges
• Verification of audit trail
• Verification of data backup and restore
Continued…
Operation Qualification
• 21 CFR Part 11 verification
• Verification Disaster recovery procedure
• Verification of BCP procedure
• Verification of draft SOPs (Administration, operation etc.)
• Verification of trainings
Discrepancy Handling
Summary and conclusion
Document History
Approvals
Performance Qualification
Purpose
Scope
Reference
System Description
Identification of Test Participants
Execution procedure
Pre-requisites
Test scripts
• Verification of effective SOPs
• Verification of system functionality in actual scenario by end users
Discrepancy Handling
Summary and conclusion
Document History
Approvals
SOPS for CSV
Validation (CSVMP)
Vendor Audit
Document management
Change Control (QMS)
Training
Access security
User management
Audit Trail review
Periodic Review
Backup Restore
Data Archival
Maintenance phase SOPs
What is a VMP
SOFTWARE TYPICAL
DESCRIPTION VALIDATION APPROACH
CATEGORY EXAMPLES
SOFTWARE TYPICAL
DESCRIPTION VALIDATION APPROACH
CATEGORY EXAMPLES
Non-configured or Computer Reduced system
Commercial off-the- controlled validation life-cycle
shelf (COTS) Systems spectrophotomete approach
Ready-made Computer rs URS
system or standard Firmware based Validation plan
software package where applications
Supplier Assessment
no customization or Laboratory
configuration has been Initial Risk assessment
instrument
done or possible to be software with no Functional and Hardware
3 done configuration specification
Installation Qualification
required
Operation Qualification
SOPs
Performance
Qualification
Validation summary
report
Data Backup procedure
Validation Approach as per Software type
SOFTWARE VALIDATION
DESCRIPTION TYPICAL EXAMPLES
CATEGORY APPROACH
Commercial off-the- LIMS, Track- Full system validation life-cycle
approach
shelf (COTS) Systems wise,
URS, Supplier Assessment,
(Hybrid) SCADA, HMI Initial risk assessment
These are ready-made SAP Hardware specifications
computer systems or Functional requirements
Clinical Trial specifications
standard software
Monitoring, System configuration
package which are specifications
DCS, EDMS,
configured to suit the
4 BMS, Functional risk assessment
workflow requirements Installation Qualification
of the user. Spread-sheets
Operation Qualification
SOPs
User trainings
Performance Qualification
Requirement traceability matrix
Validation summary report
System release certificate
Data Backup procedure
Validation Approach as per Software type
SOFTWARE VALIDATION
DESCRIPTION TYPICAL EXAMPLES
CATEGORY APPROACH
System developed for Full system validation life-cycle approach
Custom-Built plus more rigorous supplier assessment with
specific use as per user
Applications (In-house requirements.
possible onsite supplier audit
URS, Supplier Assessment, Initial risk
/ Customized) ZyIMS assessment
Hardware specifications
Custom-Built is a type of
Functional requirements specifications
software that is System configuration specifications
Administrator JD is available
Etc….
PASSWORD POLICY
The administrator authorizes access for a user by creating a user
account.
All users are identified by having a unique user-ID and a secret
password before being able to gain access to system
Account should lock after a certain number of failed login attempts
Auto logout from system when idle
Password policies requirements are:
A defined length of passwords to be kept
Password should be complex
Users should be able to change their own passwords at any time
Password should have a defined expiry duration
When the user log on for the first time, the system should ask to
change the password.
User Controls
Desktop policies to be activated on the computer system to control
access to the software by users
Password control
Date and time locking
Restriction for file/folder creation, cut, copy, paste and deletion.
No access to the window explorer and internet explorer
Locking of software / computer after predetermined time when idle.
Disable USB, CD and floppy drive
Hide local drives
Restrict access to Control panel in the computer
Restrict access to Network neighborhood
Restrict access to My Documents
Restrict access to Run option etc.
Restrict access to local administrator
Etc…..
USER MANAGEMENT SYSTEM IN QC
SOFTWARES
USER MANAGEMENT SYSTEM IN QC
SOFTWARES
USER MANAGEMENT SYSTEM IN QC
SOFTWARES
Typical Audit Trail review
Shashank Pandey
[email protected]