Computer Sytems Validation
Computer Sytems Validation
Guide
Introduction to the Computer System
Validation
This guide was developed to be a concise, step-by-step set of management aids, which
are consistent with industry standards. They are designed to guide implementation to
the minimum recommended level of practices and standards. Local management, at
its discretion, may decide that these recommended levels are insufficient for local
conditions and needs and therefore require more stringent practices and controls.
The practices within the guides, when fully implemented will serve to ensure secure
and cost effective operation and evolution of protocol implementation.
Suggestions for improvement to this guide are always welcome. This document is
intended to be living document and will be upgraded and adapted as ‘better practices’
emerges. Email All Comments
Note: This definition indicates that validation can apply to any process including
process managed/controlled by computer systems.
2
Validation Validation is applied to many aspects of the healthcare and other regulated
industries and businesses.
Examples include:
Definition of For the purposes of this guide, a computer system is defined as:
computer
system any programmable device including its software, hardware,
peripherals, procedures, users, interconnections and inputs for the
electronic processing and output of information used for reporting
or control.
3
Purpose The purpose of this guide is to help you:
· determine how to validate, and the extent of validation required, for the
computer systems that have been identified
· 11 chapters
· Reference material
Chapter 2 looks at the things you need to do before you perform a system
validation
Use of The terms and meanings in the Glossary have been adopted as a
Standard standard for use within this guide.
terms
Consistent use of these terms will facilitate communication about
4
computer system validation throughout the Company.
5
Chapter 1
Validation Responsibilities
Overview
Introduction Computer system validation must be supported at different levels within the
organization through policies, standards and documentation.
This chapter describes the responsibilities for validation at the following levels:
• Corporate Management
Corporate Responsibilities
Introduction This topic looks at Development and Execution (D&E) Personal and Business
Unit validation responsibilities.
D&E Personnel • Computer System Validation and Computer System Validation Policy
responsibilities
The (CSV) Computer System Validation and Computer System
Validation Guide (this document), provides guidance on how to
achieve conformance to the above policy.
Business Unit Each business unit is responsible for establishing a policy on computer systems
responsibilities validation requirements.
Business Unit The Business Unit policy may apply to an entire Business Unit, or
policy to some other logical business grouping, for example, site or
6
department.
The Business Unit policy should be based on and comply with the
(CSV) Corporate policy as a minimum requirement.
The policy should also take into account additional Business Unit
specific validation requirements. These additional requirements
may result from other policies within a Business Unit or a
regulatory requirement.
7
Site or Departmental Responsibilities
8
System specific Validation protocols are documents associated with each system
validation identified as requiring validation. The protocol describes the
protocols scope, procedure to be followed, responsibilities and acceptance
criteria for the validation.
• test data
• summary reports
• procedures
9
Chapter 2
Before You Perform System Validation
Overview
Introduction This chapter looks at the things you need to do before you perform system
validation on a specific computer system.
• Creating an Inventory
This is one of the first activities that you must do before you can
validate a system.
10
systems validation projects.
• Users
• Quality Assurance
• Engineering
• Validation
• Information Resources
11
• reviewing the progress of individual validation projects to
ensure timely execution of the Validation Master Plan
The Validation Master Plan should be a dynamic document which at any point
in time will represent:
Introduction Before you can validate a system, you need to identify the
systems that require validation. This topic looks at all of the
steps involved in identifying systems that require validation.
• definition of hardware
12
• hardware owner
Step Action
Create an Inventory - Note: The inventory must consist of all hardware and
1
software in use within a given site or department
2 Identify the Systems
3 Assess Each System for Validation
4 Determine Validation Priority
• midrange
• mini
• personal computers
13
• maintaining the inventory whenever changes are made to the
hardware
• managing the change control process for the system software and
hardware and working with the system/application owners to
determine the impact of the change to the system/application.
Creating an Inventory
List all details For each computer or computerized piece of hardware (or, if appropriate, each
group or class of hardware), the operating system and all applications residing on
the hardware should be listed.
14
Other key information may also be recorded.
Best practice It is best practice to have a single repository within the site or department for all
data resulting from the inventory.
Inventory The exact information and format of the inventory will vary
format according to the type of hardware and the needs of the business
unit.
Hardware
information
Information Description
Reference
A unique identifier for each piece of hardware.
number
Name The model name of the main Central Processing Unit (CPU).
Manufacturer Manufacturer of the main CPU.
Supplier Supplier name of the main CPU, if different from manufacturer.
Owner Name of person responsible for the hardware.
Departments
The departments or Business Unit relying on the hardware.
served
Location Physical location of the CPU.
Whether Installation Qualification (IQ) has been performed on the
hardware.
Qualification
status Mark "Qualified" if IQ has been done.
15
System software The following system software information should be included
information in the inventory:
Operating
Name of the operating system residing on the CPU.
system
Operating
Version of the operating system residing on the CPU.
system version
Application
software
information
Reference
A unique identifier for each piece of application software.
number
Application For purchased systems/applications, use the product name.
name
For in-house systems/applications, use the name by which
generally known.
Bespoke/Custom
Supplier Name and location of supplier.
Use General category of use.
16
Examples: Raw Data Storage
Data Processing
Equipment Control
System Software
Utility
Introduction This topic looks at identifying the systems, the second step in identifying
systems that require validation.
17
Procedure Identifying the systems consists of the following steps:
Step Action
1 Identify all hardware, software and interfaced equipment that describes a system
2 Identify the systems involved in step 1
Evaluate each software application identified on the inventory to determine if it
3
is part of a system or not
4 Identify and record the primary functions of the system
5 Record any additional information
The exact information and format for recording the functions of a system will vary
Format according to the type of system and the needs of the business unit.
Examples of
The following table provides examples of information that should be recorded:
information
Information Description
System name The system or component name.
System owner The name of the person responsible for the overall system,
including hardware, software and interfaced equipment. This is
often the manager of the department in which the system is used.
Departments
Those departments or Business Unit that rely on the system.
served by system
Associated The name and reference number of all hardware associated with the
hardware system.
Associated The name and reference number of all application software
applications associated with the system.
Equipment Any equipment associated with the system for the purpose of
control or data acquisition.
Major functions All major functions of the system.
18
application type and the use strategy and process, may be audited by
regulatory agencies, and based on their recommendations or audit
findings, determine that all existing functions must be qualified or
validated. If a function is determined not be of a critical or usable
facet of the application, and if validating or qualifying is not
performed, then a statement could be drafted summarizing the
reasoning for not testing.
Introduction This topic looks at assessing each system for validation, the third
step in identifying systems that require validation.
Procedure Assessing each system for validation consists of the following steps:
Step Action
Develop a list of:
19
Identify the external controls, if any, for each quality critical and business critical function.
20
Examples Examples of systems or functions that fall under these regulations are:
of quality
• Pre-clinical safety assessment/toxicology studies
critical
criteria • Clinical safety assessment/efficacy studies
Lot status
Inventory control
Expiry date
Label control
Process Process control
Quality Test methods and test specifications
21
Test results/QC records
Process studies
Analytes
Results
22
Note: This definition is used as an example and synonymous
definitions may also be found in the European Guide to GMP
and the Australian Guide to GMP.
Business critical Business critical functions relate to areas critical to the operation of the
business, but are not related to functions, which are directly covered by
functions regulatory requirements.
• product costs
• customer information
• supplier information
• payroll activities
• accounting data
• personnel information
• competitor information
• office automation
Assessment The assessment report identifies the quality critical and business
report critical functions and documents the validation status of the
system.
23
• details about the validation documentation, if any
Introduction This topic looks at determining validation priority, the last step in
identifying systems that require validation.
24
• industry experience with the system
• stage in system life cycle. e.g. is the system new or has it been
installed for some time, or, is the system almost at the end of its use
and will shortly be replaced?
• what products are associated with the system; are those products
strategic?
• the impact on the business if the system was not operational for a
period of time
25
Chapter 3
The Validation Process
Overview
Introduction This chapter looks at the validation process.
Purpose The purpose of the validation process is to provide a high degree of assurance
that a specific process (or in this case computer system) will consistently produce
a product (control information or data) which meets predetermined specifications
and quality attributes.
The The validation effort consists of 5 specific facets or processes, each alone, would
not constitute a validation. However, depending on the specifics of the
Validation application, system or process, would depend on which facets would be
Facets required. There following facets are:
26
Validation
The validation process and document references are shown below:
process
Step Action
1 Establish Team(s)
2 Determine Validation Activities
3 Write the Validation Protocol
4 Specify the System Development Details
5 Perform Qualification Activities
6 Develop/Review Controls and Procedures
7 Certify the System
8 Review Periodically
Steps 1 to 8
Step 1: The first step in the validation process is to establish the System
Establish Validation Team and if required the System Validation Steering
team(s) Team.
These are the teams that will be responsible for the validation
process.
Step 2: The second step in the validation process is to determine and record
Determine all of the validation activities that will be undertaken in order to
validation validate the computer system.
activities
The validation activities are the exact details or activities that will be
required for each of the steps in the validation process. The output
from this activity will be the Validation Plan.
27
determined and recorded.
Step 3: The third step in the validation process is to write the Validation
Write the Protocol.
Validation
The Validation Protocol describes the procedure and the steps within
Protocol
the procedure that will be followed in order to validate the system.
Step 4: The fourth step in the validation process is to specify the system
Specify the development details.
system
You should specify to the supplier or developer of a system that
development
they must have:
details
• a good methodology in order to develop a system
Examples:
Items that will help you ensure a good methodology and formal
quality management system include:
28
• testing procedures
• Installation qualification
• Operational qualification
• Performance qualification
Step 7: The seventh step of the validation process is to certify the system.
Certify the
system This step is where you certify that the validation deliverables have
29
met the acceptance criteria that were described in the Validation
Protocol.
When you certify the system you should prepare a validation report.
The validation report should outline the details of the validation
process.
Step 8: The eighth and final step of the validation process is to review the
Review system validation periodically.
periodically
The system should be reviewed periodically to provide additional
assurance of validation.
30
Timing and Documentation
31
Introduction This topic looks at the timing of the validation process and documentation.
Timing Ideally, the validation process begins at the inception of the system
selection or design process. It then proceeds alongside the system
development and is completed prior to implementation of the
system.
32
For many reasons, a system may not have been validated until
after it has been in use for some time. The basic validation process
is the same as for a new system. The timing of some of the
validation activities may, however, differ.
Timing for a The steps in the validation process, and their associated validation activities are
performed in parallel with the system development life cycle and reference the
new system development documentation as it is produced.
Timing for an
For existing systems, the validation activities will still follow the development
existing life cycle but will reference the development documentation retrospectively.
system
*** Testing carried out by supplier can form part of subsequent qualification
activities if adequately controlled. This can help reduce the amount of testing
needed later, particularly at operational qualification.
Documentation Every step in the validation process, and the activities within the
steps, requires documented evidence that the steps or activities
have been completed.
33
Step Action Documents Generated
34
1 Establish Validation Team(s) Team Charter
Terms of Reference
Role Definition
IQ Results
IQ Summary Report
OQ Results
OQ Summary Report
PQ Results
PQ Summary Report
6 Develop/Review Controls and SOPs (Standard Operating Procedures)
Procedures
Training procedures
Training records
7 Certify the System Validation Report
Validation Certification
8 Review the System Validation Periodic Review Procedure
Periodically
Periodic Review Audit Report
35
Chapter 4
Establish Team(s)
Overview
Introduction This chapter looks at establishing the System Validation Steering
Team and the System Validation Team. This is the first step in the
validation process.
Validation The way in which the members of these teams fit into the organization and their
Protocol responsibilities should be documented in the Validation Protocol.
Existing The organizational structure for the validation of an existing system is the same
as for a new system. If the system is already installed and validation is required,
system then the System Validation Steering Team and the System Validation Team may
be formed at that time.
Introduction This topic looks at the System Validation Steering Team. The
System Validation Steering Team oversees a specific computer
system validation.
• Quality Assurance
• Information Resources
36
• Department in which the system is used
• Group managing the project (if different from the user department)
Note: For small systems, the Validation Steering Team may be the
same as the Validation Committee (See, Chapter 2 - Before You
Start the Validation Process)
Experts The System Validation Steering Team may rely on the opinion of experts within
the System Validation Team when they certify the validation.
37
responsibilities must be signed.
Introduction This topic looks at the System Validation Team. The System
Validation Team performs the validation tasks for a specific
system.
• Information Resources
The System Validation Team will be guided by the System Validation Steering
Note Team.
Training The System Validation Team should receive additional (documented) training as
appropriate to the validation being performed. This will ensure that they have the
required skills.
38
prepare validation plan
Introduction This chapter looks at the second step in the validation process,
determining the validation activities required for the specific
system.
Validation The validation activities are the exact details or activities that will be
activities required for each of the steps in the validation process.
Software Software can be divided into different categories. The type of software category
categorization will determine the validation activities that are required for the software.
39
Introduction This topic provides a diagram of an example development life
cycle and some associated validation activities.
• specification
• design
• construction
• testing
• installation
• acceptance testing
• operation
Validation The table below outlines the validation activities that should be undertaken for
activities the appropriate software category.
40
1 Operating systems Record the version.
Standard instruments, Micro
2 Record the configuration.
controllers, Smart instrumentation
3 Standard software packages Validate the application.
Audit the supplier.
4 Configurable software packages
Validate the application and any
bespoke code.
Audit the supplier.
5 Custom built or bespoke systems
Validate the complete system.
For validation record keeping, record the name and version number
in the hardware acceptance tests or equipment IQ.
41
appropriate action taken.
• operational procedures
42
Each application (of the standard product) is therefore specific to the
customer process and maintenance becomes a key issue, particularly
when new versions of the standard product are produced.
This guide should be used to specify, design, test and maintain the
application. Particular attention should be paid to any additional or
amended code and to the configuration of the standard modules. A
software review of the modified code (including any algorithms in
the configuration) should be undertaken.
Complex It should be noted that complex systems often have layers of software, and one
systems system could exhibit several or even all of the categories.
Determining When categorizing software, choose the category with the most
the category appropriate validation activities and consider any history of usage
in similar applications.
Example:
43
Chapter 6
Write the Validation Protocol
Overview
This topic looks at the third step in the validation process, writing the Validation
Introduction Protocol.
The Validation Plan will be used as the basis for creating the
Validation Protocol.
44
approach.
Responsibilities The Validation Protocol should be written by the System Validation Team and
approved by the System Validation Steering Team (or Validation Committee if
a System Validation Steering Team does not exist).
Timing The Validation Protocol is written after the validation activities have been
determined. The Validation Protocol should be written before the system
validation activities are conducted and in accordance with the local SOPs.
Amendments Amendments to the Validation Protocol must be approved by the same process
as the original Validation Protocol, and documented in a supplement or as a new
version.
Existing The Validation Protocol for an existing system is the same as for a new system. It
may include extra considerations or requirements based on the fact that the
system system has been in use for some time.
• Scope
• Validation procedures
• Responsibilities
• Acceptance criteria
45
Introduction This topic looks at the recommended sections and contents of the Validation
Protocol.
• system description
• principle of operation
• major components
• major interfaces
• years on market
• number of sites
46
• ownership/responsibilities for system
• development
• commissioning
• operations
Scope section This section should describe the scope of the system to be validated.
It should specify the following information:
• boundaries
47
Validation This section should describe the activities that will be used to validate the
system and the list of documents that will be generated for each activity. It
procedures should be detailed and cross-reference the standards for the documents to be
section written.
Responsibilities This section defines which parties (by name) will be responsible
section for each of the activities in the validation process and for
generating the associated documentation.
Acceptance This section describes the high-level acceptance criteria for each
criteria activity. It is the basis for the final certification of the system.
section
Specific acceptance criteria and expected results for each validation
activity will be described in the qualification protocols.
Protocol
The final section of the protocol should contain the sign-off on the Validation
sign-off and Protocol by the validation steering team. This sign-off signifies the team’s
acceptance agreement to its contents.
section
48
Chapter 7
Specify the System Development Details
Overview
This topic looks at the fourth step in the validation process, specifying the system
Introduction development details.
You should also make the supplier aware of the fact that the
Company may audit.
49
validation team.
• project management
• quality planning
• testing
• configuration management
Techniques to The following techniques may be used to capture relevant user requirements:
50
capture
requirements • workshops (such as critical requirements analysis workshops)
• interviews
• presentations
• data modeling
Relationship The user requirements specification will be used as the basis for the
with PQ and development of the system acceptance test scripts / performance
SQ qualification test scripts (See, the topic Performance Qualification
in Chapter 8 - Perform Qualification Activities).
Functional Specification
• describes the specific user requirements that will not be met by the
system
• should define the functionality that does not relate directly to the user
interface (e.g. system interfaces)
51
Recommendation It is recommended that a system description should be included as part of the
functional specification.
Relationship The functional specification will be used as the basis for the
with OQ and development of systems acceptance test scripts / operational
DQ qualification test scripts.
52
Design Specification
• Design Qualification
Relationship
with DQ and • Installation Qualification - The design specification is used to
IQ check that the correct equipment or system is supplied to the
required standards and that it is installed correctly.
Documentation
Introduction A good methodology and quality plan will ensure that several types
of documentation are developed.
• end-user documentation
53
• administration documentation
• system configuration
54
• installation
• maintenance documentation
Testing
Introduction A good methodology and quality plan will ensure that several types
of testing are undertaken throughout the development life cycle.
• module testing
• integration testing
• stress testing
55
Integration testing:
• proves that all software modules correctly interface with each other
to form the software system as defined in the design specification
and functional specification
Stress testing Stress testing involves cataloguing the fact that the system fails in expected ways
that are not catastrophic, yet are easily recognized as errors.
• entering data that is outside the range of acceptable data from the system
and ensuring that the data is flagged as an error
56
• testing the system with a high volume of transactions. The objective is to
determine the maximum operational capacity at which the system can be
run without danger of loss or corruption of data. Based on this type of
testing, the system developer will rate the system’s maximum operational
capacity
This traceability ensures that all parts of the software are tested, and
clearly establishes the acceptance criteria for a given test.
Stages in The stages in the retirement process depend on the definition of raw
retirement
57
process data for each system.
Chapter 8
Perform Qualification Activities
Overview
This topic looks at performing qualification activities, the fifth step in the
Introduction validation process.
• Specification qualification
58
• Design qualification
• Installation qualification
• Operational qualification
• Performance qualification
Supplier Audit
59
Note: The System Validation Team will check the results from the
supplier audit when they perform the Specification Qualification
(SQ) (See, Specification Qualification later on in this chapter).
GAMP Although the GAMP document has been written specifically with manufacturing
systems in mind it is recommended as a general reference as the principles
contained within it are general and can be applied to the validation of systems of
all types.
• ISO 9000-3: 1991 Guidelines for the application of ISO 9001 to the
development, supply and maintenance of software
60
Audit The supplier audit should address the following topics:
details
• the supplier’s development methodology and quality plan
Testing Testing should be performed concurrently during the development of the system by
the developer of the software, not solely by the purchaser or user at the end of the
development process.
When to
Use the table below to determine if Company should perform a
review source
source code review:
code
If ... Then a source code review will...
a supplier audit is not possible be required
there is satisfactory evidence in the not be required
supplier audit that the source code was
developed in a high-quality manner and
subject to review as part of the
61
development life cycle
be required
a supplement to the supplier audit is
Note: The source code review should be a
desired
high-level review. It should use diagrams
and charts of the software.
Specification Qualification
Purpose The purpose of the SQ is to show that the controls required to specify the design
have been addressed and agreed by the user, and where appropriate the in-house
implementation group.
62
be reviewed
• User Requirements Specification
• Supplier Contract
Supplier audit If a supplier audit has not been done, then the validation team may be required to
undertake one.
• supporting documentation
Design Qualification
63
documentation for technical content and quality. It is usually
performed prior to installation at the site.
• confirm that the system development life cycle has been followed
• ensure that the individual elements of the system have been designed
and proven
• ensure that the user and supplier agree that the integration of all the
elements meet the User Requirements Specification, Functional
Specification, Design Specification and Quality plan
• Flow Diagrams
• System Diagrams
• User Manuals
• Drawings
• Quality plans
64
sufficient documentation must exist in order to verify the system at
the DQ phase.
• supporting documentation
65
Installation Qualification
Note: For the purpose of this guide, the IQ covers both hardware,
system software and application software.
The new IQ should refer to the original IQ for the hardware and
system software.
66
• manufacturer’s documented recommendations for installation
◊ Screen shots
◊ Report list
◊ Functional Requirements
◊ User Requirements
◊ Project Plans
67
◊ Training procedures and employee training records
• acceptance criteria
68
• any deviations from the manufacturer’s procedures or
recommendations (these should be explained and justified)
• operating parameters
• environmental controls
69
Operational Qualification
supplier audit
70
• execution instructions
• qualification scripts
• expected results
• security
• screen flow
• data validation
• data updates
There should be a direct reference between the test script and the
specification against which the testing is being performed.
Qualification The data used with the qualification scripts should be identified.
data
The datasets should include:
• unacceptable data
71
Qualification When the OQ scripts are executed, then the results should be
results recorded, signed and dated by the executor. Screen prints or
electronic logs should be retained to verify the results. Automated
testing tools may be used where appropriate to record the results.
72
Performance Qualification
Introduction The Performance Qualification (PQ) ensures that the total system performs as
intended in the specified operating range. The total system includes all hardware
and software components, associated equipment, people and procedures that
make up the system. The execution process is conducted using company specific
pre-defined dataset or actual live data.
• qualification scripts
• qualification data
73
• expected results
• testing procedure
Scripts may be broken down into multiple steps for ease of use.
There should be a direct reference between the test script and the
specification against which the testing is being performed.
Setting The PQ should also include testing the system against (but not exceeding) its
operational capacity.
operational
capacity Note: If the system is expanded to operate at a higher capacity this
limits type of testing should be repeated.
The operational capacity should be set by the user but should not
exceed the rated capacity provided by the supplier.
74
PQ results When the scripts are executed, then the executor should record, sign
and date the results. Screen prints or electronic logs should be
retained to verify the results. Where appropriate, automated testing
tools may be used to record results.
75
generated.
If there is not enough data for some or all of the functions, then the
gaps must be qualified as for a new system. The protocol must
specify which system functions are qualified on historical
information and which ones will be qualified as new.
Chapter 9
Develop/Review Controls and
Procedures
Overview
If the computer system is a new one, then you will need to develop
the controls and procedures or check the suitability of existing
generic procedures applicable to the site or department.
Introduction Controls and procedures ensure that the system retains its validated
status in daily use. They must be approved and implemented before
the system can be certified as validated.
76
Responsibility The responsibility for each control and procedure rests with the department
responsible for that activity.
Scope Controls and procedures should (as a minimum) cover the following
areas:
• problem reporting
• change control
• back-up
• recovery
• business continuity
• operating procedures
• security administration
• database administration
• output controls
These procedures are outlined in the rest of the topics within this chapter. The
precise controls and procedures required would be determined when you determine
the validation activities that will be undertaken (step 2 in the validation process).
Training For every procedure that has been identified in the above areas, there
should be documented evidence that the people affected by the
procedure have been trained on its use.
For procedures that are not routinely used, for example recovery
procedures, training should include testing of the procedures. This
will ensure that the procedure is adequate and that it can be
followed.
77
Problem Reporting and Change Control Procedures
Introduction This topic looks at the problem reporting and change control
procedures that should be in place.
Problem A problem log should be kept and a procedure should be written for
reporting logging, tracking and resolving system problems.
• testing
Note: Testing must ensure that the change is put in place with no
adverse effect to the functioning of the system.
• application software
78
• data
This should include the process by which application owners are to be notified of
changes.
Changes to Although the system software (operating system) does not require
system formal validation, it does require a change procedure to be
software developed.
Note:
System software does not require formal validation for two reasons:
• testing
• re-qualification
79
• training
• documentation
Changes to Changes to master data or control data that sets the parameters or
data configuration of the system should be restricted to authorized
personnel and should be tracked. A written procedure should
describe how this is to be done.
Introduction This topic looks at the back-up, recovery and business continuity
procedures that should be in place.
• back-up medium
80
• specific back-up procedures
Recovery Procedures should be in place for describing how the system will be
procedures restored using the back-ups should it be necessary.
Business A business continuity plan should be available to describe how the business can
continue to operate in the event of the system being unavailable.
continuity
The plan should include:
• contingency procedures
• a reflection of how long the business could operate without the system
before there is a danger of material financial loss to the business
81
Disaster Disaster recovery procedures describe how the organization can
recovery obtain alternate computer resources in the event of the primary
procedures computer system being unavailable.
End-user End-user operating procedures describe how the users are to use the
operating system in their daily jobs.
procedures
These procedures differ from the end-user documentation supplied
by the supplier or developer in that they are specific to the company,
the department, and the task at hand.
For a given system there may be multiple procedures for use within
different departments or for different tasks.
82
Systems Operating procedures for systems personnel describe any routine system
maintenance activities.
personnel
operating Written procedures are required for activities such as:
procedures
start-ups
shut-downs
job scheduling
systems logs
problem logging
83
Procedures Purge and archive procedures describe how data will be copied,
stored in archives and deleted from the system.
84
• describes the controls that are in place
Chapter 10
Certify the System
Overview
Introduction This chapter looks at the second to last step in the validation
process, certifying the system.
85
the Validation Protocol.
Validation The System Validation Team should produce a Validation Report that describes:
Report
• what was done
• any special considerations regarding the use of the system that were
identified during the validation process
Acceptance Detailed acceptance criteria will have been defined for the
Criteria individual qualification activities, whilst high-level acceptance
criteria will have been defined in the Validation Protocol for the
validation as a whole.
The Validation Committee may certify the system for use provided:
86
• appropriate manual procedures are in place to supplement the
computer system if necessary
Certification The authorized parties, as identified in the Validation Protocol, review the
Validation Report to confirm that the procedures were followed and that all
review acceptance criteria were met.
Existing The process for certifying an existing system is the same as for a new system.
system
Chapter 11
Review Periodically
Overview
Introduction This chapter looks at the last step in the validation process,
87
reviewing periodically.
• frequency of review
• review procedures
• maintenance logs
88
impact the system
Change When you review the change control log, you should:
control
• determine the total number of changes
89
review The table below illustrates an example periodic review checklist.
checklist
System Name :
Date of original validation certification or last annual
_________
review:
1.
2.
4.
5.
Date of Periodic Review
Task Pass / Fail Comments
1. Does the hardware system
description accurately
reflect the current hardware
configuration.
2. Does the software system
description accurately
reflect the current software
configuration.
3. Review the system
problem reporting log
(hardware and software) for
the last year and address the
following issues:
90
Task Pass / Fail Comments
4. Review the system
problem reporting log
(hardware and software) for
the last year and address the
following issues:
91
Task Pass / Fail Comments
8. Review the maintenance
logs of any equipment
associated with the
computer system under
review and address the
following issues:
92