Validation Checklist Appendix A WiZARD2 Secure and 21 CFR 11 Requirements

Similar documents
System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: tiamo (Software Version 2.

System Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11

System Assessment Report Relating to Electronic Records and Electronic Signatures; 21 CFR Part 11. System: StabNet (Software Version 1.

Sparta Systems TrackWise Solution

Exhibitor Software and 21 CFR Part 11

Sparta Systems Stratas Solution

Sparta Systems TrackWise Digital Solution

System Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11. System: tiamo 2.3

Compliance Matrix for 21 CFR Part 11: Electronic Records

ISSUE N 1 MAJOR MODIFICATIONS. Version Changes Related Release No. PREVIOUS VERSIONS HISTORY. Version Date History Related Release No.

Agilent ICP-MS ChemStation Complying with 21 CFR Part 11. Application Note. Overview

ChromQuest 5.0. Tools to Aid in 21 CFR Part 11 Compliance. Introduction. General Overview. General Considerations

SDA COMPLIANCE SOFTWARE For Agilent ICP-MS MassHunter Software

OpenLAB ELN Supporting 21 CFR Part 11 Compliance

21 CFR Part 11 Module Design

Integration of Agilent UV-Visible ChemStation with OpenLAB ECM

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

TECHNICAL BULLETIN [ 1 / 13 ]

FDA 21 CFR Part 11 Compliance by Metrohm Raman

Adobe Sign and 21 CFR Part 11

COMPLIANCE. associates VALIDATOR WHITE PAPER. Addressing 21 cfr Part 11

21 CFR Part 11 FAQ (Frequently Asked Questions)

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software

NucleoCounter NC-200, NucleoView NC-200 Software and Code of Federal Regulation 21 Part 11; Electronic Records, Electronic Signatures (21 CFR Part 11)

Compliance of Shimadzu Total Organic Carbon (TOC) Analyzer with FDA 21 CFR Part 11 Regulations on Electronic Records and Electronic Signatures

System Assessment Report Relating to Electronic Records and Electronic Signatures; Final Rule, 21 CFR Part 11. System: tiamo 2.0

21 CFR PART 11 COMPLIANCE

Metrohm White paper. FDA 21 CFR Part 11 Requirements for NIR Spectroscopy. Dr. N. Rühl

The Impact of 21 CFR Part 11 on Product Development

REGULATION ASPECTS 21 CFR PART11. 57, av. Général de Croutte TOULOUSE (FRANCE) (0) Fax +33 (0)

Using "TiNet 2.5 Compliant SR1" software to comply with 21 CFR Part 11

ComplianceQuest Support of Compliance to FDA 21 CFR Part 11Requirements WHITE PAPER. ComplianceQuest In-Depth Analysis and Review

Agilent Response to 21CFR Part11 requirements for the Agilent ChemStation Plus

WHITE PAPER AGILOFT COMPLIANCE WITH CFR 21 PART 11

EZChrom Elite Chromatography Data System. Regulatory Compliance with FDA Rule of Electronic Records and Electronic Signatures (21 CFR Part 11)

INFORMATION. Guidance on the use of the SM1000 and SM2000 Videographic Recorders for Electronic Record Keeping in FDA Approved Processes

Technical Information

Cell Therapy Data Management

21 CFR Part 11 LIMS Requirements Electronic signatures and records

Electronic Data Processing 21 CFR Part 11

Using "IC Net 2.2 " software to comply with 21 CFR Part 11

Using the Titrando system to comply with 21 CFR Part 11

21 CFR 11 Assistant Software. 21 CFR Part 11 Compliance Booklet

White Paper Assessment of Veriteq viewlinc Environmental Monitoring System Compliance to 21 CFR Part 11Requirements

Using the Titrando system to comply with 21 CFR Part 11

Introduction 2. History. Adapted to zenon version 6.20 (MH) January 13 th, 2006

Part 11 Compliance SOP

Assessment of Vaisala Veriteq viewlinc Continuous Monitoring System Compliance to 21 CFR Part 11 Requirements

Guidelines for applying FactoryTalk View SE in a 21 CFR Part 11 environment

Real World Examples for Part 11 Technical Controls

Agilent Technologies Dissolution Workstation Software Electronic Records and Data Storage Background

Spectroscopy Configuration Manager (SCM) Software. 21 CFR Part 11 Compliance Booklet

Using Chromeleon 7 Chromatography Data System to Comply with 21 CFR Part 11

Statement of 21 CFR Part 11 Validation Results

Using Chromeleon Chromatography Management Software to Comply with 21 CFR Part 11

Introduction. So what is 21 CFR Part 11? Who Should Comply with 21CFR Part 11?

Automation Change Management for Regulated Industries

OM-MICROLITE-8 AND OM- MICROLITE-16 DATA LOGGERS AND OM-MICROLAB

Meeting regulatory compliance guidelines with Agilent ICP-MS MassHunter and OpenLAB Server

testo Comfort Software CFR 4 Instruction manual

Guidance for a 21 CFR Part 11 implementation on Microsoft Office SharePoint Server 2007

Achieving 21 CFR Part11 Compliance using Exaquantum/Batch Authored by Stelex

Password Standard Version 2.0 October 2006

eprost System Policies & Procedures

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

21 CFR PART 11 FREQUENTLY ASKED QUESTIONS (FAQS)

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

System Security Features

EU Annex 11 Compliance Regulatory Conformity of eve

Premium HMI and FDA 21 Part 11 regulations TN0009. Version Description Date 1 First emission 10/04/2012

Supersedes: S-EG-06. Specifications relating to event loggers for electricity and gas metering devices

21 CFR Part 11 Fundamentals

Summary. Implementing CFR21 Part 11 with Movicon 11 Page 2

21 CFR Part 11 Compliance DELMIA Apriso 2018 Implementation Guide

21 CFR 11 Validation Document for ERSA. Ochsner IRB s Electronic Research Study Application

Server Security Checklist

How to get your Movicon 11 project FDA 21 CFR Part 11 ready. Document: RAC-4105 Released: Updated: Rel. Movicon: 11.

MySign Electronic Signature

SecureDoc Disk Encryption Cryptographic Engine

Digital Certificate Service (DCS) - User Guide

Endpoint Security webrh

SECURITY PLAN DRAFT For Major Applications and General Support Systems

User Manual. Version 1 1/10/ of 26

TRAINING MANAGEMENT SYSTEM MANUAL

Access to University Data Policy

NIST Compliance Controls

SECURITY & PRIVACY DOCUMENTATION

Virginia Commonwealth University School of Medicine Information Security Standard

This information applies to versions 2015 or greater of CODESOFT Enterprise Network Licenses.

Pulseway Security White Paper

Integritest 4N Integrity Test Instrument Central Instrument Management Tool Installation and Operators Manual

Administrative Procedure

Fair Isaac Product Name User s Guide ENHANCEMENT NOTIFICATION Fair Isaac LenStar. Security Requirements

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

CODESOFT uses NT security. The network administrator will need to set up the users as needed per the requirements of 21 CFR Part 11.

CSP & PCI DSS Compliance on HPE NonStop systems

Credentials Policy. Document Summary

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Red Flags/Identity Theft Prevention Policy: Purpose

Transcription:

Appendix A Procedures and Controls for Closed Systems (check = yes) (check = yes) Customers may devise their own validation protocols that may or may not be compliant with 21 CFR 11 Is the system validated? To comply, customer must purchase validation certificate (N520) with each Dickson calibrated data logger that is to be used with WiZARD2 Secure. Is it possible to discern invalid or altered records? WiZARD2 Secure can only open records saved to the Dickson.db3 encrypted database. It is not possible to alter data saved to the database. Is the system capable of producing accurate and complete copies of electronic records on paper? Is the system capable of producing accurate and complete copies of records in electronic form for inspection, review, and copying by the FDA? Are the records readily retrievable throughout their retention period? Using the print function in WiZARD2 Secure, the graph and/or table can be printed complete with all 21 CFR 11 requirements. Unaltered graphs can be emailed and a copy of the database can be emailed/transferred to another user of WiZARD2 Network. WiZARD2 Network gives the user read only access to data saved to any WiZARD2 database. Records are saved to the encrypted database stored at c:\program files\dickson\dickson wizard\db. Once a record is written to the database it can not be deleted or altered. Is system access limited to authorized individuals? Only users with valid user ID and password can access system. Is there a secure, computer generated, time stamped audit trail that records the date and time of operator entries and actions that create modify or delete any device or system settings? Upon making a change to an electronic record, is previously recorded information still available (I.e. not obscured by the change)? Audit trail is secured, encrypted and contains date, time, operator, and action when using WiZARD2 Secure. Not Applicable. Saved data can not be modified or deleted by the user. Attempts to do so will render the database Invalid.

Is an electronic record s audit trail retrievable throughout the record s retention period? Is the audit trail available for review and copying by the FDA? The Audit trail is automatically generated and cannot be turned off. Audit trails can be retrieved indefinitely. Audit trail can be printed or electronically transferred/emailed. If the sequence of system steps or events is important, is this enforced by the system (e.g. as would be the case in a process control system?) Does the system ensure that only authorized individuals can use the system, electronically sign records, access the operation, or computer system input or output device, alter a record, or perform other operations? If it is a requirement of the system that input data or instructions can only come from certain input devices (e.g. terminals), does the system check the validity of the source of any data or instructions received? (Note: This applies where data or instructions can come from more than one device, and therefore the system must verify the integrity of its source, such as a network of weigh scales, or remote, radio controlled terminals.) Is there documented training, including on the job training for system users, developers, IT support staff? Is there a written policy that makes individuals fully accountable and responsible for actions initiated under their electronic signatures? Not Applicable. There is no specific sequence of steps nor any order specific operations within WiZARD2 Secure. WiZARD2 Secure has a mandatory User ID and Password login system with two levels of operational/system access, administrator and user levels, ensuring that only authorized individuals can access the system and use the various features according to their level of access. The software will accept data only from validated data loggers designed and manufactured by Dickson specifically for use with WiZARD2 Secure using Dickson s proprietary communications protocols. Each specific unit capable of working with WiZARD2 Secure is uniquely identified by the software for further system checks. Users may arrange/purchase system training from Dickson or provided their own training through testing and the WiZARD2 Secure help files and documentation. WiZARD2 Secure is user-friendly and safeguards against user error to limit the amount of training required. Customer must create a written policy explaining to WiZARD2 Secure users that they are responsible for actions done under their login.

Is the distribution of, access to, and use of systems operation and maintenance documentation controlled? Our software controls access and use of itself. Customer is responsible for obeying the licensing terms and distribution of the software, and the computer hardware and software WiZARD2 Secure applications run on. Is there a formal change control procedure for system documentation that maintains a time sequenced audit trail for those changes made by the pharmaceutical organization? Additional Procedures and Controls for Open Systems Is data encrypted? Data is encrypted. Not Applicable. Audit trails are not changeable. They are encrypted and can not be modified. Are digital signatures used? Digital signatures are used. Signed Electronic Records Do signed electronic records contain the following related information? The printed name of the signer The date and time of signing The meaning of the signing (such as approval, review, responsibility) Is the above information shown on displayed and printed copies of the electronic record? Are signatures linked to their respective electronic records to ensure that they cannot be cut, copied, or otherwise transferred by ordinary means for he purpose of falsification? Electronic records do contain the name, date/time stamp, and action. Related information is displayed on the electronic record and on printed copies. The signatures cannot be copied, cut or transferred and are linked to the original record in an encrypted audit trail. Are electronic signatures unique to an individual? The software will not let you use duplicate digital signatures. Recommend customer include a statement in their written procedures that only one person is linked to each user ID.

Are electronic signatures ever reused by, or reassigned to anyone else? Is the identity of an individual verified before an electronic signature is allocated? Electronic Signatures (Non-biometrics) Is the signature made up of at least two components, such as an identification code and password, or an id card and password? Recommend customer include a SOP statement that user IDs are not to be reused or reassigned to anyone else. Unique User ID and Password ensure individual verification. User ID and Password When several signings are made during a continuous session, is the password executed at each singing? (Note: both components must be executed at the first signing of a session.) If singings are not done in a continuous session, are both components of the electronic signature executed with each signing? Are non-biometrics signatures only used by their genuine owners? Would an attempt to falsify and electronic signature require the collaboration of at least two individuals? Has it been shown that biometrics electronic signatures can be used only by their genuine owner? Controls for Identification Codes and Passwords Are controls in place to maintain the uniqueness of each combined identification code and password, such that no individual can have the same combination of identification code and password? Are procedures in place to ensure that the validity of identification codes is periodically checked? Not Applicable. The session ends when one signs off. Multiple singings on the same session do not apply. User ID and Password, every time User ID and Password Not Applicable. WiZARD2 Secure will not allow duplicate User IDs or Passwords. Identification validity is checked each and every time used.

Do passwords periodically expire and need to be revised? Is there a procedure for recalling identification codes and passwords if a person leaves or is transferred. Is there a procedure for electronically disabling an identification code or password if it is potentially compromised or lost? Is there a procedure for detecting attempts at unauthorized use and for informing security? Is there a procedure for reporting repeated or serious attempts at unauthorized use to management? Is there a loss management procedure to be followed if a device is lost or stolen? Is there a procedure for electronically disabling a device if it is lost, stolen, or potentially compromised? Are there controls over the issuance of temporary and permanent replacements? Expiration of passwords, if necessary, is determined by the customer s system administrator and the company s SOP regarding password polices. WiZARD2 Secure, under administrator logging, is capable of administering other User IDs and Passwords if necessary. System Administrator may disable other users accounts. Customers may document their own SOP for handling the disabling of accounts. An audit trail provides detection of unauthorized use. The review and use of that data is the customer s responsibility. The customer should have an internal procedure of reporting unauthorized use to management. The customer should have an internal procedure if a Dickson data logger is potentially compromised. Dickson can repair, replace or recalibrate the loggers used with WiZARD2 Secure. A device can be made inactive in WiZARD2 Secure. The customer should have an internal procedure if a Dickson data logger is potentially compromised. Dickson can repair, replace or recalibrate the loggers used with WiZARD2 Secure. Replaced, repaired or recalibrated units should be Validated prior to use, whether they are to be used as temporary or permanent replacements.

Is there initial and periodic testing of tokens and cards? Does this testing check that there have been no unauthorized alterations? Not Applicable. No tokens/cards used with this system. Not Applicable. Not tokens/cards used with this system.