Detecting Aberrant Data as an Indicator of Data Integrity Issues
|
|
- Shon Bailey
- 5 years ago
- Views:
Transcription
1 Detecting Aberrant Data as an Indicator of Data Integrity Issues Mark E Newton, Consultant QA Global Laboratory Informatics Eli Lilly and Company Indianapolis, IN newton_mark_e@lilly.com Overview Expectation of Oversight Options for Integrity Limits of Detection Ideas for Detection Two Levels: Governance and Operations Governance Metrics The Rise of Data Summary 1
2 Expectation of Oversight Regulators expect firms to routinely look for improper activities as part of review There was a lack of basic oversight by operations, quality unit, and site managers, as rewriting and destruction of original CGMP records was allowed to persist over a significant period without implementation of systems and controls to prevent data manipulation. Sun Pharmaceuticals 2014 May Failure of your quality unit to properly review production records and detect instances where testing was not performed to support your company s certifications on your COAs. Canton Labs 2014 Feb Your firm s failure to prevent, detect, and rectify the falsification of your GMP documentation is concerning. Posh Chemicals 2013 Aug Options for Integrity Reliable Prevent Technical Human Controls configured into system, to prevent data integrity issues Procedures, to address gaps in technical controls, or creation of manual data Inconsistent Detect Technical Human Queries, to highlight suspicious/undesired patterns or situations in electronic data Data review, to identify issues not detectable by queries, or manual data 2
3 Limits of Detection Most data integrity issues (slips, lapses, mistakes, violations) cannot be prevented due to type of data entry and limitations of technology Limitations of Detection: Some issues cannot be detected only observed (e.g. re do before save) Every hit on a report must be investigated A suite of reports is needed each one for a behavior pattern Reports must be automated manual reports require too many resources Manual processes have only data review for issue detection Bottom line: detection has limits, but is the best we have User Interface/design improvements will be next logical leap forward Ideas for Detection Enforcement Actions Look at Enforcements from regulators (e.g. Notice of Concern, 483, WL) Answer the Question: how would I detect that violation? Lifecycle Status Review Look at normal process path what is the status of everything? (materials, intermediates, specifications, batch, environment, equipment, CAPAs, etc ) Answer the Question: What situations create out of alignment statuses? Deviations (CAPA) Review events: could the right data have prevented this event? 3
4 Two Levels of Detection Governance Assess trends, or issues at enterprise level (all sites, operations) Measure degree to which detection metrics are used How often is each report used? How many records per report? Search criteria? Assess effectiveness of controls and detection How many issues were discovered? (what percent of all query hits?) What issues were missed? (discovered by inspection or luck) Modify detection queries (based on inputs) Finding no integrity issues has two reasons: (1) your data is good; (2) your detection is not adequate. Which is likely the correct response? Two Levels of Detection Operations Execute query, based on needs/data in operation Review query hits, to decide if integrity issue exists Keep metrics on queries (investigation time, reports used, etc) Capture other events with integrity issues (e.g inspections) Document/escalate issues to prevent recurrence Integrate integrity learnings into overall Quality system Track time consumed in investigating query hits, to measure efficiency of queries in finding issues. 4
5 Governance Metrics For Each Query (use of metrics) Site, # executions, # Hits (avg), search range (weeks) For Each Site (work volume) Material, # batches released For Each Issue Site, category, issue, method of discovery, action to prevent, repeat issue? Short Audit Trails (Short text entries) Any audit trail where user can enter a value Find records where Reason is fewer than ZZ characters User ID, Date/time, reason Why? Short Reason entries are less likely to offer adequate justification 5
6 Multiple Roles Any system Find records where a person has multiple security roles User ID Date/Time Role #1 Date/Time Role #2 Why? Multiple roles can lead to conflict of interest (admin + user) Batch Alignment Any manufacturing process Find records where a batch has supporting records NOT in expected status (e.g. a terminal status, like Approved) Site of Mfg, Material, Batch #, Status, Release Date System, current value, expected value Why? Supporting data not consistent with batch release status 6
7 Orphan Requests Any system Find records that should have been withdrawn or released Site, System, Record Name, Status, Age of Record Why? Indicates records to be investigated and (usually) withdrawn. Housekeeping is needed Aborted Runs Any data collection system that supports runs (chrom, dissolution) Find runs with Aborted status (# results and samples don t match) Run #, User ID, Date/Time, Position at abort, Reason Why? Aborts are suspicious can indicated undesirable results 7
8 Short Run Any data collection system that supports runs (chrom, dissolution) Find runs with a small number of injections (e.g. 1 2) Run #, Method ID, Sample ID(s), # Injections, Analyst ID Why? Users engaging in testing into compliance behaviors will inject solutions multiple times, often in short runs. Demo/Test/Trial Any system that matches results to sample description Look for files named demo%, test%, or trial% and/or samples with these name(s) Run #, Method ID, Sample ID(s), Analyst ID Why? Users might be testing into compliance by re labeling injections 8
9 Duplicate File Any system that retains data in flat files (not a database) List of files in a library (or set of libraries) with identical checksum, or with identical File Creation Dates. File name, Creation Date, Modified Date, Modified By NOTE: Checksum test might fail if Sample ID or other metadata is embedded in file Why? Indicates copying of data files, to potentially re use data on different samples The Rise of Data Data should be seen as equal to validation GAMP Records & Data Integrity Guide is a sister guide to GAMP 5 We verify that systems are fit for purpose When will we do this for data? (is it fit for purpose? ) 9
10 Summary Analytics can assist in quality oversight Analytics highlight conditions that merit review Each suspect record requires confirmation Some real issues will not appear Look at enforcement findings, deviations, and your own process for query ideas How would we detect that? What happened in the past? Data quality is equally as important as systems quality 10
Data Quality and Integrity Investigation in Laboratories (Analytical)
Data Quality and Integrity Investigation in Laboratories (Analytical) Dr. Ademola O. Daramola, DHSc., MPH Assistant Country Director International Relations Specialist (Drug) US FDA Office of International
More informationData Integrity: Technical controls that demonstrate trust
WHITE PAPER 80077 Data Integrity: Technical controls that demonstrate trust Using Chromeleon 7 Chromatography Data System for enhanced data integrity Author Shaun Quinn, Marketing Manager Informatics and
More informationData Integrity. Developments, updates, and deficiencies. Paul Moody, GMP Inspector. GMP Conference. 7 February 2017 Dublin
Data Integrity Developments, updates, and deficiencies Paul Moody, GMP Inspector GMP Conference 7 February 2017 Dublin Agenda Data Integrity Regulatory Guidance Data Governance: What is it? The Data Lifecycle:
More informationISPE Annual Meeting 8 11 November 2015 Philadelphia, PA. Forensic Auditing for Data Integrity. Rebecca A. Brewer Quality Executive Partners
Forensic Auditing for Data Integrity Rebecca A. Brewer Quality Executive Partners Forensic Auditing for Data Integrity Brewer 1 Forensics the science of gathering and analyzing evidence to establish facts
More informationCurrent Expectations and Guidance, including Data Integrity and Compliance With CGMP
Current Expectations and Guidance, including Data Integrity and Compliance With CGMP Sarah Barkow, PhD Team Lead, CDER/OC/OMQ Guidance & Policy International Society for Pharmaceutical Engineering Data
More informationLeveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity. Bradford Allen Genentech
Leveraging ALCOA+ Principles to Establish a Data Lifecycle Approach for the Validation and Remediation of Data Integrity Bradford Allen Genentech 1 Agenda Introduction Data Integrity 101 Review What is
More informationOctober p. 01. GCP Update Data Integrity
p. 01 p. 02 p. 03 failures by organizations to: apply robust systems that inhibit data risks, improve the detection of situations where data reliability may be compromised, and/or investigate and address
More informationMHRA GMP Data Integrity Definitions and Guidance for Industry January Initial Review and Critique March 2015
MHRA GMP Data Integrity Definitions and Guidance for Industry January 2015 Initial Review and Critique March 2015 Bob McDowall R.D.McDowall Ltd Thanks to Mark Newton, Lorrie Schuessler & Chris Burgess
More informationTouchstone Technologies, Inc. Course Catalog February 2017
Touchstone Technologies, Inc. Course Catalog February 2017 Angela Bazigos ANGELA BAZIGOS 1 HR Courses Course Duration Audience Speaker 1. Basics of Project Management Webinar 90 mins Management Bazigos
More informationDATA INTEGRITY (EMA AUGUST 2016)
Data integrity Data integrity enables good decision-making by pharmaceutical manufacturers and regulatory authorities.it is a fundamental requirement of the pharmaceutical quality system described in EU
More informationVaccine data collection tool Oct Functions, Indicators & Sub-Indicators
data collection tool Oct. 2011 A. National Regulatory System RS01: Legal framework for establishment of a regulatory system, mandate and enforcement power for each function RS01.01: Legislation or and
More informationValidation and Use of Excel Spreadsheets in Regulated Environments
Validation and Use of Excel Spreadsheets in Regulated Environments February 13, 2007 Ludwig Huber Fax.: +49 7802 981948 Tel.: +49 7802 980582 E-mail:Ludwig_Huber@labcompliance.com Today s Agenda Regulatory
More informationData Integrity for the Microbiology Laboratory
Data Integrity for the Microbiology Laboratory 1 Agenda Useful Sources of Information Define DATA ALCOA Principles Data Integrity Risks Regulatory Expectations Failure Mode and Effects Analysis 2 Disclaimer
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationHPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017
HPE ALM Standardization as a Precursor for Data Warehousing March 7, 2017 Brought to you by the Vivit Business Intelligence Special Interest Group led by Oded Tankus Hosted By Oded Tankus Project Manager
More informationPolicy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy
Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...
More informationMHRA GMP Data Integrity Definitions and Guidance for Industry March Introduction:
MHRA GMP Data Integrity Definitions and Guidance for Industry Introduction: Data integrity is fundamental in a pharmaceutical quality system which ensures that medicines are of the required quality. This
More informationDEFINITIONS AND REFERENCES
DEFINITIONS AND REFERENCES Definitions: Insider. Cleared contractor personnel with authorized access to any Government or contractor resource, including personnel, facilities, information, equipment, networks,
More informationComply with Data Integrity Regulations with Chromeleon CDS Software
Comply with Data Integrity Regulations with Chromeleon CDS Software Anna Severoni Sales Support Specialist for Chromatography Thermo Fisher Scientific, Rodano (MI) The world leader in serving science Introduction
More informationGain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services
Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs
More informationData Integrity and the FDA AFDO Education Conference
Data Integrity and the FDA AFDO Education Conference June, 2018 OUR EXPERIENCE YOUR SUCCESS 1 Data Integrity What does it mean to you? 2 Data Integrity What does FDA say about data integrity No legal definition
More informationPART 5: INFORMATION TECHNOLOGY RECORDS
PART 5: INFORMATION TECHNOLOGY RECORDS SECTION 5 1: RECORDS OF AUTOMATED APPLICATIONS GR5800 01 AUDIT TRAIL RECORDS Files needed for electronic data audits such as files or reports showing transactions
More informationThe Role of the American National Standards Institute (ANSI) Irwin Silverstein, Ph.D. IPEA
The Role of the American National Standards Institute (ANSI) 1 ANSI Activities American National Standard: Excipient GMP Accreditation of Product Conformity Bodies Certification to Excipient GMP 2 IPEA
More informationThe Role of the QP in MA Compliance
The Role of the QP in MA Compliance Breda Gleeson, Market Compliance Inspector IMB GMP & Market Compliance Information Day Dublin, October 14 th, 2010 Slide 1 Objectives Outline the responsibilities of
More informationSDA COMPLIANCE SOFTWARE For Agilent ICP-MS MassHunter Software
SDA COMPLIANCE SOFTWARE For Agilent ICP-MS MassHunter Software Part 11 in Title 21 of the US Code of Federal Regulations (commonly referred to as 21 CFR Part 11) governs food and drugs in the US, and includes
More informationGOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI
GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles
More informationCurrent Expectations and Guidance Data Integrity
Current Expectations and Guidance Data Integrity by Pepe Rodriguez-Perez, PhD Business Excellence Consulting Inc www.calidadpr.com email training@calidadpr.com US FDA Guidance for Industry April 2016 This
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationPart 11 Compliance SOP
1.0 Commercial in Confidence 16-Aug-2006 1 of 14 Part 11 Compliance SOP Document No: SOP_0130 Prepared by: David Brown Date: 16-Aug-2006 Version: 1.0 1.0 Commercial in Confidence 16-Aug-2006 2 of 14 Document
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationISPE-FDA 3 rd Annual CGMP Conference 2 4 June 2014 Baltimore, MD
Current Inspectional and Compliance Issues in Data Integrity Data Integrity Breaches: Perception, Misunderstanding, or Reality? Carmelo Rosa, M.S., Psy.D. (US FDA) Director, Division of International Drug
More informationData Integrity and Worldwide Regulatory Guidance
20 Data Integrity and Worldwide Regulatory Guidance Rohit A. Patil, Shruti N.Patil Department of Regulatory Affairs Supreme Pharma Healthcare Pvt. Ltd. Mumbai rohitpharma3250@gmail.com ABSTRACT Good storage
More informationThis Document is licensed to
GAMP 5 Page 291 End User Applications Including Spreadsheets 1 Introduction This appendix gives guidance on the use of end user applications such as spreadsheets or small databases in a GxP environment.
More informationEmbedding Privacy by Design
Embedding Privacy by Design Metric Stream Customer Conference May 12, 2015 TRUSTe Data Privacy Management Solutions 1 Today s Agenda Privacy in the Context of GRC Data Privacy Management and Top Privacy
More informationQP Current Practices, Challenges and Mysteries. Caitriona Lenagh 16 March 2012
QP Current Practices, Challenges and Mysteries Caitriona Lenagh 16 March 2012 Agenda QP Roles and Responsibilities QP Current Practices Supply Chain Verification Study Specific Information Lot Specific
More informationTexas A&M University Controlled Substances Guidelines Training Module. September 2017
Texas A&M University Controlled Substances Guidelines Training Module September 2017 Applicability Guidelines for the purchase, storage, use, and disposal of controlled substances used in research and
More informationEnabling efficiency through Data Governance: a phased approach
Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency
More informationManaging Records in Electronic Formats. An Introduction
Managing Records in Electronic Formats An Introduction Jefferson County Public Schools Archives and Records Center November 2012 Managing Records in Electronic Format As we create and use more and more
More informationStreamline the Chromatographic Method Validation Process using Empower 2 Method Validation Manager
Streamline the Chromatographic Method Validation Process using Empower 2 Method Validation Manager Table of Contents Introduction... 3 Optimize your chromatographic method validation workflow... 4 Efficiently
More information21 CFR Part 11 LIMS Requirements Electronic signatures and records
21 CFR Part 11 LIMS Requirements Electronic signatures and records Compiled by Perry W. Burton Version 1.0, 16 August 2014 Table of contents 1. Purpose of this document... 1 1.1 Notes to version 1.0...
More informationData Consistency and Quality Issues in SEND Datasets
Data Consistency and Quality Issues in SEND Datasets PointCross has reviewed numerous SEND datasets prepared for test submissions to the FDA and has worked with the FDA on their KickStart program to ensure
More informationSAI GLOBAL PRODUCT SERVICES
SMG03 Guidelines for Product Services Testing SAI GLOBAL PRODUCT SERVICES Guidelines for Product Services Testing A step by step guide for applicants and laboratories conducting type testing for certification
More informationSparta Systems Stratas Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationSession Questions and Responses
Product: Topic: Audience: Updated: OpenText Image Crawler Webinar Questions ILTA February 10, 2015 Discover How to Make your Scanned Images Searchable with OpenText Image Crawler Session Questions and
More informationIn the first article in this series (1),
OCTOBER 2015 LCGC NORTH AMERICA VOLUME 33 NUMBER 10 1 The Ideal Chromatography Data System for a Regulated Laboratory, Part II: System Architecture Requirements Here in the second part of this series,
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationCA ERwin Data Profiler
PRODUCT BRIEF: CA ERWIN DATA PROFILER CA ERwin Data Profiler CA ERWIN DATA PROFILER HELPS ORGANIZATIONS LOWER THE COSTS AND RISK ASSOCIATED WITH DATA INTEGRATION BY PROVIDING REUSABLE, AUTOMATED, CROSS-DATA-SOURCE
More informationImportance of the Data Management process in setting up the GDPR within a company CREOBIS
Importance of the Data Management process in setting up the GDPR within a company CREOBIS 1 Alain Cieslik Personal Data is the oil of the digital world 2 Alain Cieslik Personal information comes in different
More informationSTEP Data Governance: At a Glance
STEP Data Governance: At a Glance Master data is the heart of business optimization and refers to organizational data, such as product, asset, location, supplier and customer information. Companies today
More informationFairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
More informationData Integrity for the Microbiology Laboratory
Data Integrity for the Microbiology Laboratory 1 Agenda Useful Sources of Information Define DATA ALCOA Principles Data Integrity Risks Regulatory Expectations Tools for Assessing Risk 2 Disclaimer These
More informationAgile Product Lifecycle Management
Agile Product Lifecycle Management Product Quality Management User Guide v9.3.0.1 Part 15918-01 January 2010 Product Quality Management User Guide Oracle Copyright Copyright 1995, 2010, Oracle and/or its
More informationIntegration of Agilent UV-Visible ChemStation with OpenLAB ECM
Integration of Agilent UV-Visible ChemStation with OpenLAB ECM Compliance with Introduction in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting
More informationData Governance. Mark Plessinger / Julie Evans December /7/2017
Data Governance Mark Plessinger / Julie Evans December 2017 12/7/2017 Agenda Introductions (15) Background (30) Definitions Fundamentals Roadmap (15) Break (15) Framework (60) Foundation Disciplines Engagements
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationIcon Directory. Action Icons. Icon Name Description
Icon Directory The icons found on the various MasterControl pages are listed according to their general location on a given page. For instance, Action Icons usually are found in columns headed "Action".
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationStandard Operating Procedure Title: Product Complaint Procedure
Department Quality Management Document no QMS-055 Prepared by: Date: Supersedes: Checked by: Date: Date Issued: Approved by: Date: Review Date: Document Owner Quality Assurance Manager Affected Parties
More informationPharmaceutical Supplier Auditor Certification Scheme The PS Scheme
The Pharmaceutical Quality Group Pharmaceutical Supplier Auditor Certification Scheme The PS Scheme Note: This document must be read in conjunction with the curent IRCA document 602 Certification as a
More informationFDA 21 CFR Part 11 Compliance by Metrohm Raman
FDA 21 CFR Part 11 Compliance by Metrohm Raman Norms and Standards 21 CFR Part 11 is the FDA rule relating to the use of electronic records and electronic signatures. Recognizing the increasing pact of
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationData Management Glossary
Data Management Glossary A Access path: The route through a system by which data is found, accessed and retrieved Agile methodology: An approach to software development which takes incremental, iterative
More informationIBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber
IBM Compliance Offerings For Verse and S1 Cloud 01 June 2017 Presented by: Chuck Stauber IBM Connections & Verse Email and collaboration platform designed to help you work better Empower people Teams are
More informationFortisphere Essential Management for Virtual Infrastructures John Suit Founder and CTO
VM Essential Lifecycle Management for Virtual for the Infrastructures Real World Fortisphere Essential Management for Virtual Infrastructures John Suit Founder and CTO john.suit@fortisphere.com www.fortisphere.com
More informationWhat s a BA to do with Data? Discover and define standard data elements in business terms
What s a BA to do with Data? Discover and define standard data elements in business terms Susan Block, Lead Business Systems Analyst The Vanguard Group Discussion Points Discovering Business Data The Data
More informationData Integrity in Clinical Trials
Data Integrity in Clinical Trials DIA/ISPE Workshop 06-07 NOV 2014 Tom Haag, Novartis Pharmaceuticals Disclaimer The views and opinions expressed in the following PowerPoint slides are those of the individual
More informationAgile Master Data Management TM : Data Governance in Action. A whitepaper by First San Francisco Partners
Agile Master Data Management TM : Data Governance in Action A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary What do data management, master data management,
More informationGDPR: A technical perspective from Arkivum
GDPR: A technical perspective from Arkivum Under the GDPR, you have a general obligation to implement technical and organisational measures to show that you have considered and integrated data protection
More informationPrivileged Identity Management
Privileged Identity Management Sven-Erik Vestergaard Certified IT specialist Security architect IBM Nordic Agenda What is Privileged Identity Management Compliance issues Steps in controlling Privileged
More informationIBM InfoSphere Information Analyzer
IBM InfoSphere Information Analyzer Understand, analyze and monitor your data Highlights Develop a greater understanding of data source structure, content and quality Leverage data quality rules continuously
More informationPart 11 is Dead Long Live Part CFR 11, the Electronic Records and Electronic Signatures 21 CFR PART 11. Introduction
Part 11 is Dead Long Live Part 11 R.D. McDowall, Ph.D. McDowall Consulting Introduction 21 CFR 11, the Electronic Records and Electronic Signatures final rule [1], that is applicable to the pharmaceutical
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationIBM InfoSphere Information Server Version 8 Release 7. Reporting Guide SC
IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 IBM InfoSphere Server Version 8 Release 7 Reporting Guide SC19-3472-00 Note Before using this information and the product that it
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationWHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help
WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...
More informationVANGUARD Policy Manager TM
Compliance Endures that RACF commands comply with company policy Remediation Provides proactive enforcement, corrects commands in accordance with corporate policies Auditing Provides and audit trail within
More informationFidelis Overview. 15 August 2016 ISC2 Cyber Defense Forum
Fidelis Overview 15 August 2016 ISC2 Cyber Defense Forum Fidelis Cybersecurity EST. 2002 T HE W O RLD S M O ST VAL U ABLE BR AND S USE FIDELIS* I N D U S T R I E S W E S E R V E Defense Contractors Financial
More informationValidation of a CMS Software
Validation of a CMS Software GxP Webinar Paul Daniel Senior Regulatory Compliance Instructor Vaisala, Inc. Practical Webinar Stuff Challenges with your audio connection? Try calling by phone: U.S. & Canada
More informationBusiness Processes for Managing Engineering Documents & Related Data
Business Processes for Managing Engineering Documents & Related Data The essence of good information management in engineering is Prevention of Mistakes Clarity, Accuracy and Efficiency in Searching and
More informationNetwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer
Netwrix Auditor Visibility platform for user behavior analysis and risk mitigation Mason Takacs Systems Engineer Agenda Product Overview Product Demonstration Q&A About Netwrix Auditor Netwrix Auditor
More informationSponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam
Sponsored by Oracle SANS Institute Product Review: Oracle Audit Vault March 2012 A SANS Whitepaper Written by: Tanya Baccam Product Review: Oracle Audit Vault Page 2 Auditing Page 2 Reporting Page 4 Alerting
More informationGDPR: An Opportunity to Transform Your Security Operations
GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationData Integrity Checklist
A Attributable Does your company maintain a signature log for employees that work in GxP areas? Are staff trained in Good Documentation Practices outlining that GxP records must be initialled and dated?
More informationSoftware Engineering 2 A practical course in software engineering. Ekkart Kindler
Software Engineering 2 A practical course in software engineering Quality Management Main Message Planning phase Definition phase Design phase Implem. phase Acceptance phase Mainten. phase 3 1. Overview
More informationAXYS-NETWORK Consulting for aseptic processing
AXYS-NETWORK Axys-Network is a hands-on oriented pharmaceutical consulting firm, specifically involved with aseptic processing of injectable drug products. Axys Network is focusing on sterile drug products
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationPERFORM FOR HPE CONTENT MANAGER
PERFORM FOR HPE CONTENT MANAGER Expand HPE Content Manager to deliver operational excellence Extend the value of your investment in HPE information management technology by adding adaptive workflows to
More informationStrategy & Planning: Data Governance & Data Quality
Strategy & Planning: Data Governance & Data Quality April 30, 2017 In the era of big data and data science, most commercial and nonprofit organizations realize the potential power of data in accelerating
More informationData Virtualization and the API Ecosystem
Data Virtualization and the API Ecosystem Working Together, These Two Technologies Enable Digital Transformation SOLUTION Data Virtualization for the API Ecosystem WEBSITE www.denodo.com PRODUCT OVERVIEW
More informationTITLE: HIE System Audit
TITLE: HIE System Audit Policy #: Effective Date: April 4, 2012 Program: Hawai i HIE Revision Date: May 18, 2016 Approved By: Hawai i HIE Board of Directors Table of Contents 1. Purpose 2. Scope 3. Definitions
More informationCERT C++ COMPLIANCE ENFORCEMENT
CERT C++ COMPLIANCE ENFORCEMENT AUTOMATED SOURCE CODE ANALYSIS TO MAINTAIN COMPLIANCE SIMPLIFY AND STREAMLINE CERT C++ COMPLIANCE The CERT C++ compliance module reports on dataflow problems, software defects,
More informationVANGUARD POLICY MANAGERTM
VANGUARD TM VANGUARD dramatically reduces security risks and improves regulatory compliance, minimizing the need for expensive remediation, while increasing staff productivity. Policy Manager provides
More informationCloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.
George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationExample of QbD Application in Japan Yoshihiro Matsuda, Ph.D.
Example of QbD Application in Japan Yoshihiro Matsuda, Ph.D. Senior Scientist (for Quality) Pharmaceuticals and Medical Devices Agency (PMDA) Aug 11, 2016 1 Agenda Introduction of PMDA QbD assessment experience
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More information