Pharmaceutical Computer Systems Validation
Pharmaceutical Computer Systems Validation
Pharmaceutical Computer Systems Validation: Quality Assurance, Risk Management and Regulatory Compliance
Second EDITION
EDITION S E C O N D E D I T I O N
About the book
Pharmaceutical
H8894
Wingate
Pharmaceutical Computer
Systems Validation
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Pharmaceutical Computer
Systems Validation
Quality Assurance, Risk Management and
Regulatory Compliance
Second Edition
Edited by
Guy Wingate
GlaxoSmithKline
Barnard Castle, U.K.
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2010 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business
This book contains information obtained from authentic and highly regarded sources. While all reasonable efforts have
been made to publish reliable data and information, neither the author[s] nor the publisher can accept any legal respon-
sibility or liability for any errors or omissions that may be made. The publishers wish to make clear that any views or
opinions expressed in this book by individual editors, authors or contributors are personal to them and do not neces-
sarily reflect the views/opinions of the publishers. The information or guidance contained in this book is intended for
use by medical, scientific or health-care professionals and is provided strictly as a supplement to the medical or other
professional’s own judgement, their knowledge of the patient’s medical history, relevant manufacturer’s instructions and
the appropriate best practice guidelines. Because of the rapid advances in medical science, any information or advice
on dosages, procedures or diagnoses should be independently verified. The reader is strongly urged to consult the drug
companies’ printed instructions, and their websites, before administering any of the drugs recommended in this book.
This book does not indicate whether a particular treatment is appropriate or suitable for a particular individual. Ulti-
mately it is the sole responsibility of the medical professional to make his or her own professional judgements, so as to
advise and treat patients appropriately. The authors and publishers have also attempted to trace the copyright holders of
all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has
not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify
in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or uti-
lized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopy-
ing, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
It is pleasing to note that the second edition has been significantly enhanced and updated since
2004. It seeks to anticipate some emerging FDA and EU requirements (1–4). It is aligned with
the latest fifth edition of the GAMP Guide (5), explains the latest thinking from ASTM (6) and
DIA (7), and presents developing industry best practice. Regulatory inspection findings and
FDA Warning Letters have been analyzed; risk-based decisions are now considered in more
detail; case studies have been revisited to take account of regulatory and technological trends;
there are additional case studies on databases and spreadsheets, together with new material on
PAT and process control systems to fit with pending new guidance from ISPE/GAMP.
I am happy to repeat the recommendation that I gave in 2004, in support of this book and
its editor and team of collaborating authors: “Whether you are looking for the missing piece of
the jigsaw puzzle for your project guidance on how to meet the regulations in a practical sense,
(whilst making cost-effective use of your investments), this information resource [which puts
principles into practice] is a good place to start! ”
Anthony J. Trill
Senior Inspector
MHRA (Retired)
REFERENCES
1. Food and Drug Administration. Pharmaceutical CGMPs for the 21st Century: A Risk-Based
Approach. Rockville, MD, 2004.
2. International Conference on Harmonisation. Quality Risk Management, Q9 Document, Technical
Requirements for Registration of Pharmaceuticals for Human Use, 2005. Available at: www.ich.org.
3. Food and Drug Administration. 21 CFR part 211. Supplementary information. Rockville, MD, 2008.
4. European Commission. Draft Annex 11. Computerised Systems (EU guideline to Good Manufactur-
ing Practices for Medicinal Products for Human and Veterinary Use), Public Consultation Document.
Brussels, April 2008.
5. International Society for Pharmaceutical Engineering. GAMP15: Risk-Based Approach to Compliant
GxP Computerised Systems. Tampa, Florida, 2008. Available at: www.ispe.org.
6. American Society for Testing and Materials. E2500-07 standard guide for specification, design and
verification of pharmaceutical and biopharmaceutical manufacturing systems and equipment, 2007.
7. Drug Information Association. Computerized Systems used in Non-Clinical Safety Assessment:
Current Concepts in Validation and Compliance (known as Red Apple II), 2008.
Editor’s Note: Tony Trill has written a personal reflection on his career in the MHRA inspecting
computer systems, which can be found online:
“A regulator’s perspective of his GAMP experience,” Anthony Trill, retired senior
MHRA inspector, online exclusive article, Pharmaceutical Engineering. November/December
2008, Vol. 28 No. 6.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Computer technology is all pervasive. It hides behind the smallest button on domestic
appliances and is in smart cards and security devices, mobile phones, cash dispensers, PCs,
integrated networks, process plant, automobiles, “jumbo jets, ” and power plants. Automation
is everywhere and is gathering complexity, innovation, and momentum, and we have to rely
on it more and more in our everyday lives. The inexorable rise of automation is also seen in the
corporate strategies of pharmaceutical manufacturers calling for investment in new technology
to improve business efficiency and competitive edge. When such technology is associated with
high-risk public safety projects or the production and control of life-saving medicines or
devices, we (businesses and regulators) need to know that it is reliable, quality assured, and
validated. Easy to say, but the technology (and the terminology) is difficult to understand, let
alone prove and qualify, if you are not an electronic systems engineer or a latent Einstein.
Pharmaceutical and healthcare companies have historically engineered their businesses
to be profitable while ensuring that quality is built into their medicinal products, or devices,
through the observance of GxPs (viz GCPS, GLPs, GMPs, etc.) which essentially require
computerized systems in the pharmaceutical sector to be fully documented, defined as to
functionality, quality assured, and validated. This book considers the requirements of the
various international regulations, guides, and codes in historical perspective and leads the
reader into business and project life cycle issues and activities. This book is invaluable in
bridging the gap between theory and practice and is supported by case studies from
experienced professional practitioners and engineers who have had to face up to the challenges
of proving the quality, structural integrity, and validation of different systems in the “real
world” (process control, utility management, networked control, information and high level
business IT, and integrated real-time application, etc.). The case studies are organized
hierarchically from low-level instruments and PLCs through integration to higher-level
proprietary electronic document and information management systems, and beyond.
Pharmaceutical and healthcare companies that invest in computerized systems need
systems that are delivered on time and within budget and that fulfill business functional and
performance requirements. In their rush to place new products and versions on the market,
however, computer software and systems suppliers rarely delivered error-free products. In
fact, some two-thirds of life cycle costs can be incurred after delivery of the software and
system to the users. Pharmaceutical and healthcare companies do not want lots of downtime,
disruption, and escalating costs once a system has been delivered and implemented (1,2). And,
of course, in GxP applications, any deficiencies will be of particular interest during regulatory
inspections.
Inspectors and investigators working for the different national regulatory bodies have to
apply their national GxPs and regulations when assessing these systems. While these are
published, they are not necessarily up to date and, as we all would acknowledge, they are
often open to interpretation not only by different inspectors, depending on their background
and training, but also depending on the particular computerized system and application.
Regulators need to be satisfied that computerized systems installed in pharmaceutical
companies are fit for their intended purposes by considering the nature of the application,
specifications, quality assurance of the development life cycle activities, qualification,
performance validation, in-use controls, accuracy, and reliability in the context of relevant
GxPs. The increasing complexity of (integrated) propriety computer systems, critical
applications, project validation issues, and inspection findings have been considered before
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
together with the challenge for all parties (as ever) to apply sensible regulations and cost-
effective good computer validation practices (1,3,4).
The pharmaceutical and healthcare industries (including software and system suppliers
and developers) have also reportedly had some difficulty in ensuring that these projects
actually deliver the proposed business benefits and that the systems, as built, actually meet the
specifications and are reliable and validated and quite apart from determining just how much
and what type of validation evidence is required to satisfy the different regulatory bodies,
particularly the FDA. While the GAMP Guide (5) and, to some extent, the PDA 18 report (6)
provide the latest interpretation of acceptable development and project guidance in this field
(to ensure compliance with the needs of the principle regulatory bodies around the world), and
TickIT provides a guide to software quality system construction and certification (using ISA
9001:1994) (7), there has been a lack of papers on practical experiences from pharmaceutical
sector project teams seeking to implement new technology.
Today, both the industry and regulators have a much better understanding (8) of the ways
and means to develop and validate computerized systems. Regulatory inspections now have
more to do with risk-based assessments of what these systems are being used for in the context of
broader GxP requirements rather than software and system validation per se. Inspectors (9) now
rarely concentrate on “simply” inspecting computerized systems as an entity on sites; they are
more often directly concerned with what the systems are being used for and how they are being
used and controlled. Risk-based findings for noncompliances associated with computerized
systems will often be linked with other chapters of the EU or PIC/S GMP apart from annex 11.
However, where a detailed inspection of a computerized system is indicated (from risk
assessments or other inspections), it can be arranged as a specific exercise.
It is interesting to note the ongoing collaboration between ISPE and PDA (10,11) to
publish guidance on electronic records and management and to influence opinion. It is to be
hoped that the technological implementation of electronic records and signature requirements
worldwide will not be frustrated by a lack of understanding and agreement by all stakeholders
of the real issues. Recognition must be given to the need for regulated users to have robust
information security management practices and a risk-based approach applied to important
relevant records and inspection compliance.
I believe that this book will be welcomed by novices and experts, suppliers, developers,
purchasers, and regulators alike in providing insight into the practical aspects of these complex
automation– and life cycle–related projects. Many staff assigned to validation projects could also
benefit from sharing the experience of other practitioners. Whether you are looking for the missing
piece of the jigsaw for your project or guidance on how to meet the regulations in a practical sense,
this information resource (which puts principles into practice) is a good place to start!
Anthony J. Trill
Senior Inspector
MHRA
REFERENCES
1. Stokes T, Branning RC, Chapman KG, et al. Good Computer Validation Practices Common Sense
Implementation. Buffalo Grove: Interpharm Press, Inc., 1994.
2. Wingate GAS. Computer systems validation: a historical perspective. Pharmaceutical Engineering,
July/August 1995, pp. 8–12.
3. Trill AJ. EU GMP Requirements and the good automated manufacturing practice (GAMP) supplier
guide for the validation of automated systems for pharmaceutical manufacturing. Pharmaceutical
Engineering, May/June 1995, pp. 56–62.
4. Trill AJ. An EU/MCA view of recent industry guides to computer validation, including GAMP 1996,
PDA technical report 18, and the validation toolkit. Proceedings of PIC/S Seminar “Inspection of
Computer Systems,” Sydney, Australia, September 1996.
5. International Society for Pharmaceutical Engineering. Good Automated Manufacturing Practice
Guide for Validation of Automated Systems (known as GAMP14), 2001. Available at: www.ispe.org.
6. Parenteral Drug Association. The Validation of Computer Related Systems, Technical Report No. 18.
J Pharm Sci Technol 1995; 49(1).
7. TickIT Guide. A guide to software quality management system construction and certification using
ISO 9001:2000, issue 5.0. DISC/BSI TickIT Office, London, 2000.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Preface
This is the second edition of this book, and much has changed in the world of computer
systems compliance since it was first published five years ago. The combination of economic
pressures and the desire to maximize value for money is driving a new mind set. Bureaucratic
practices often associated with validation have been widely challenged rather than accepted
through hearsay that they are driven by the regulations. Practitioners feel empowered to justify
more efficient and effective ways of working. The role of risk management throughout the life
cycle of a computer system is understood not only for the benefit of patient/consumer safety
but also in terms of cost-effectiveness. The next step involves making largely subjective risk
assessments more scientific through utilizing relevant data. Couple this thinking with the focus
on demonstrating that a computer system is fit for purpose through process capability rather
than a compliance cross-check, and it is fair to say that a new paradigm has emerged.
The structure of this second edition remains the same, with the first portion providing
chapters discussing the new paradigm, organization and management of compliance activities,
life cycle requirements stepping through development, verification, operation, and decom-
missioning of computer systems. In addition, there are chapters covering latest developments
in electronic record and signature requirements, new practical guidance on risk-based
decisions, handling regulatory inspections, and improving organizational capabilities to
deliver highly efficient and effective compliance through six-sigma and lean manufacturing
philosophies. Throughout the book, I have included real observations recently made by FDA
on the various topics being discussed.
A series of case studies are provided in the second portion of the book showing how the
principles explained earlier can be put into practice. The real world is rarely as simple and
straightforward as we might hope, and I have been very keen to bring together a group of case
studies to share practical solutions to the many and varied challenges that can face
practitioners. The case studies cover most types of computer systems used today in R&D,
manufacturing, and commercial supply organizations. Original case studies have undergone
significant review and new case studies added to keep the information presented current and
relevant. I have encouraged the contributors to include pertinent checklists on key aspects of
their case studies to complement the more generic guidance provided in the first portion of the
book.
Once again, I am hugely indebted to the large number of contributors each of whom was
invited to participate on the basis of their recognized expertise (see Biographies). In addition, I
would also like to acknowledge friends and colleagues who have provided invaluable
discussions and explorations of computer compliance principles and practices over the years.
In particular, I would like to thank Sam Brooks (Novartis Consumer Healthcare), Ellis Daw
(GlaxoSmithKline), Paul D’Eramo (Johnson & Johnson), Howard Garston-Smith (Gartson
Smith Associates), Jerry Hare (Independent Consultant), Niels Holger Hansen (Novo Nordisk),
Paige Kane (Wyeth Biotech), Scott Lewis (Eli Lilly), Takayoshi Matsumura (Eisai), Karl-Hienz
Menges (German Darmstadt GMP Inspectorate), Gordon Richman (EduQuest), Peter
Roberston (AstraZeneca), David Selby (Selby-Hope), and Sion Wyn (Conformity).
Last but by no means least, I would like to thank my wife Sarah and our children
(Katherine, Robert, and Edward) for their love, patience, and support during the preparation
of this book.
Guy Wingate
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
xii Preface
DISCLAIMER
The information contained in this book is provided in good faith and reflects the personal
views of the contributors. These views do not necessarily reflect the perspectives of the
contributor’s respective employers. The information provided does not constitute legal advice
and no liability can be accepted in any way.
PERMISSIONS
ISPE and PDA are thanked for their kind permission to print the following artwork: Figure 1.6
(New 21st Century Paradigm), Table 3.1 (Characteristics of Various Document Types), Fig-
ure 5.4 (Criticality and Impact Analyses), Table 11.1 (Monitoring Plan for Server-Based LIMS),
Figure 11.4 (Data Life Cycle), Figure 13.3. (Electronic Record Life Cycle), Figure 13.4 (Example
Audit Trail), and Appendix 13.C (Procedural and Technological Controls for 21 CFR Part 11).
Specific reference sources are provided in the text where artwork is located. Figure 1.5 is
reprinted, with permission, from ASTM E2500-07 Standard Guide for Specification, Design,
and Verification of Pharmaceutical and Biopharmaceutical Manufacturing Systems and
Equipment, copyright ASTM International, 100 Barr Harbor Drive, West Conshohocken, PA
19428.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Contributor Biographies
building management systems, testing, and, more recently, process control systems. Roger is
currently involved in developing guidance on the application of dose calculators in the
pharmaceutical industry.
Contact: [email protected]
Contributor Biographies xv
petrochemical, chemical, and water sectors. He is a member of GAMP Europe Forum and a
steering committee member and represents the GAMP Forum on the BSI Joint TickIT Industry
Steering Committee. He is a registered lead TickIT and quality management system (ISO9000)
auditor with the International Register of Certified Auditors (IRCA) and works internationally
for Lloyd’s Register Quality Assurance (LRQA) as an independent lead assessor. Mr Coady
has a BSc (Hon) degree and is a chartered engineer. He is a fellow of the Institution of
Mechanical Engineers (FIMechE), a fellow of the Institute of Measurement and Control
(FInstMC), an associate of the Chartered Quality Institute (ACQI), and a member of the
International Society of Pharmaceutical Engineers (ISPE).
Contact: [email protected]
spectrum. She is also internal product champion for ABB’s audit and remediation and system
obsolescence management consultancy offerings.
Contact: [email protected]
validation. Chris works with a variety of organizations and disciplines including IS/IT,
engineering, business, QA, and suppliers. Chris has worked across pharmaceuticals,
biotechnology, medical devices and cosmetic industries, and all regulatory domains including
clinical, laboratories, manufacturing, distribution, and pharmacovigilance. Chris is a current
member of the GAMP European Steering Committee and contributed to the development of
GAMP15 and a variety of GAMP good practice guides.
Contact: [email protected]
and technical services in professional, technical, and management roles. His industrial
experience covered a broad spectrum of product types, processes, and responsibilities, and he
has regularly spoken at conferences and published many articles on the topic of computer
compliance. He is a member the GAMP European Steering Committee and led for a time the
Pharmaceutical Inspection Cooperation Scheme’s (PICS) Expert Circle for Computerised
Systems, which developed a guideline for use by regulatory authorities around the world
entitled “Good Practices for Computerised Systems in Regulated ‘GXP’ Environments” (Ref. PI
011-1) adopted in 2003. Most recently, Tony, who holds a BSc (Hon) in pharmacy from the
University of Aston, an MSc in pharmaceutical technology from the University of London
(Chelsea, now Kings College), and an OU diploma in digital computing, led the general GMP
revision process for the Orange Guide and represented MHRA on the revision panel for the
redrafting of GMP chapter 4 (Documentation) and annex 11 (Computerised Systems), which is
still ongoing. He also facilitated a recent EU/PICS regulatory benchmarking audit of MHRA’s
Inspection and Standards Division and assisted with internal quality and systems improve-
ment initiatives. He retains membership of IQA’s IRCA lead assessor/auditor panel and is
eligible as an EC qualified person.
Contact: [email protected]
Abbreviations
Abbreviations xxi
CD Compact Disk
CDDI Copper Distributed Data Interface
CDER Center for Drug Evaluation and Research, FDA
CDMS Clinical Database Management System
CDRH Centre for Devices and Radiological Health
CD-ROM Compact Disk — Read Only Memory
CD(-RW) Compact Disk — Rewritable
CDS Chromatography Data System
CE Communauté Européene (EU Medical Device Mark)
CE Capillary Electrophoresis
CEFTC Chemical European Federation Industry Council
CENELEC European Committee for Electrotechnical Standardization
CFR United States Code of Federal Regulation
CGM Computer Graphics Metafile
cGMP Current Good Manufacturing Practice
CHAZOP Computer Hazard and Operability Study
CIM Computer Integrated Manufacturing
CIP Clean In Place
CISPR International Special Committee on Radio Interference (part of IEC)
CMM Capability Maturity Model
CO Costing
COBOL Common Business Oriented Language
COM Component Object Model
COQ Cost of Quality
COTS Commercial Off-The-Shelf
CPG Compliance Policy Guide (United States)
CPP Critical Process Parameter
CPU Central Processing Unit
CQA Critical Quality Attribute
CRC Cross Redundancy Check
CRM Certified Reference Material
CROMERR Cross-Median Electronic Reporting and Record-Keeping
CSA Canadian Standards Association
CSV Computer System Validation
CSVC Computer Systems Validation Committee (of PhRMA)
CTQ Critical to Quality
CV Curriculum Vitae
DAC Digital to Analog Converter
DACH German-speaking countries of Germany (D), Austria (A), and Switzerland (CH)
DAD Diode Array Detector
DAM Data Acquisition Method
DAT Digital Audio Tape
DBA Database Administrator
DBMS Database Management System
D-COM Distributed Component Object Model
DCS Distributed Control System
DDMAC Division of Drug Marketing, Advertising and Communications
DECnet Digital Equipment Corporation Network
DIA Drug Information Association
DLL Dynamic Link Library
DLT Digital Linear Tape
DoH U.K. Department of Health
DOS Disk Operating System
DPMO Defects Per Million Opportunities
DQ Design Qualification
DR Design Review
DRP Distribution Requirement Planning
DSL Digital Subscriber Line
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
xxii Abbreviations
Abbreviations xxiii
xxiv Abbreviations
Abbreviations xxv
xxvi Abbreviations
QM Quality Management
QMS Quality Management System
QP European Union Qualified Person
QS Quality System
QSIT FDA Quality System Inspection Technique
QTS Quality Tracking System
RAD Rapid Application Development
RAD Role Activity Diagram
RAID Redundant Array of Inexpensive Disks
RAM Random Access Memory
RCCP Rough Cut Capacity Planning
RCM Reliability Centered Maintenance
R&D Research and Development
RBE Review By Exception
RDB Relational Database
RDT Radio Data Terminal
RF Radio Frequency
RFI Radio Frequency Interference
RFID Radio Frequency Identification
RFP Request for Proposal
RH Relative Humidity
ROM Read Only Memory
RP German Federal Ministry for Health
RPharmS U.K. Royal Pharmacy Society
RPN Risk Priority Number
RSA Rivest, Shamir, Adleman Public-Key Cryptosystem
RSC U.K. Royal Society of Chemists
RTD Radio Data Terminal
RTF Rich Text Format
RTL/2 Real-Time Language, Version 2
RTM Requirements Traceability Matrix
RTSASD Real-Time System-Analysis System-Design
SAA Standards Association of Australia
SAM Software Assessment Method
SAP Systems, Applications, Products in Data Processing (Company)
SAP R/3 An ERP system developed by SAP
SaRS U.K. Safety and Reliability Society
SAS Statistical Analysis System
SAT Site Acceptance Testing
SATS System Acceptance Test Specification
SCADA Supervisory Control and Data Acquisition
SCR Source Code Review
SD Sales and Distribution
SDLC Software Development Life Cycle
SDS Software Design Specification
SEI Carnegie Mellon University’s Software Engineering Institute
SFC Sequential Function Chart
SGML Standard Generalized MarkUp Language
SHA Secure Hash Algorithm
SHE Safety, Health & Environment
SIP Sterilization In Place
SKU Stock Keeping Unit
SLA Service Level Agreement
SLC System Life Cycle
SM Section Manager
SMART Specific, Measurable, Achievable, Recorded, Traceable
SMDS Software Module Design Specification
S/MIME Simple Multipurpose Internet Mail Extension
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Abbreviations xxvii
xxviii Abbreviations
Contents
1. Introduction 1
3. Supporting Processes 32
xxx Contents
25. Case Study 7: Manufacturing Execution Systems and Electronic Batch Records 499
Peter Bosshard, Michael Schneider, and Robert Fretz
35. Case Study 17: Medical Devices and Their Automated Manufacture 689
Guy Wingate and Tom Ryan
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Contents xxxi
Glossary 729
Index 739
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0000_O.3d] [22/1/010/17:2:14] [1–32]
Contributors
1 Introduction
Computer systems support billions of dollars of pharmaceutical and healthcare sales revenues.
The pharmaceutical and healthcare industry has increasingly used computers to support the
development and manufacturing of their products. Within research environments, computer
systems are used to speed up product development, reducing the time between the
registration of a patent and product approval and, hence, optimizing the time available to
manufacture a product under a patent. Computer systems are also used to support routine
supply of medicinal products to improve manufacturing performance, reduce production
costs, and improve product quality. It is important that these systems are fit for purpose from a
business and regulatory perspective. Regulatory authorities treat a lack of regulatory computer
system compliance as a serious GxP deviation. Pharmaceutical and healthcare companies need
a balanced, proactive, and coordinated strategy that addresses short-, medium-, and long-term
and internal and external needs and priorities. This book aims to provide practical advice and
guidance on how to do this on the basis of extensive industry experience and with reference to
the latest regulatory developments and industry trends.
The scope of regulated computer systems includes systems used to manage data or
support decisions that are submitted or subject to review by regulated authorities whether they
are being submitted because they are required or used as supporting information.
The list of potential computer system applications that must comply with regulatory
requirements is extensive. Some examples of computer system applications impacted are
illustrated in Figure 1.1. Such diversity, coupled with the increasing scope of applications, has
led to some individual regulators to suggest that a simpler approach would be to declare that
all computer systems used within a manufacturing environment, whatever their application
be, must comply with regulatory requirements.
Business Case
Investments in computer systems are made on the basis of realizing a benefit. Claimed benefits
in the business case might include the following:
l Building in quality controls to ensure that the process is followed correctly, reducing
human error and the need to conduct manual checks.
l Standardization of practices to build consistent ways of working. This is increasingly
important for large multisite manufacturing organizations that are rationalizing their
operations.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
2 Chapter 1
More than one benefit should normally be delivered. Computer systems should not be
implemented solely for regulatory compliance; operational benefits should always be explored
as well.
Regulatory Compliance
The pharmaceutical industry is subject to GxP regulations such as the World Health
Organization’s (WHO) resolution WHA 22.50; the European Union’s (EU) Directive 2003/94/
EC; the Japanese Manual on Computer Systems in Drug Manufacturing; the U.S. Code of
Federal Regulations Title 21, Parts 210 and 211; and Medicinal Products, Part 1 of the
Australian Code of Good Manufacturing for Therapeutic Goods. Other countries have their
own regulatory requirements, which tend to have aligned expectations, although some specific
differences do exists.
GMP is enforced on the ground by the national regulatory authorities. Well-known GMP
regulatory authorities in the pharmaceutical industry include the U.S. Food and Drug
Administration (FDA), the U.K. Medicines and Healthcare products Regulatory Agency
(MHRA), the Australian Therapeutic Goods Administration (TGA), Health Canada, and the
Japanese Ministry of Health, Labor and Welfare (MHLW). The regulatory authorities can
prevent the sale of any product in their respective country if they consider its manufacture not
to be GxP compliant. To pharmaceutical and healthcare companies, GxP is nothing less than a
license-to-operate matter.
The process of demonstrating GxP has become known as validation and involves
This definition has been widely adopted, albeit with minor modifications, by the various
GxP regulatory authorities around the world and embraces facilities, equipment, systems, and
processes.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
Introduction 3
A general awareness within both the industry and the regulatory community of the need
to validate computer systems began to emerge formally in 1979, when the United States
introduced GxP regulatory legislation that specifically referred to automated equipment (2). In
1983 the FDA issued what became known as the “Blue Book” (because of the color of its cover)
guidance to inspectors on what was reasonable to accept as evidence for computer systems
compliance (3). The first widely publicized FDA citation (a formal written regulatory criticism
of a perceived noncompliance with the regulations) for computer system noncompliance was
issued in 1985.
The issue of computer systems validation assumed a high profile in Europe in 1990 when
two European pharmaceutical manufacturers did not satisfy computer compliance expect-
ations and were temporarily prohibited from exporting their products to the United States. EU
requirements for computer systems compliance were issued a few years later in 1993 and can
be found in Annex 11 in the EU GMPs (4). Once formal requirements had been defined,
European regulators started to make significant noncompliance findings at various pharma-
ceutical companies.
Australia and Canada have subsequently adopted Annex 11. Meanwhile, Japan issued its
first computer compliance guideline in 1993 (5). Computer compliance, however, did not
receive the industry profile in Japan that it did in the United States and Europe until the need
for electronic record and electronic signature controls emerged.
The United States was the first country to issue specific requirements for electronic
records and electronic signatures—21 CFR Part 11 was published in 1997 (6). It caused much
debate in terms of whether its expectations were reasonable and practical. The U.S. FDA
subsequently published industry guidance that applied a risk-based approach to controls (7).
Similar expectations were published by PIC/S for use by Australian, Canadian, and EU
regulatory authorities (8). The Japanese MHLW issued electronic record/signature require-
ments in 2005 on the basis of various discussions with industry (9). Both U.S. and EU
regulations are currently being updated to address these developments.
Table 1.1 provides a general summary of regulatory expectations for computer validation
together with prominent regulations for different sectors of pharmaceutical and healthcare
industry.
Cost of Compliance
Computer systems can account for significant capital and operating costs. Such assets deserve
careful management. The cost of compliance will depend on the breadth and depth of work
undertaken.
Current industry good practice suggests that compliance activities should account for not
more than 10% of project delivery costs (10). Anecdotal stories still circulate relating to
examples of excessive cost of validation. The root cause behind such high costs tends to be
poor project management, and when things go bad, people tend to want to find a scapegoat.
The primary factor that has typically driven the amount of validation has been the nature
of the computer system involved [whether standard application, configurable package, or
custom-built (bespoke) application]. This approach has been driven by ISPE/GAMP1,
specifically the use of software categories to derive basic compliance approach. Other factors
have had a limited influence on the amount of compliance work conducted, although risk-
based thinking has started to have an impact.
While current best practice represents a huge improvement in industry practice from the
1990s, there is still much that can be done to reduce costs further. As discussed later in this
chapter, it should be possible to reduce the cost of compliance below 5% of project costs while
at the same time improving the standard of compliance.
Operational Dividend
Compliant computer systems should yield an operational dividend (10). A survey of over three
hundred applications by Weinberg Associates suggests that maintenance savings within four
years generally offset the investment in validation. An example of such a maintenance
dividend is illustrated by a production planning system at ICI that adopted the principles of
validation for about half of its 800 computer programs. Management, halfway through the
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
4 Chapter 1
Food Requirement for process validation on U.S. Code of Federal Regulations 21 CFR
effective controls at critical points, and Part 110, and EU Directive 93/43/EEC
equipment maintenance. Computer
validation is recommended.
Dietary supplements Requirement for process characterization U.S. Code of Federal Regulation 21 CFR
and equipment maintenance. Part 111, 113 and 114), and EU
Computer validation is recommended. Directive 2002/46/EC
Cosmetics Requirement for computer validation. COLIPA and U.S. Code of Federal
Regulation 21 CFR Part 700, 701, 710,
720, and 740)
OTC medicines Process and computer validation is U.S. Code of Federal Regulation 21 CFR
required. Part 210 and 211, and EU Directive
2003/94/EEC
Prescription Process and computer validation is U.S. Code of Federal Regulation 21 CFR
pharmaceuticals required. Part 210 and 211, and EU Directive
2003/94/EEC
Biological and Process and computer validation is U.S. Code of Federal Regulation 21 CFR
biopharmaceuticals required. Part 600, 606, and 610, and EU
Directive 2003/94/EEC
Blood processing and Process and computer validation is U.S. Code of Federal Regulation 21 CFR
products required. Parts 800 and 820, EU Directive 2005/
02/EEC
Medical devices Process and computer validation is U.S. Code of Federal Regulations 21 CFR
required for medical device and its Part 820 (Quality Systems Regulation),
production. and EU 2007/47EEC coupled with CE
marking.
Abbreviations: COLIPA, European Cosmetic, Toiletry, and Perfumery Association; EU, European Union.
project, abandoned the quality approach because there was no perceived project benefit. The
total operational life of the system was later examined. It was found that maintenance costs for
the software adopting the principles of validation were about 90% less than the comparable
costs for the remainder of the software. Similar data has been found for MRP II/ERP systems.
With poor-quality software typically accounting for 50% to 60% of maintenance costs,
validation really does make good business sense.
Cost of Failure
The failure to comply with regulatory expectations can have significant financial implications.
Noncompliance incidents may lead to delays in the issue of a license or its withdrawal and
thus an embargo on the distribution of their product in the relevant marketplace (e.g., the
United States).
The financial consequences of correcting deficient validation might, at first sight, seem
small compared with the typical investment of US$800,000,000 to bring a new drug to
market (11). The real financial impact is the loss in sales revenue arising from a prohibition to
market the product. For top-selling drugs in production, citations for noncompliance by GxP
regulatory authorities can cost their owner upward of US$2,000,000/day in lost sales revenue.
One FDA Warning Letter cost the pharmaceutical manufacturer concerned over US
$200,000,000 to replace and validate a multisite networked computer system.
The trick is to cost-effectively conduct sufficient work to ensure GxP compliance, but, as
illustrated in Figure 1.2, there is always debate over how much is sufficient to fulfill the
regulator’s expectations. Excessive validation may increase confidence in regulatory compli-
ance, but it does not come cheap. Inadequate validation may actually be cheaper, but, in the
long term, the cost of regulatory noncompliance could be devastating. This book aims to clarify
how much validation is enough and to suggest how it can be cost-effectively organized and
also to discuss areas of debate.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
Introduction 5
There are numerous stakeholders with an interest in successful GxP inspection outcome.
GxP noncompliance is likely to reduce public confidence in the pharmaceutical and healthcare
industry and the offending company. Political pressures may result in improved industry
practices, influence the inspection approaches and methods of regulatory authorities, and/or
review the acceptability of compliance standards and guides. The standing of regulatory
authorities may be affected if they fail to notice noncompliance that lead directly to
substandard drug products being distributed and used. Associated legal liabilities may arise
for both the regulator and offending company. The company’s corporate reputation may take
years to recover. Drug sales are likely to fall as the consumers of the products, the prescribers,
and their patients, become uneasy about the quality and/or consistency of supply. Market
confidence in the offending company will be reduced, and the brand image will be tarnished.
The reputation of distributors may also be undermined through “guilt by association” with the
offending company. Insurance premiums for the company are likely to increase. As an overall
consequence, the jobs of all those working for the company and associated suppliers will be
less secure.
Pharmaceutical and healthcare companies should beware of persistent regulatory
noncompliance. Repeated failure to address specific topics will deeply concern regulatory
authorities. It is likely that they will escalate the severity of regulatory action taken. Company
reputation will suffer—not just with the regulatory authority concerned but also with industry,
and reputation can take a long time to reestablish. There may be fines too that need to be
considered. In exceptional circumstances, U.S. law allows “disgorgement,” whereby a
percentage of sales revenue can be taken as part of a penalty for persistent and serious
noncompliance that impacts public health.
6 Chapter 1
development, and manufacture. The quality of software is also highly dependent on design
and development, but its manufacturer consists merely of replication, a process whose validity
can be easily verified. For software, the hardest part is not replicating identical copies but
rather the design and development of software being copied to predetermined specifications.
Then again, software does not wear out like hardware. On the contrary, it often improves over
time as defects are discovered and corrected.
Third, another related characteristic of software is the speed and ease with which it can
be changed. Most applications today are based on configurable networked packages. Changes
are made by super users resetting configuration parameters. This characteristic often gives
users the impression that software problems can be easily corrected. This is true at one level,
but what appear simple changes to address a problem in one part of the application can also
create unwanted changes to the functionality elsewhere in the application. A similar issue
exists with custom-built (also known as bespoke) software applications. These include macros
developed for configurable packages. The complexity of custom software means that even
professional programmers can find modifications to code in one place causing unexpected and
very significant defects to mysteriously arise elsewhere in the program.
Fourth, the scope of different types of computer systems is changing. For instance, more
analytical equipment is being moved from the laboratory to be in-line or at-line with
manufacturing operations. With this move, responsibility has also changed. Typically, produc-
tion and engineering are responsible for these systems once colocated instead of QA when the
analytical equipment was located in a separate laboratory facility. Meanwhile, many process
control applications are now residing on IT platforms and as a consequence IT is responsible
rather than engineering for their upkeep. At the same time, some functionality once commonly
found as an integral part of IT applications has shifted and is now supported by IT infrastructure.
A good example is security access and password control. Many organizations now have a single
user log-on and shared password control for multiple applications, which is facilitated through
the desktop environment.
Finally, focus is now being put on the capability of an automated process rather than the
computer system itself. This emphasis promotes a better understanding and control of
business processes, which, in terms of developing, manufacturing, and supplying drug and
healthcare products, also supports the principal aim of GxP regulations to ensure product
safety, quality, and efficacy.
Introduction 7
overspend, with all planned functionality present, and almost one-fifth of applications are
never delivered at all (Fig. 1.4). Even if a project appears superficially to have been successful,
that does not imply that the application it delivered will be used long enough to repay the
investment. Many business cases for new software-related products require a return on
investment within three years, but in practice, a high proportion of systems have a shorter life
than this. Computer technology and business IT strategies tend to be very dynamic. In such a
changing environment, applications tend to be quickly labeled as inflexible and/or redundant,
requiring their replacement by new and more sophisticated systems long before they have
paid for themselves. And so the challenge to more robustly implement and exploit computer
systems continues.
Quality management systems (QMSs) must be mature and robust to mitigate the risk of
unsuccessful projects. Factors that critically determine the likelihood of success of computer
projects are summarized in Table 1.2. Lack of user input can almost be guaranteed to result in
an incomplete user requirement specification, a foundation of sand on which only the shakiest
edifice can be built. Those with only general skills should not be deployed on critical tasks such
as quality assurance, testing, and project management. Specific technical expertise and proven
competence are also required for handling new technology. Good team communications are
also vital. Ineffective supplier management and poor relationships with subcontractors
aggravate an already weak technical base. Software upgrades are often conceived to rectify
hardware deficiencies rather than seeking a more appropriate hardware solution. Teams often
mistakenly focus on innovation rather than on containing cost and risk.
Gaining acceptance of quality management is vital (13). Both the heart and the mind of
senior management must be behind the use and benefits of QMSs. There is more than enough
evidence around to make the case that QMSs work. Without clear leadership at an executive
level, however, it will be almost impossible to overcome statements like “We do not have time
for paperwork,” “We cannot afford the luxury of procedures,” “Too structured approach will
undermine flexibility, slow projects down, and increase costs,” and “The concept is good, and
we hope to use it some day but not just yet.”
Simply monitoring quality performance is just not adequate. The effectiveness of QMSs
should be actively managed, and performance improvement opportunities should be seized.
Business benefits should more than compensate for any investment in quality. Senior
Table 1.2 Factors That Affect Project Success Based on Standish 2006 Data
8 Chapter 1
management, system owners, project managers, and anyone else involved with computer
projects need to appreciate this. This book will help explain what needs to be done to
successfully achieve quality and compliance of computer systems in the pharmaceutical and
healthcare industries.
Regulatory Observations
There has been a steadily decreasing number of computer noncompliance observations during
regulatory inspections since the turn of the millennium. Indeed, in recent years, computer
systems–related issues are no longer even in top ten issues cited by regulators as compliance
deficiencies (14). This is a complete reversal of the trend seen in the 1990s when concern
around computer compliance was stoked by anxiety regarding electronic records, electronic
signatures, and Y2K millennium bugs.
It has been suggested that the steady decline in computer noncompliance observations is
in part due to the loss of experienced inspectors with expert knowledge in computer systems
from the major regulatory authorities. This might be true in part, but probably a bigger impact
is down to a change in approach and focus during inspections.
Computer systems rarely come under targeted and detailed inspection these days
without a specific reason (sometimes referred to as a “for cause” inspection). This is because
FDA and other regulatory authorities are adopting “quality systems”–based inspections that
are focused on examining processes rather starting from the bottom up looking at particular
SOPs, pieces of equipment, and physical systems. A recent legal challenge has affirmed that
noncompliant computer systems do not automatically compromise the safety of medical
products so long as an effective quality approach is taken (15). Similar feedback had been
given to FDA in response to a computer compliance–related Warning Letter (16).
Nowadays, there is also a general acceptance of a risk-based approach to better
understand the potential risk posed to patients and consumers. While some regulatory
authorities have been operating this way for many years, it is a much newer concept for others.
The real risk posed by computer systems may have been overestimated in the past because due
account was not taken of other controls that would detect and stop any adverse impact
reaching patients and consumers.
Finally, there is much more conscious attempt to link noncompliance observations on
computer systems back to actual regulatory requirements (sometimes referred to as predicate
rules). This has stopped personal interpretation by individual inspectors and encouraged a
much more consistent approach to identifying noncompliances.
Current noncompliance observations for computer systems tend to be made in one of
four following areas:
These reflect basic good practice deficiencies. These regulatory requirements are not new,
and due diligence should ensure that they are addressed. Senior management have no excuse
not to provide sufficient resource and time to validate computer systems that need it.
Introduction 9
Figure 1.5 Specification and verification model. Source: From Ref. 19.
technological advances (17). Early examples of specific regulatory guidance mentioning risk
management for computer systems include
l FDA Final Guidance on Scope and Application for 21 CFR Part 11 Electronic Records;
Electronic Signatures (8) and
l PIC/S Good Practices for Computerized Systems in Regulated GxP Environments (9).
Early attempts at risk management were not particularly sophisticated. Risks were often
oversimplified, and their management was based on opinion rather than scientific knowledge.
Perhaps most crucially, risk management did not typically take into consideration the ultimate
impact risks posed to patients. The need for further regulatory guidance was clear. In response,
in 2005 the ICH published the consensus expectations from U.S. FDA, European EMEA, and
Japanese regulatory authorities for quality risk management (18). The general principles and
process presented were consistent with medical device practices and directly applicable to
computer systems. Q9 was incorporated into U.S., EU, and Japanese GMPs in 2006.
The impact of taking a risk-based approach to facilities, equipment, and systems was
subsequently explored by ASTM and resulted in the publication of high-level guidance in 2007
(19). ASTM promoted the model in Figure 1.5 that emphasized risk management as occurring
throughout the life cycle and not just as a discrete activity. The work also drew attention to the
need to remove non-value-added activities (such as repeating supplier testing and creating
unnecessary documentation) that had emerged over the past decades as part of industry
custom and practice.
Although GAMP14 Guide (20) provided some basic guidance on risk management for
computer systems, it was not until 2008, when GAMP15 was published (21), that detailed
practical guidance became available, showing how to adopt and exploit a risk-based approach.
GAMP has emerged through its various editions as the unofficial consensus standard for
computer compliance between regulators, pharmaceutical companies, and suppliers around
the world. GAMP guidance covers IT applications, analytical laboratory applications, process
control systems, and IT infrastructure (networks and desktop environments) governed by GxP
regulations. The main GAMP15 Guide is complemented by a number of Good Practice Guides
providing further guidance on particular topics:
10 Chapter 1
Another key industry update to occur in 2008 was the publication of the second edition
of the Red Apple Report first published 20 years earlier (31). Although the document is titled
for computerized systems used in nonclinical assessments, it effectively provides general
GCP/GLP guidance. The contents cover full life cycle requirements including electronic
records management but does not deal with risk management.
A number of regulatory updates are in progress to remove inadvertent dependencies that
constrain use of new technology, ensure that controls for electronic records and signatures are
practical, and facilitate the use of a risk-based approach. U.S. GMPs (21 CFR 211) for finished
pharmaceutical were updated in 2008 to allow the second person checks to be replaced by
automated verification. The U.S. regulation on electronic records and signatures (21 CFR 11) is
expected to be updated to align to FDA industry guidance issued in 2003 (32). Amendments
have also been proposed to EU GMPs to clarify requirements for handling records and
documentation and the introduction of particular requirements for electronic records (33).
A summary of regulatory authority expectations and industry guidance is presented in
appendixes 1 and 2, respectively.
Figure 1.6 New 21st century paradigm. Source: From Ref. 21.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
Introduction 11
the products and services used. After all, the focus of supplier organizations is to have a
fundamental understanding of the computer systems and associated services they offer to
customers.
12 Chapter 1
Scalable Activities
Compliance activities through a computer system life cycle should be scaled where it makes
sense to stop otherwise redundant work. The degree of scaling will depend on the attributes of
an individual computer system.
Scaling has conventionally almost always been limited to just considering system
novelty. However, there are several other important factors worthy of consideration. Key
attributes to take account of include
l Impact of system and its data on quality, safety, and efficacy of medicinal product
taking into account severity of potential harm to patient/consumer that could result,
l System complexity (size and architecture),
l System novelty (degree of standardization and number of other organizations actively
using the system), and
l Supplier capability (project management, technical, and level of reliance on temporary
staff and third-party organizations).
Scaling may not always be practical. The time and effort to determine and implement
scaling may outweigh the benefits of just validating the whole system to a higher-than-needed
level for simple computer systems. No adverse regulatory comment will be received in these
situations provided the computer systems are compliant.
Introduction 13
Terminology
The choice of terminology to describe these principles must not interfere with effective
implementation of these principles. While it is up to individual companies to agree to their
own lexicon, it is important to recognize the benefits of using industry standard terminology to
promote common understanding between pharmaceutical companies, suppliers, and regula-
tory authorities.
This book uses established regulatory definitions for computer validation that are
consistent with the key principles behind the 21st century paradigm. GAMP15 has introduced
a framework of specification and verification to act as umbrella terms for the various activities
involved in defining a computerized system and the various review and testing activities
involved in qualifying a computerized system as fit for its intended purpose. This framework
aligns both with established use of qualification and validation terminology and also the use of
specification and verification championed by ASTM (19).
GOOD PRACTICE
Quality Assurance
The achievement of quality in a product should be based on the adoption of good practices.
Neither these, in relation to computer systems or not, nor the concept of quality were invented
by the pharmaceutical and healthcare industry. Good computer practices existed long before
pharmaceutical and healthcare industry regulations required their application. The basic
underlying premise is that quality cannot be tested into computer systems once developed. On
the contrary, it must be built in right from the very start. Defects are much cheaper to correct
during the early stages of system development compared to leaving them to be weeded out
just before release or, perish the thought, by disaffected customers. The additional cost
generated by ensuring that the system is sound at every stage in its development from
conception to testing is far less than the cost and effort of fixing the computer system
afterward, not forgetting the hidden losses suffered through customer disaffection. So do not
wait until the end of the project to put things right!
Sir John Harvey-Jones, Chairman of the former industrial chemicals giant ICI, summed
this up pithily, “The nice thing about not planning is that failure then comes as a complete
surprise.” This said, it is important to appreciate that planning does not come naturally to
many people, and the temptation to jump into code development before the groundwork of
properly defining requirements has been completed often proves irresistible. This tendency
can be exacerbated by managers expecting too much too soon. A degree of self-discipline is
required as shortcutting the quality process will almost certainly wreak havoc later on.
Duty of Care
Like other financial governing bodies around the world, the London Stock Exchange requires
pharmaceutical and healthcare companies to comply with laws and regulations including
those dealing with GxP and consumer protection (38). Collectively, these are often portrayed as
the exercise of a “duty of care” through operating in a responsible and reasonable manner.
This duty of care embraces the use of computer systems because of the crucial role they play in
determining the quality of drug and healthcare products. Failure in this duty of care implies, at
best, negligence or incompetence; at worst, it may infer fraud and may subject senior personnel
to prosecution and legal penalty. However, the net of responsibility falls wider than the
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
14 Chapter 1
Buyer Beware
Regulatory authorities do not approve computer systems, neither do they agency certify
suppliers or consultants. Pharmaceutical and healthcare companies have always been and
remain accountable for compliance of the computer systems they use. Audits and
certifications, however rigorously applied and conscientiously implemented, are no substitutes
for validation.
WIDER APPLICABILITY
Validation is recommended for all computer, control, and laboratory systems that have the
potential to seriously affect safety, health, and environmental (SHE) conformance and
adherence to other regulatory requirements (e.g., Data Protection Act and financial control
legislation such as Sarbanes-Oxley).
REFERENCES
1. FDA. General Principles of Validation. Rockville, MD: Food and Drug Administration, Center for
Drug Evaluation and Research, 1987.
2. FDA. General Principles for Software Validation. Final Guidance for Industry and FDA Staff, Food
and Drug Administration, Centre for Devices and Radiological Health, 2002.
3. FDA. Guide to Inspection of Computerised Systems in Drug Processing. Technical Report, Reference
Materials and Training Aids for Investigators. Rockville, MD: Food and Drug Administration, 1983.
4. European Union. EU GMP Annex 11 Computerised Systems. Guide to Good Manufacturing Practice
for EU Directive 2003/94/EC, Community Code Relating to Medicinal Products for Human Use, Vol
4, 2003.
5. Japanese Ministry of Health and Welfare. Guideline on Control of Computerised Systems in Drug
Manufacturing. Manual for Control of Computerised Systems in GMP, Audit Manual for
Manufacturers of Pharmaceutical Product with Computer Systems, 1993.
6. FDA. Preamble to Electronic Signatures and Electronic Records. Code of Federal Regulation Title 21,
Part 11. Rockville, MD: Food and Drug Administration, 1997.
7. FDA. 21 CFR Part 11 Electronic Records; Electronic Signatures—Scope and Application. Guidance for
Industry. Rockville, MD: Food and Drug Administration, 2003.
8. Pharmaceutical Inspection Co-operation Scheme. Good Practices for Computerised Systems in
Regulated GxP Environments. Pharmaceutical Inspection Convention, PI 011-1, Geneva, 2003.
9. Japanese Pharmaceutical Manufacturers Association. Guideline for the Application of ERES in
Production Control and Quality Control for Human Drug Manufacturing, 2002.
10. Wingate GAS. Computer Systems Validation: Quality Assurance, Risk Management and Regulatory
Compliance for Pharmaceutical and Healthcare Companies. Boca Raton, FL: Interpharm Press, 2003.
11. Faiella C. Pharmaceutical Industry Report: the Next Pharmaceutical Agenda. Ernst & Young, 2002.
12. Standish Group. Sixth Chaos Report. Available at: www.standishgroup.com, 2006.
13. Bennatan EM. On Time, Within Budget: Software Project Management Practices and Techniques.
New York: Wiley Press, 2000.
14. BioQuality. US Versus EU Inspection Results. 2008; 13(1).
15. BioQuality. Validation and Compliant Handling Court Decision Allows Increased Flexibility. 2005;
10(11).
16. Wingate GAS. Computer Compliance: Expectations & Experiences. FDA Process Analytical
Technologies Sub-Committee Meeting, Washington, October 23, 2002.
17. FDA. Pharmaceutical CGMPs for the 21st Century: a Risk-Based Approach. Rockville, MD: Food and
Drug Administration, 2004.
18. ICH. Quality Risk Management. Q9 Document, Technical Requirements for Registration of
Pharmaceuticals for Human Use, International Conference on Harmonisation (ICH). Available at:
www.ich.org, 2005.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
Introduction 15
19. ASTM. E2500-07 Standard Guide for Specification, Design and Verification of Pharmaceutical and
Biopharmaceutical Manufacturing Systems and Equipment. American Society for Testing and
Materials, 2007.
20. ISPE. GAMP1 Guide for Validation of Automated Systems (known as GAMP14), Tampa, FL:
International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2001.
21. ISPE. GAMP15: Risk-Based Approach to Compliant GxP Computerised Systems. Tampa, FL:
International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2008.
22. ISPE. GAMP1 Good Practice Guide: Electronic Data Archiving. Tampa, FL: International Society for
Pharmaceutical Engineering. Available at: www.ispe.org, 2007.
23. ISPE. GAMP1 Good Practice Guide: Testing GxP Systems. Tampa, FL: International Society for
Pharmaceutical Engineering. Available at: www.ispe.org, 2005.
24. ISPE. GAMP1 Good Practice Guide: Global Information System and Compliance. Tampa, FL:
International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2005.
25. ISPE. GAMP1 Good Practice Guide: IT Infrastructure Control and Compliance. Tampa, FL:
International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2005.
26. ISPE. GAMP1 Good Practice Guide: Validation of Laboratory Computerized Systems. Tampa, FL:
International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2005.
27. ISPE. GAMP1 Good Practice Guide: Risk-Based Approach to Electronic Records and Signatures.
Tampa, FL: International Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2005.
28. ISPE. GAMP1 Good Practice Guide: Legacy Systems. Tampa, FL: International Society for
Pharmaceutical Engineering. Available at: www.ispe.org, 2003.
29. ISPE. GAMP1 Good Practice Guide: Validation of Process Control Systems. Tampa, FL: International
Society for Pharmaceutical Engineering. Available at: www.ispe.org, 2003.
30. ISPE. GAMP1 Good Practice Guide: Calibration Management. Tampa, FL: International Society for
Pharmaceutical Engineering. Available at: www.ispe.org, 2001.
31. DIA. Computerized Systems Used in Non-Clinical Safety Assessment: Current Concepts in Validation
and Compliance (known as Red Apple II), published by Drug Information Association, 2008.
32. FDA. 21 CFR Part 211 Supplementary Information—Code of Federal Regulation. Rockville, MD: Food
and Drug Administration, 2008.
33. European Commission. Draft Annex 11—Computerised Systems (EU Guideline to Good Manufactur-
ing Practices for Medicinal Products for Human and Veterinary Use), Public Consultation Document,
Brussels, April 2008.
34. Wingate GAS. GAMP15 Drivers, Objectives and Benefits. Launch of GAMP15, ISPE US Conference
on Manufacturing Excellence, Florida, February 25–28, 2008.
35. Selby D. Validating Complex Computer Systems. ISPE Turkey Annual Meeting, Istanbul, March 28,
2008.
36. Daw E. Case Study—Effective & Efficient Compliance. Launch of GAMP15, ISPE European
Conference on Innovation, Copenhagen, Denmark, April 7–10, 2008.
37. The Institute of Chartered Accountants in England and Wales. Internal Control: Guidance for
Directors on the Combined Code. ISBN 1-84152-010-1, 1999.
38. ISO. ISO 90003: Software Engineering—Guidelines for the Application of ISO 9001:2004 to Computer
Software. Geneva, Switzerland: International Organization for Standardization, 2004.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
16 Chapter 1
Appendix 1: Body of Knowledge: Regulatory Authority Expectations
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0001_O.3d] [21/1/010/13:54:7] [1–17]
Introduction 17
Appendix 2: Body of Knowledge: Industry Guidance
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0002_O.3d] [22/1/010/17:2:55] [18–31]
INTRODUCTION
This chapter suggests an approach to the organization and management of computer
compliance that satisfies the regulatory accountabilities. However, in presenting this offering,
we do not purport to suggest that this is the only acceptable approach. The needs of each
pharmaceutical and healthcare company will vary since these depend on many different
factors, including company culture, how much work there is to do, and the availability of
suitably skilled company and contract staff.
ORGANIZATIONAL RESPONSIBILITIES
Structure and Management
The organizational structures in the enterprise, whatever its size, must be defined and
documented. GxP regulatory authorities expect to see an organizational chart with the various
roles of different departments clearly specified. Of critical importance in these is the position of
quality staff whose role and reporting relationships must not compromise their ability to
discharge their responsibilities including the escalation and resolution of quality and
compliance issues. Quality departments are typically independent of other functions to
ensure impartiality. This will prove crucial if things go awry later on.
Senior management is responsible for ensuring that personnel assigned to compliance work
are competent to fulfill their role and for arranging any supplementary training requirements.
Evidence that individuals have sufficient education and experience to enable them to undertake
their assigned functions will need to be collected and kept ready for presentation when required.
Role descriptions for individuals should be prepared and kept up-to-date.
It is not acceptable for senior managers to rely on individuals to fulfill their role without
management support. Individuals must be given sufficient authority to fulfill their duties.
Duties may be delegated to designated deputies with satisfactory levels of competence. It is
recommended that deputies are assigned for critical roles so that working practices are not
hamstrung when key staffs are absent.
may also have other duties. The company must formally acknowledge and concede that these
other duties do not excuse or relieve his or her responsibility for compliance to the GxP regulatory
authorities. In the phrase forever associated with President Harry S. Truman, the buck stops here!
Sufficient Resources
Senior management must ensure that an adequate number of personnel are available with the
necessary qualifications and practical experiences appropriate to their responsibilities.
Insufficient personnel will attract regulatory criticism, since this is likely to lead to individuals
being burdened with excessive responsibilities and workloads and subjected to inordinate
pressure. The consequential risk is that quality will then be compromised in some way. In the
worst case situation, senior company executives are subject to potential prosecution if they fail
to meet such regulatory expectations (2). Blaming a lack of competent personnel on corporate
challenge for minimum staffing levels or reduced training budgets will not be accepted by the
regulatory authorities for whom public health comes above company profits.
Governance
The expected role of senior managers is defined by the ISO 9001 standard, which states that
management shall
define and document [the company’s] policy and objectives for, and commitment
to, quality and ensure that this policy is understood, implemented and maintained
at all levels in the organization. (2)
While this is useful, more practical guidance is available. An interpretation of the ISO
requirements based on work by Teri Stokes is presented below (3).
20 Chapter 2
COMPLIANCE STRATEGY
Organizational Capability
From the outset the aim must be to achieve compliance in a manner as cost-effective as
practicable. Many pharmaceutical companies who have rushed into the remediation of
computer systems have subsequently discovered to their cost that inefficient compliance
programs are hugely expensive, involving much more work than is really necessary.
Figure 2.1 illustrates three basic compliance strategies by comparing the cost associated
with compliance (prospective validation) against the cost associated with noncompliance (the
combined impact of retrospective validation and business disruption).
Point A in the graph denotes the breakeven point where the cost of noncompliance
equals the cost of compliance. This may appear to indicate the ideal amount of compliance
effort, an effort that just delivers compliance but constrains cost by going no further. Is this
really the ideal that should be aimed at? Compliance requirements enforced by the various
regulatory authorities are interpretative, not prescriptive. Further, regulatory inspections are
never exhaustive; practical limitations of time and resources mean that inspections can only
ever examine a proportion of a company’s operation. Therefore, they cannot ensure the
exposure of all noncompliances. Assessing where point A really is thus inspired guesswork,
something of an art rather than a science. Aiming at point A but missing it will mean either that
compliance is not achieved or that money has been wasted! An alternative strategy that is often
adopted after a serious noncompliance has been revealed by a regulatory authority is to aim
for point C. This point represents an exhaustive (risk-averse) compliance effort in a climate of
zero tolerance of any regulatory criticism, however minor. The cost that this point implies is
exorbitant and adding little value to the business or indeed to the likelihood of regulatory
compliance—most of it is unnecessary overhead. It is useful, then, to consider a third
compliance strategy, the middle way, whereby a more balanced approach to compliance is
adopted. It has been claimed that this type of approach can lead to 40% to 50% cost savings
when compared with those incurred at point C while still maintaining a sustainable level of
regulatory compliance (4). Point B can be viewed as a common sense approach, erring on the side
of caution by being more conservative than that represented by point A. There is a broad
consensus on the wisdom of setting compliance effort at this point. Its precise location can only
be determined by surveying industry practice and monitoring regulatory expectations.
Benchmark exercises are not readily available, so a more ad hoc collation of information
derived from consultants, new recruits, industry associations, and informal regulatory contacts
is often used. As long as the quality of information is adequate, not being tainted by hidden
political agendas, it should be possible to arrive at point B relatively easily.
Both prospective and retrospective validation must be considered for new and existing
computer systems, respectively. Figure 2.2 outlines the relationship between prospective and
retrospective validation. New systems must be authorized for use, while the continuing use of
existing systems must be justified. Once validation is achieved, it must be maintained despite
any changes that are made to it. All such changes must be scrutinized through change control
and the revised system specifically authorized for use. Periodic reviews must also be
performed to ascertain whether an overall revalidation is required, as a result of cumulative
system changes over time, regulatory developments, or organizational changes that impact
company standards. If the use of a computer system cannot be justified, then it should be
decommissioned through a premature retirement. Computer systems will require decom-
missioning at some time anyway once they reach the end of their useful life.
22 Chapter 2
Key principles for computer systems compliance policy are presented in Appendix 2.A.
These principles have been prepared to address the basic requirements of the following
regulatory authorities:
l U.S. FDA
l U.K. Medicines Healthcare products Regulatory Authority (MHRA)
l Japanese Ministry of Health, Labour and Welfare (MHLW)
l Australian Therapeutics Goods Administration (TGA).
Experience has shown that a clear, concise compliance policy for computer systems can
be achieved within a 5- to 10-page document and produced in a couple of man-months.
Typically, most of the effort is spent in consultative meetings to secure a consensus on the
content of the policy that should, in any event, confine itself to high-level statements of
principle. It should, by its nature, be relatively stable. Nevertheless, it should be periodically
reviewed and kept up-to-date.
Management
l Validation planning
l Supplier audit
l Risk management
l Design review and traceability analysis
l Quality planning
l Validation reporting
l Change control (project and operational)
l Configuration management
l Document management
Project
l User requirements specification (URS)
l Functional specification
l Hardware design specification
l Software design specification
l Software controls
l Testing (qualification/verification)
Operation
l Periodic review
l Service level agreements
l Security
l Performance monitoring
l Record retention, archive, and retrieval
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0002_O.3d] [22/1/010/17:2:55] [18–31]
Managing electronic records and electronic signatures may be handled with separate
SOPs or integrated into the above. An abridged set of procedures will be appropriate for small
systems, but supplementary procedures will be needed for larger ones.
Management must approve procedures and any subsequent changes made to them.
Approval signatures will be required from at least two individuals representing a quality and
technical perspective. Management must then ensure that any deviation from these procedures
is properly authorized and documented. Deviations will often be associated with corrective
actions arising from internal audit findings; these must also be documented together with the
evidence that demonstrates their resolution.
The effort to produce these procedures may require about 40 days from an experienced
consultant. Use should be made of industry guidance when developing procedures, for
example, GAMP15 example procedures and IEEE standards. Where existing procedures are
being revised to achieve compliance, this estimate of effort could be reduced by about two
days per procedure. As recommended above, this should be supplemented with about 20 days
of effort across all the procedures, shared among a team of end users. The individuals should
contain the core users who are involved in all the procedures, to ensure consistency. Other end
users on the team, however, can be seconded for the development of particular procedures in
which they have a specific interest, or can contribute a particular skill or competence. For
instance, an end user quality representative may wish to be seconded for the development of
the security procedure.
To make the preparation of these procedures easier, many organizations are developing
document templates and tools to assist practitioners prepare, review, and approve documents
in a rapid, quality-conscious fashion.
Many pharmaceutical and healthcare companies find it beneficial to also tailor particular
sets of procedures to different types of systems. This may also help ownership and adoption
since different types of systems are usually supported by QA/laboratory, engineering, and IT
departmental functions. From a technical standpoint too, it is very difficult to make a single set
of procedures easy to use while providing a practical level of detail to address the various
technical characteristics of different types of computer systems—one size does not readily fit
all. As a consequence, typically, there might be four sets of procedures.
An additional set for desktop applications (e.g., spreadsheets, databases, and web
applications) may be needed, but more typically, these are included within the general scope of
IT systems.
There are inevitable interfaces between the application areas of the various sets of
procedures and the computer systems to which they apply, as indicated in Figure 2.3. Client-
server technology is typically the deciding factor in determining whether control system and
laboratory application projects would be better served by IT system procedures. Another
example might be that robotic systems used to automate laboratories would be better served
by control system procedures.
No evidence that the quality policy has been implemented, understood, and maintained
by all levels of the organization (FDA Warning Letter, 2001)
Quality system procedures not implemented (FDA 483, 2002)
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0002_O.3d] [22/1/010/17:2:55] [18–31]
24 Chapter 2
There is no list of all systems that are subject to validation (FDA 483, 2004).
Unvalidated systems have not been identified (FDA 483, 2004).
26 Chapter 2
Getting Started
There are two main obstacles to be surmounted here. One is a lack of compliance experience, and
the other, an absence of focus and determination. Weak compliance experience is often
characterized by questions like “Why are we doing this anyway?” and “What are the
fundamental principles we should follow?” Education and training, and managing the learning
curve are both key issues. Managers and sponsors, as well as practitioners, need a practical
appreciation of compliance requirements (trends, constraints, areas of flexibility, and benefits). It
must be understood that initial work will require more effort, because practitioners will not be
familiar with the new way of working. It is wise to avoid large work packages as the starting
point for adopting the new quality-assured mode of working, since the scale of inefficiency might
shock an organization, is tempting it to abandon the quality-assured approach altogether. It is
better to begin with smaller work packages and watch costs reduce as practitioners improve their
understanding and efficiency. The learning curve will eventually flatten out to a plateau.
However, herein lies another danger. If key staffs move on and leaning has not been captured in
the corporate memory (policies, procedures, guidance, training, and succession planning),
learning and efficiency will be lost. Hopefully avoiding these pitfalls, there is still a need to pace
the introduction of the new way of working in case progress is not forthcoming. The best course is
to build on success and extend the new ways of working based on a proven track record.
Risk Management
Risk management is very important if appropriate resources are to be deployed in a timely
fashion to mitigate or reduce the potential effect of identified risks. It is recommended that a
risk map be produced showing where computer systems are used to support the various
process streams of operational activity.
Determining which operational aspects are most critical requires an understanding of the
potential impact on drug or healthcare product safety, quality, and efficacy. The Canadian
Health Products and Food Branch Inspectorate have already identified a number of high-risk
issues that are likely to result in noncompliant drug product and present an immediate or
latent public health risk (6). A similar identification of high-risk issues can be achieved by
applying International Conference on Harmonisation (ICH) Q9 regulatory guidance (7). These
high-risk issues are applied here to computer systems and aligned to the six operational areas
identified by FDA quality system-based approach (8).
Quality Systems
l Document management
l SOP administration
l Customer complaints
l Training records
Materials Systems
l Traceability of material handling
l Storage conditions
Production Systems
l Recipe/formulation management
l In-process testing
l Yield calculation
l Purified water
l Aseptic filling
Workflow analysis using flowcharts marking critical decision points and information
flows is an effective way of pictorially mapping risks. The use of computer systems should be
identified on the maps. Other relevant supplementary information can be added as deemed
appropriate. A balance has to be struck on the amount of information included so that the
process can be mapped in a manageable number of pages. Producing the risk map on A3 size
paper can help given a better overview.
The rigor of validation for computer systems supporting these critical operational aspects
of the processes should take account of their composite custom (bespoke) software,
commercial off-the-shelf (COTS) software, and supporting computer network infrastructure.
The risk map and supporting rationales will form the basis of validation master plans that are
discussed in more detail later in this book.
28 Chapter 2
supplier selection often involves a series of steps beyond assessment to include corrective
actions that may not be complete until well into the project.
Some of the steps in the life cycle will not be needed in some projects. For instance, the
use of preferred suppliers for software and hardware products or services removes the need
for repeated supplier appraisal and selection.
For systems that have been in use for some time, a compilation and review of
documentation, and a review of historical data supplemented by a series of functional tests
may be adequate to demonstrate that the system performs its intended function. Evidence that
the software is structurally sound may be provided by a formal evaluation of the supplier’s
software development and testing procedures and by an analysis of historical, system-related
data. Where historical, system-related data is not available, for whatever reason, additional
functional testing may be required.
MANAGEMENT REVIEW
A management review will usually be conducted periodically to draw out lessons from the
compliance work conducted to date, to consider the impact of any regulation developments,
and to report any recommendations. It should also effectively address any inspection issues
raised by regulatory authorities concerning the company’s computer systems. The overall aim
is the continuous improvement of the company’s compliance capability (policy, strategy,
procedures, training, etc.).
Projects can provide a central focus for applying and refining policies and procedures.
Feedback from practical experience is vital if a cost-effective compliance approach is to be
established. An external consultant may be seconded to provide an independent perspective,
to comment on current industry practices, and to provide updates on topical regulatory issues.
Compliance does not have to be unduly expensive if the issues involved are managed in a
timely manner.
It is recognized that senior managements in pharmaceutical and healthcare companies
are faced with multiple and changing priorities: for example, customer service, quality, and
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0002_O.3d] [22/1/010/17:2:55] [18–31]
financial performance. Nevertheless, it is very important that the level of support given to
compliance is sustainable. Should it falter, the organization will face pendulum swings of
compliance investment and compliance underfunding. Such feast and famine nearly always
leads to a serious noncompliance sooner or later, as practices try to adapt to the level of
prevailing financial support. Senior management should beware of making arbitrary cuts and
rather work on cost-effectiveness improvements. Equally, throwing money at compliance does
not necessarily result in it becoming “solved.” Senior management must avoid the notion that
compliance is a one off project type activity. Inspection readiness results from maintaining the
ongoing compliance of legacy systems that must be properly supported; otherwise their
compliance will be compromized over time.
REFERENCES
1. Organisation for Economic Co-operation and Development Environmental Directorate. The applica-
tion of the principles of GLP to computerised systems. No. 10 OECD Series on Principles of Good
Laboratory Practice and Compliance Monitoring, GLP Consensus Document, Environmental
Monograph No. 116. Paris, 1995.
2. International Organisation for Standardisation. ISO 9001: International Standard: Quality Manage-
ment Systems—Requirements. Geneva, 2008.
3. Stokes T. The role of senior management in computer systems validation. In: Stokes T, Branning RC,
Chapman KG, et al., eds. Good Computer Validation Practices: Common Sense Implementation.
Buffalo Grove: InterPharm Press, 1994.
4. Bruttin F, Dean D. A risk-based approach to reducing the cost of compliance in pharmaceutical
manufacturing. Pharm Technol Eur 1999; 36–44.
5. International Society for Pharmaceutical Engineering. GAMP15—Risk-Based Approach to Compliant
GxP Computerised Systems. Available at: www.ispe.org, 2008.
6. Canadian Health Products and Food Branch Inspectorate, Good Manufacturing Practices—Risk
Classification for GMP Observations, 2000.
7. International Conference on Harmonisation. Quality risk management. Q9 document, technical
requirements for registration of pharmaceuticals for human use (ICH). Available at: www.ich.org,
2005.
8. U.S. Food and Drugs Administration. Quality systems based approach for pharmaceutical current
Gmp regulations, guidance for industry. Rockville, MD, 2006.
9. Therapeutic Goods Administration. Australian Code of Good Manufacturing for Therapeutic Goods.
Medicinal Products—Part 1, Woden. Australia, 1990.
10. European Union. EU GMP Annex 11 Computerised Systems. Guide to Good Manufacturing Practice for
EU Directive 2003/94/EC. Community Code Relating to Medicinal Products for Human Use 2003; 4.
11. Japanese Ministry of Public Welfare. Guideline on computer systems in drug manufacturing in
manual on computer systems in drug manufacturing, 1993.
12. U.S. Food and Drugs Administration. Guide to inspection of computerised systems in drug processing.
Technical report, Reference Materials and Training Aids for Investigators. Rockville, MD, 1983.
13. Pharmaceutical Inspection Co-operation Scheme. Good Practices for Computerised Systems in
Regulated GxP Environments. Pharmaceutical Inspection Convention, PI 011-1, Geneva, 2003.
14. Drug Information Association. Computerized Systems Used in Nonclinical Safety Assessment:
Current Concepts in Validation and Compliance (known as “Red Apple II”), 2008.
30 Chapter 2
Founding Principles
1. Validation requires establishing documented evidence that provides a high degree of
assurance that a computer system will consistently perform according to its
predetermined specifications. A key consideration is the protection of the integrity,
authenticity, and security of data relating to the quality of drug and healthcare
products and/or supporting regulatory submissions.
2. Decisions on the extent of validation and data integrity controls should be based on a
justified and documented risk assessment. Factors to consider include business and
regulatory criticality of the process the system is to support, the potential risks to
product quality or safety the system could pose, and the source of the system (custom
written or COTS).
3. It is essential that there is the closest cooperation between key personnel involved
with the development, management, and use of computerized systems such as users,
system administrators, quality assurance, and technical staff. Persons performing
such roles should have the appropriate and documented training, technical expertise,
and experience to carry out their assigned duties.
4. Electronic records may be signed electronically or by applying a handwritten
signature to a printed copy of the record. Electronic signatures are expected to be
legally equivalent to handwritten signatures, linked to their respective record, and
include the time and date they were applied. Hand-signed printed copies should
provide indisputable linkage with the electronically held record.
Management Requirements
5. All new systems requiring validation must be validated prospectively. Existing
systems that require validation but have not already been validated must be
retrospectively validated.
6. Validation must be planned, executed, and reported. Validation encompasses the
entire life of the computer system, from planning through development and
implementation, and use and operational support to decommissioning. Responsi-
bilities and accountabilities must be defined and documented.
7. Computerized systems must have documented authorization to be used in their
operating environments. Any restrictions impacting use must be recorded and
authorized.
8. Validation must employ predefined procedures and plans designed to build in
quality during all stages of the computer system life cycle. The effectiveness of these
procedures must be assessed periodically, and improvements must be made as
required.
9. System requirements must be traceable throughout specification, verification, and
subsequent change control records.
10. Suppliers of computer systems and associated services must be managed to assure
that the software, hardware, and/or related services they supply are fit for purpose.
11. Enhancements and modifications to computer systems and associated documenta-
tion must be implemented under change control, and, where appropriate, config-
uration management. Changes affecting the compliance status of a computer system
must be approved before they are implemented.
12. Those involved in the development and implementation, use and operational
support, and decommissioning of computer systems must have the documented
education, training, and experience to fulfill their duties.
13. Rationales must be developed and documented to justify compliance decisions not
supported elsewhere.
Project Requirements
14. User requirements and design must be specified, documented, and approved.
15. Software controls must be used to manage programming.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0002_O.3d] [22/1/010/17:2:55] [18–31]
Operation Requirements
20. The performance of computer systems must be monitored against predefined
requirements to demonstrate acceptable operational service.
21. Preventative maintenance and calibration, where required, must be planned,
conducted, and documented.
22. Software changes and upgrades must be conducted according to defined procedures
and documented.
23. Records must be established to demonstrate data integrity being maintained.
24. Backups of software, configuration, and data must be planned, conducted, and
documented. Backup data must be readable and therefore retrievable.
25. Archiving of software, configuration, data, and associated documentation must be
planned, conducted, and documented. Storage media must be retained for a
predefined period at a separate and secure location under suitable environmental
conditions, be protected against willful or accidental damage, and be periodically
checked for durability and restoration. Archived materials must not be destroyed
until this retention period has expired.
26. The procedures to be followed if the computerised system breaks down and is
unavailable must be documented and periodically verified.
27. Access to computerized systems and associated functionality must be restricted to
authorized persons, and documented.
28. Formal agreements regarding operational support (e.g., contracts and service level
agreements) must be established by defining responsibilities and accountabilities.
29. User procedures must be established and trained out to ensure that computer
systems are consistently used.
30. The compliance status of computerized systems and the cumulative effect of change
must be periodically reviewed, and any required revalidation must be conducted.
31. Decommissioning of computer systems must be planned and conducted in
accordance with defined procedures.
3 Supporting Processes
INTRODUCTION
Successful validation depends on the satisfactory operation of a number of underlying
supporting processes. Among these are training, document management, change control,
configuration management, requirements traceability, self-inspections, and managing devia-
tions. Compliance is fundamentally flawed without them, and so they are discussed here.
TRAINING
All personnel (permanent staff, contractors, consultants, and temporary staff) developing,
supporting, or using a GxP computer system must be trained so that they acquire the necessary
level of competency before they may be allowed to perform their designated duties. To this
end, all personnel involved in any aspect of compliance should have (1)
l A role description,
l Appropriate qualifications that have been documented, and
l Plans and records for training, both prospective and retrospective.
Qualifications
When recruiting, pharmaceutical and healthcare companies should try to verify the details of
the education, training, and experience claimed by the candidates. Copies of their certificates
should be requested and retained. Personal references should also be taken up, although their
value should be weighed with care, remembering that the commendations given can be
presented in a politically correct fashion that carries a hidden, subliminal, and rather less
favorable implication! For example, consider the following embarrassingly flattering accolade
You write to ask me for my opinion of XXXX, who has applied for a position in
your department. I cannot recommend him too highly, nor say enough good things
about him. The validation he conducts is the sort of work you don’t expect to see
nowadays. His documentation clearly demonstrates his complete capabilities. His
understanding and appreciation of regulatory requirements will surprise you. You
will indeed be fortunate if you can get him to work for you.
Curricula vitae (CVs) for permanent staff are usually kept by the Human Resources
department. This is not necessarily the case for contractors, consultants, and temporary staff.
Their CVs, typically retained by the responsible manager, can be easily lost when individuals
move on to new contracts. One way to systematically capture such training records for
contractors, consultants, and temporary staff is to attach them as appendixes to validation
plans or validation reports.
The profile suggested for a computer compliance practitioner is given in Ref. 2 and
comprises
Supporting Processes 33
Compliance practitioners must have a measure of tenacity and self-discipline so that they
stay the course, progressing work through to completion without constant supervision. This is
not to say, however, that they should be discouraged from seeking advice but rather that they
should have sufficient judgment and regulatory knowledge to make some basic decisions
themselves. Practitioners should be flexible in their approach, so that when the inevitable
problems arise, they do not instinctively resist exploring new solutions.
Managers are likely to be qualified by experience, perhaps supplemented by training.
Personal attributes, and especially attitudes, are of crucial importance, but there is insufficient
space to develop this theme here. Educational attainment alone does not ensure that a manager
has the competencies required to manage effectively.
No written procedures describing training given to those who use the computer system
(FDA 483, 2004).
No records to document that the information technology (IT) service provider staff
personnel have received training that includes current good manufacturing practice
regulations and written procedures referred to by the regulations (FDA 483, 2000).
No documentation to indicate that users are trained in the software and its applications
(FDA Warning Letter, June 2000).
No documentation that a qualified person reviewed the training records (FDA Warning
Letter, 2000).
No assurance that adequate training was given on how to use the (computer) system
software (FDA 483, 2002).
Corrective action to noncompliance with SOPs consists of retraining in the same manner
as initially trained. There is no limit to the frequency of retraining (FDA 483, 2000).
There is no evidence that the training provided during 2000 and 2001 to your analysts is
adequate as evidenced in the following events. The efficiency and adequacy of the
training program are questionable in that numerous training sessions are performed
during the same day (a specific list of eight training sessions a particular employee
received on the same day was then made) (FDA 483, 2002).
The current training procedure for employees does not determine the proficiency or
comprehension at the end of training. Your response to this letter should include
(your) plan for establishing a system of training and evaluation to ensure that
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
34 Chapter 3
personnel have the capabilities commensurate with their assigned function (FDA
Warning Letter, 2000).
DOCUMENT MANAGEMENT
Documentation of research, development, and manufacturing practice is vital to pharmaceu-
tical and healthcare companies because unless they do this, they have no way of demonstrating
compliance to the various GxP regulatory authorities. Examples of documents include policies,
procedures, plans, reports, and operational data. Regulatory inspectors will expect to see
document management procedures established covering preparation, review, approval, issue,
change, withdrawal, and storage. This is especially important for contractual documents and
documents endorsed by the pharmaceutical or healthcare company’s QA organization.
Document Preparation
Documentation standards should be defined so that there is consistent document layout, style,
and reference numbering. Documents should be clearly marked as draft until they are formally
released. Version control should be apparent. The version identifiers should distinguish
documents under development (drafts) from those that have been issued formally. Documents
should include a document history section to log the changes made in successive issued
versions of the document.
Individual documents should have the following controls:
l Document title
l Document number
l Version number
l Page x of y
l Date of issue
l Copy number
Some organizations include a date for the next routine review of the document. This
ensures that even if no changes have occurred, the document will still be examined to verify
that it is still relevant and accurate.
Documentation has progressed enormously from the days when word processing
represented the apex of efficiency and automation in this arena. Special considerations for
more sophisticated document types are given in Table 3.1. In some instances, it is
recommended that the document type should be stored with or within the document to
make ongoing document maintenance easier. This also applies to some types of embedded
documents.
Document Review
Documentation should be subject to review prior to its formal release. Such a review might
assume a number of forms ranging from the evaluation of the document and collection of
comments through to its inspection within formally convened review meetings. The reviewers
should be identified in advance within the validation plan, the project and quality plan, or the
document management procedures. Many firms give staff guidance on how to decide the most
appropriate reviewers for different documents.
The review can be recorded using a template or by simply recording meeting minutes in
the traditional manner. In either case, the date of the review and the names of the reviewers
should be noted. It is recommended that a multidisciplinary team that includes technical and
quality representatives review documents. Each reviewer, however, does not necessarily have
to be an authorizing signatory for the document under inspection as long as his or her
comments are included in the review records.
For the review process to be effective, reviewers must come prepared. Copies of the
documents under review should be distributed and scrutinized prior to the meeting. A
chairperson for the review meeting should be nominated beforehand. Similarly, remote
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
Supporting Processes 35
Document Examples of
type Characteristics application area Special precautions
ASCII text The simplest document type Memos, master production Specify file format,
document to manage. Typically and control records, application, version,
created in a word SOPs, deviation reports, and language.
processor, it consists of validation protocols,
only characters belonging batch documentation, etc.
to the ASCII or ANSI sets
(text and symbols). Such
documents can be viewed
by the originating word
processor or by file viewer
programs commonly
available in most
computer systems.
Portable A homogeneous document All sorts of documents Documents must be
format type created from many including more complex stored in “neutral” file
document other types of document ones such as integrated format. Specify file
but stored in a standard batch documentation, format, application,
or proprietary file format. illustrated SOPs and version. Special
The international printer drivers may be
standard is SGML. necessary.
Proprietary formats
include Adobe’s PDF
format. A semiportable
format is HTML, which is
used on the Internet. Files
cannot be edited without
special editing software.
Graphical A homogeneous document CAD drawings, SOP Specify file format,
document type stored in a standard illustrations, scanned application, version,
graphical file format. paper documents, label and language.
Includes scanned paper pictures for batch
documents. Many file documentation
formats exist, from bit-
mapped pictures (e.g.,
TIFF, PCX, GIF, JPEG)
to highly complex
vectored drawings in a
CAD environment (e.g.,
CGM, DXF). Many
proprietary formats exist.
Some CAD formats
include product database
information.
reviews will require the appointment of an individual to coordinate and collate the review
feedback.
The review must systematically cover each section of the document. If a section attracts
no comments, this should be indicated in the records. Any corrective actions identified in the
review must be assigned to a named individual with a completion date. The progress of
individual actions should be tracked through to closure. Care must be taken to ensure that
associated documents are also reviewed and updated as necessary.
Sometimes in the absence of any consensus, a compromise on the content of a document
will have to be reached. Such compromise positions should be agreed before approval is
sought to avoid delaying the approval process. Normally, the document author has the
responsibility for resolving these issues. Often this is not simple, especially when reviewers
have entrenched and opposing views! An escalation route to resolve any impasse should
therefore also be defined and agreed beforehand.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
36 Chapter 3
Speakers at conferences have expressed the opinion that in their experience, 80% of
review comments might relate only to format and style. In spite of this, over 80% of the
problems arising from poor documentation could be attributed to omissions and accuracy!
Something is wrong here. Reviewers need to bear these statistics in mind and strive to make
their reviews as effective as possible in identifying the defects in documents, defects that will
cost time and money later on.
Once the agreed changes have been incorporated into the document, it is ready for
approval. The document history should be created to record the changes made. There is no
need for the document history to affirm what remained the same. Document histories are
usually written in the form of a summary at the beginning or end of a document.
Review records should not be destroyed, at least until the document is approved and
formally issued. Many projects have a policy of retaining all document review minutes and
records until computer system is handed over and commissioned into use. Even then the
project files containing the review records may be retained for a few years, just in case some
question or defect arises in the future.
Document Approval
Just like the reviewers, document approvers should be identified in advance within the
validation plan, the project and quality plan, or the document management procedures. Again,
many firms guide staff on the most appropriate choices of personnel for the sensitive and
important task of document approval.
The number of signatures on individual documents should be monitored. There are
usually four principal signature roles (all not required for each document).
There is no reason why one individual cannot fulfill more than one role provided he or
she has appropriate competencies. There is one prohibition, however; no single individual
should represent both quality and technical roles. The minimum requirement is for two
signatories, representing quality and technical roles, respectively.
Documents with up to 10 signatures are common where the number of signatories is not
controlled. During a survey at one European pharmaceutical company, a document was found
bearing no less than 18 signatures! Was this really necessary? Indeed, too many signatories will
retard the release of documentation, while some practitioners have argued that many
signatures leads to less effective document scrutiny rather than more. It is not hard to see
why—human nature being what it is. The temptation to believe that the effort of an effective
review is pointless as so many others have already endorsed it becomes almost irresistible
(a phenomenon also known as the rubber stamp effect)! Furthermore, what personal price will
be exacted for questioning the combined wisdom of so many colleagues? There is thus some
truth in the cynic’s maxim that the quality of a document is inversely proportional to the
number of approval signatures.
The rationale for the presence of each approval signature should be unambiguous and
documented—signatories should know why they are signing the document! Example approval
signatures include technical authority, QA compliance, and user acceptance. Regulatory
authorities normally require key compliance documents to have formal signatures from two or
more authorized persons. Signatures should be written in black or blue ink as the pigments
and dyes in them render the signatures more resistant to fading. Approval signatures should
be dated and accompanied by the name of the person signing, as the identities of some
signatures are indecipherable (a weakness normally associated with the medical profession
and its prescriptions but also all too evident during regulatory compliance activities).
Interestingly, in some countries such as Japan, it is legally admissible to use as a signature a
mark or stamp that does not identify the person’s spelled name.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
Supporting Processes 37
Document Issue
Document Distribution
Approved documents should be made available in accordance with defined distribution
procedures. Many organizations use document management systems including intranet that
allow users to download copies of master documents. Such copies may be used for GxP
purposes provided users check that they are using the correct version of the document (i.e.,
verify current version number) before using the copy. It may be necessary for pharmaceutical
and healthcare companies to establish confidentiality agreements with suppliers who receive
copies of their documents as well as ensure that suitable security access controls are in place so
that only authorized persons can access documentation.
Some organizations define and record an “effective date” and “expiry date” on
documents. The effective date is usually defined to allow a period for dependent activities, for
instance, the distribution and training implied in the associated SOPs. The expiry dates of
different document types should take account of their change frequency. SOPs might have an
expiry date equivalent to their next planned periodic review. Master documents that have
passed their expiry date must be clearly marked as superseded. Where effective and expiry dates
are deployed, they should be prominently displayed on the document’s frontispiece.
Document Changes
All changes to released approved documents must be subject to change control. The revised
document should be clearly marked as a draft and managed accordingly, as described above.
Modifications to approved documents should be reviewed and approved by the same
functions/organizations that performed the original review and approval unless specifically
designated otherwise. Despite changes in individual signatories, there should be a consistent
allocation of responsible review and approval roles.
Document Withdrawal
From time to time, documents must be withdrawn from use, having perhaps come to the end
of their useful life or being superseded. Some firms send an e-mail to relevant portions of their
organization notifying them of withdrawn documents. Document keepers can be asked either
to notify the central distribution group that they have destroyed their copies of withdrawn
documents or to return specially printed copies to the central distribution group for disposal.
Safeguards should be instituted to prevent the retention and use of superseded or withdrawn
documents. Many firms use audits to this purpose.
l Approval signatories,
l Document history,
l Change control records,
l Document distribution records where applicable,
l Superseded versions, clearly marked as such, and
l Withdrawn documents, clearly marked as such.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
38 Chapter 3
Stored documents should be protected against accidental and malicious damage. They
must be retrievable in a legible format throughout their predefined retention period. This
usually means that a minimum of two copies are retained, each in a separate place, just in case
of accidents. Once the retention period has expired, a decision can be taken whether or not to
destroy the master copies. A record of destruction, evidence that the document once existed
but has since been destroyed, should be made and retained for a further period.
A document index should be maintained to log documentation by reference/title,
version, and physical storage location. As the status of a document changes, the document
index needs to be updated.
Quality of Documentation
The quality of documentation must be assured. Poor documentation is often marred by
rambling, unfocussed, and verbose text, with omissions in some areas and excessive detail in
others (Appendix 3.A). This impedes its use as well as undermines the goal of achieving GMP
compliance. Those preparing documentation and records should therefore ensure that
documents meet the six virtuous Cs, that is,
l Concise,
l Complete,
l Consistent,
l Comprehensible,
l Correct, and
l Controlled.
Wherever possible, keep documents short (preferably fewer than twenty pages) and
avoid the duplication of information.
Basic regulatory expectations include
l Mistakes being altered correctly: single strike, initialed and dated, with a brief reason
for the correction (or a reference to a change control number if appropriate),
l Avoiding use of dittos or arrows, as FDA consider them insufficiently descriptive
where actual values with corresponding signatures are needed,
l Avoiding transcriptions even if the original document/record looks messy, and
l Ensuring that white opaque correction fluid is never used, as it hides the original
information.
Regulatory authorities will search documentation for certain vague words that, in their
experience, are often associated with imprecise documentation.
A simple word search can be used on word processors when a document is being written
to identify the use of these words, which should then either be replaced with alternative
phrases or be clarified to alleviate the uncertainty.
QA has failed to ensure that all appropriate computer validation documents are
identified and controlled (FDA 483, 2004).
Lack of appropriate documentation procedures (FDA Warning Letter, 2001).
Lack of procedures to ensure that records are included with validation documentation,
maintained, and updated when changes are made (FDA Warning Letter, 2001).
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
Supporting Processes 39
SOPs do not clearly describe who must approve documents or what each type of
approval represents (FDA 483, 2002).
Significant deficiencies regarding documentation controls were reported. Documents
were not dated, lacked a documentation control number, were missing, or were
reported in pencil on uncontrolled pages, or dates were crossed out without initials,
dates, or explanation (FDA Warning Letter, 2001).
Errors on batch production, control, and laboratory records must not be erased or
overwritten (interpret as no whiteout). A line must be drawn through an incorrect
entry and the corrected figure or word written neatly and initialed. Significant data
must not be discarded without explanation. To discard significant data, the data must
be crossed out and initialed, and a valid reason for discarding the data must be
explained (FDA Warning Letter, 2001).
Numerous instances of lack of control of official controlled documents were observed:
use of incorrect version of testing forms, incorrect data sheet used because old sheets
are not replaced with new, incorrect log sheets were used (FDA 483, 2002).
Several pages were missing in printouts (FDA Warning Letter, 2000).
Two pages of a laboratory notebook were written in pencil and erased. Your abbreviation
for . . . could be read on one of the erased pages (FDA Warning Letter, 2000).
Values in at least two laboratory records were altered. Altered values were written under
computer-generated values . . . . and used in potency calculations. Review of the
electronic data confirmed the incorrect values, which were part of your submission to
the drug master file (FDA Warning Letter, 2000).
CHANGE CONTROL
The following maxims of change are based on work by Lehman and Belady (2).
These maxims should raise awareness of the need for effective change management.
Quality and compliance has to be preserved.
All changes to regulated computerized systems must be reviewed, authorized,
documented, tested (if applicable), and approved before implementation. Software cannot
be partially verified. When a change (even a small change) is made to a software program, the
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
40 Chapter 3
compliance status of the entire software system should be reconsidered, not just the individual
change (3). Retrospective validation and reverse engineering of existing software are very
difficult but may be necessary to properly document and verify changes.
The procedure for change control can be divided into four phases (Fig. 3.1).
l Requester name
l Origination date
l Identification of component or software module to be changed
l Description of the change
l Reason for the change
Unique reference number is to be assigned by the system owner or his delegate using a
logging mechanism.
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
Supporting Processes 41
42 Chapter 3
The quality unit failed to put in place procedures to ensure that design documentation is
updated when program code changes are made (FDA 483, 2007).
Changes were made to macro in process control software but change control process was
not used, instructions on how to use the software were not modified, and changes
were not validated (FDA 483, 2006).
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
Supporting Processes 43
Firms change control procedure does not include software changes (FDA 483, 2003).
There was no evaluation of impact of software changes on other parts of the program
(FDA 483, 2003).
There is no system in place to ensure that parameter adjustments, which are executed in
the during production runs, are made by authorized personnel (FDA Warning Letter,
2002).
Changes to in-house written templates used in QC laboratory computer system not
controlled (FDA 483, 2003).
Failure to establish test plan/protocol for approved hardware changes (FDA 483, 2001).
Change control records were found signed off by the quality unit that had not been
properly annotated in the code (FDA 483, 2001).
The firm failed to document review and approval of test records supporting program
modification (FDA 483, 2001).
In managing change, personnel will receive their appropriate XXXX via an e-mail that
has been sent from an e-mail distribution list. The firm has failed to implement
controls to document that these distribution lists are maintained updated with the
current approved listing of users (FDA 483, 2001).
Software “bug” that could result in erroneous release not scheduled for correction (FDA
483, 2002).
Computer program change requested to prevent shipping error has not been addressed
(FDA 483, 2003).
The vendor edited the software and configuration, but there is no documentation of the
vendor’s evaluation (of the problem), description of root cause, or recommendation for
correction (FDA 483, 2009).
Computer enhancement was identified as needed to correct labeling deviation but not
implemented over one year later (FDA 483, 2002).
No record of review of software fix and correction of incorrect electronic records (FDA
483, 2002).
Documentation regarding system and software changes not fully available (FDA 483, 2004).
CONFIGURATION MANAGEMENT
Configuration management refers to the overall task of managing the use of varying versions
of the various components (hardware, software, and documentation) that comprise a complex
computer system. Both ISO 90003 and GAMP15 promote configuration management as a
recommended and necessary discipline. The level of formality needed is greater for an
operating system compared with, say, a system in its early development, but the principles are
the same. The use of configuration management tools can considerably ease the effort required
here, especially in the case of larger systems where the level of complexity grows
exponentially, rather than in a linear fashion.
Configuration management consists of the following activities:
Configuration Identification
Configuration management begins with the system assembly. The task here is to identify and
document the build configuration by ensuring that the mix of software, hardware, and
[Shaji][7x10 Tight][D:/informa_Publishing/WINGATE_2400029/z_production/z_3B2_3D_files/
978-1-4398-1879-4_CH0003_O.3d] [25/1/010/10:10:28] [32–54]
44 Chapter 3
Configuration Control
All documents, hardware units, and software programs must be uniquely identified. It is not
necessary to violate warranty seals to uniquely identify subcomponents. However, in
situations where hardware units and software programs do not have a unique identification,
physical labels and software header information can be added retrospectively. Unique
identification should include the model number for hardware and the version number for
software (e.g., MS Vista Service Pack 2). Current approved versions of source codes must
correspond to current approved versions of software documents, object code, and test suites.
All source codes should have associated documentation.
Configuration Evaluation
A disciplined approach must be sustained to maintain the integrity of configuration
management. It can be tempting to relax configuration management just to release resources
and reduce costs. Consequential problems that often arise include
Supporting Processes 45
The firm has failed to adequately control software configuration (FDA 483, 2003).
System configuration documentations were found to be obsolete (FDA 483, 2004).
The firm has failed to establish an overall revision control system for the program
throughout its software life cycle (FDA 483, 2001).
The computer system is not validated in that . . . configuration management. The firm
failed to document all sites, departments, or connections on the network ... The firm
has failed to document external program interfaces . . . The firm has failed to define or
describe the various used for the development, test, and production environments
(FDA 483, 2001).
Networked system can only support four interfaced systems but had up to five systems
attached. There was no validation showing this configuration to be acceptable (FDA
483, 2000).
The vendor edited the software configuration, but there is no documentation of the
vendor’s evaluation (of the problem), description of root cause, or recommendation for
correction (FDA 483, 2009).
REQUIREMENTS TRACEABILITY
Traceability is a fundamental in terms of demonstrating regulatory compliance. In ISO
terminology, traceability demonstrates that design input is linked to design output and has
been verified. For example, does the functional specification fulfill the user requirements
specification?
Principles
Benefits of Traceability
Establishing a robust means of traceability brings many benefits. During the project
development, it can be used as a means to