EU GMP附录11计算机系统◆问答

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

EU GMP guide annexes - Supplementary requirements: Annex 11
Computerised Systems
1. Appropriate controls for electronic documents such as templates should be implemented. Are there any specific requirements for templates of spreadsheets? (H+V February 2011)
Templates of Spreadsheets helps to avoid erroneous calculations by data remaining from previous calculations. They should be suitably checked for accuracy and reliability (Annex 11 p7.1). They should be stored in a manner which ensures appropriate version control. (Chapter 4 p4.1)
2. Which type of accuracy checks (Annex 11 p 6) are expected for use of spreadsheets? (H+V February 2011)
Data integrity should be ensured by suitably implemented and risk assessed controls. The calculations and the files should be secured in such a way that formulations are not accidentally overwritten. Accidental input of an inappropriate data type should be prevented or result in an error message (e.g. text in a numeric field and or a decimal format into integer field) - so called boundary checks are encouraged.
3. Are there any specific considerations for the validation of spreadsheets? (H+V February 2011)
Validation according to paragraph 4 of Annex 11 is required at least for Spread-sheets that contain custom code (e.g. Visual basic for applications). Formulas or other types of algorithms should be verified for correctness.
4. Which measures are required to ensure data security of databases? (H+V February 2011)
Data security includes integrity, reliability and availability of data. During Validation of a database based/inclusive systems considerations should be given to the following
∙Implementing procedures and mechanisms to ensure data security and keeping the meaning and logical arrangement of data.
∙Load testing taking into account future growth of the database and tools to monitor the saturation of the database.
∙Precautions for necessary migration of data (Annex 11 p17) at the end of the lifecycle of the system.
5. At which phases of the system lifecycle risk management is recommended? (H+V February 2011)
Risk management should be applied throughout the whole lifecycle. A first risk assessment should be performed to determine the GMP criticality of the system. Does the system have an impact on patient safety, product quality or data integrity. User Requirement Specifications usually are developed with consideration of potential risks and form the basis for the first formal risk assessment.
Complex systems should be evaluated in further more detailed risk assessment to determine critical functions. This will help that validation activities covers all critical functions.
Risk management includes the implementation of appropriate controls and the verification of them.
6. Are user requirements needed as part of the retrospective validation of legacy systems? (H+V February 2011)
The way to check whether a computerised system is fit for its intended purpose is to define user requirements and perform a gap-analysis to determine the validation effort for retrospective validation. These user requirements should be verified.
7. When do I have to revalidate computerised systems? (H+V February 2011)
Computerised systems should be periodically reviewed to confirm that they remain in a validated state. Periodic evaluation should include, where applicable, the current range of functionality, deviations records, change records, upgrade history, performance, reliability and security. The time period for revaluation / revalidation should be based on the criticality of the system.
8. What are the requirements for storage time of electronic data and documents? (H+V February 2011)
The requirements for storage of electronically data and documents do not differ from paper documents. It should be ensured that electronic signatures applied to electronic record are valid all over the storage period of documents.
9. Which are the relevant validation efforts for small devices? (H+V February 2011)
Small devices are usually of the shelf equipment which is widely used. In these cases the life development lifecycle is mainly controlled by the vendor. The pharmaceutical customer shall therefore reasonably assess the vendor’s capability to develop software according to common standards of quality. A vendor assessment need to be performed and the application need to be verified against the requirements for the intended use. From a perspective of the regulated industry, the implementation of such a device is drive by an implementation life cycle. At minimum the following items need to be addressed:
Requirement definition for the intended use including process limitations. This shall also include a statement whether data are stored or transferred to another system. As per definition of a small device, data are not stored permanently rather than transient and are not to be modified by a user. Therefore limited user access handling is acceptable. It need to be secured that parameter data influencing the devices behavior may not be altered without suitable permission
Risk assessment taking into consideration the intended use and the patient’s risk for associated with the process supported by the small device.
Vendor assessment
List of available documentation from vendor, especially those describing used methodology and algorithm of calculation if applicable. Additionally a vendor certificate or equivalent detailing the vendor performed testing.
Calibration certificate if applicable
The validation plan according to risk assessments results.
Verification testing, proving that the device fulfills the requirements for the intended use. It may be equivalent to a PQ-phase.
Remark: In order to comprehend the before mentioned answers it is necessary to define “small manufacturing devices” in more detail:
Small devices are sometimes only equipped with microprocessors and firmware and are not capable of high level administration functions. Moreover, data is often transient in nature in these devices. Due to the latter there is no risk of unadversely modifying data. Audit trail is therefore not necessary and user access may be limited to those functions of parameter control.
10. What alternative controls are accepted in case a system is not capable to generate printouts indicating if any of the data has been changed since the original entry? (H+V February 2011)
As long as this functionality is not supported by the supplier, it may be acceptable to describe in a procedure that additionally a printout of the related audit trail report must be generated and linked manually to the record supporting batch release.
截止到2012年4月12日。

相关文档
最新文档