Risk Assessment For Computer System Validation
Risk Assessment For Computer System Validation
‘Computerized system’
consists of :
Hardware
Software
Network components
Controlled functions
Related Documentation
COMPUTER SYSTEM VALIDATION –
REQUIREMENTS
Critical thinking , planning and Assessment is required for this journey …..
What is the business process / workflow ?
What is the intended use of this System ?
For what purpose shall it be used ?
What decisions shall be taken on the Data ?
What are the anticipated RISKS in the entire Life cycle of the validated
system ?
RISKS must be assessed throughout the entire Life Cycle of the Computer system
and compared to the respective Business requirements for the entire Data life cycle
USER
REQUIREMENTS TECHNICAL
CONTROLS
REGULATORY BEHAVIORAL
REQUIREMENTS CONTROLS
The QUALITY UNIT has a key role in successfully planning & managing the
compliance and fitness for intended use of computerized systems . The role and
activities need to be independent in nature and are mainly concerned to –
Approval or audit of key documentation e.g. Policies, Procedures, Acceptance criteria,
Plans, Reports etc.
Focus on Critical Quality aspects
Involvement of SMEs (Subject matter experts)
Approval of changes that potentially affect patient safety, product quality, or data integrity
Audit processes and supporting documentary evidence to verify that compliance activities
are effective
SOP AND RESPONSIBILITIES
Each Corporate unit is responsible for establishing a policy on COMPUTER SYSTEMS VALIDATION requirements
Site or departments are responsible for:
Computer system validation Standard Operating Procedures (SOPs)
System inventory and assessment
System specific validation protocols
System specific validation documentation
SOPs must:
• Comply with the Computer Systems Validation Policy and VMP as applicable
• Be approved by the appropriate management for that site or department
WHY VALIDATION IS REQUIRED ?
Reduces Risk and legal liability
Ensures GMP compliance requirements
Ensures adherence to the current requirements of Software validation and compliances
Validation is applied to many aspects of the healthcare and other regulated industries and
businesses. Examples include:
o Services
o Equipment
o Computer Systems
o Processes
To produce documented evidence, that provides a high degree of assurance that all parts of
the system will consistently work correctly when in use
Computer systems validation includes validation of both new and existing
computer systems
WHY DO WE VALIDATE COMPUTER SYSTEMS ?
Key Objectives -
Patient safety
Product quality
Data integrity
WHICH SYSTEMS SHOULD BE VALIDATED ?
REVIEW, APPROVAL
& CCR CLOSURE
CSV – TESTING DOCUMENTATION
CSV – COMPLIANCE PATHWAY
QA SYSTEMS
EQUIPMENT /
ANALYTICAL CONTROL
VALIDATION &
CALIBRATION
RISK
ASSESSMENT
VENDOR
MANAGEMENT
CSV – RISK BASED APPROACH
The risk based approach for Computer System validation has been
promoted by all major Regulators –
US FDA has been promoting the Risk based approach since 2002
GAMP 5 laid out a practical approach to using Risk for Computerized system
validation
EU & PIC/S GMP Annx.11 recommends that Risk management be applied throughout
the lifecycle of the computerized system
QUALITY RISK MANAGEMENT - CSV
Quality Risk Management is a systematic process for the ASSESSMENT,
CONTROL, COMMUNICATION & REVIEW OF RISKS.
Application of Quality Risk Management enables effort to be focused on
critical aspects of a Computerized system, in a controlled and justified
manner.
Quality Risk Management should be based on clear process
understanding and potential impact on patient safety, product quality,
and Data integrity.
Qualitative or quantitative techniques may be used to identify and
manage risks. Controls are developed to reduce risks to an acceptable
level.
Implemented controls are monitored during operation to ensure
ongoing effectiveness.
UNDERSTANDING DATA LIFE CYCLE & RISKS
RISK
RISK :: Multiple
Multiple
CREATION readings
readings / best
/ best chosen
chosen
RISK
RISK :: Data
Data not
not DESTRUCTION PROCESSING RISK
RISK :: Processing
Processing into
into
preserved & secured
preserved & secured compliance
compliance
RISK to Data integrity, Product Quality & Patient safety Varies throughout the
System Life cycle
CSV : CONVENTIONAL & CRITICAL EVALUATION
System requirement : Users in the QC Laboratory shall not be able to delete
the acquired Analytical data .
Can a User Delete without User privileges ?? Can a User login with a role that is not assigned ??
=> Verify Privileges => Verify login roles
If Data is Deleted , there is a record of it ?? Can a User be assigned for Deletion rights ??
=> Verify Audit trail => Verify User Access grant /change procedure & authorizations
INPUT OUTPUT
USER Identify impacted Functions
REQUIREMENTS
GxP / Non GxP
GxP
REGULATIONS MAJOR RISKS
Perform Functional Risk Assessment CONSIDERED
Identify Controls
INITIAL
ASSESSMENT OVERALL RISK
ASSESSMENT
Implement Controls Verify
INPUT OUTPUT
SPECIFICATION Identify impacted Functions
SYSTEM
ARCHITECTURE LIST OF
Perform Functional Risk Assessment FUNCTION FOR
COMPONENT Identify Controls
CATEGORIZATION FURTHER
EVALUATION
Implement Controls Verify
INPUT OUTPUT
FUNCTIONS FROM
STEP 2 Identify impacted Functions
RISK
SME EVALUATION CATEGORIZATION
CASE (Low, Medium &
Perform Functional Risk Assessment High)
SCENARIOS Identify Controls
ASSESSMENT &
HAZARDS MITIGATION FOR
HIGH RISKS
Implement Controls Verify
The electronic records must not be altered, browsed, queried, or reported by external software applications
In addition to the logical security built into the system, physical security must be provided to ensure that access to
computer systems and, to electronic records is prevented for unauthorized personnel.
Organizations shall store regulated electronic data in its electronic form, rather than keeping paper based printouts
of the data on file
If information is not recorded on durable media, it cannot be retrieved for future use.
Protection of records , Access controls , Authentication , Audit trail controls , Computer systems time Controls , Authority checks
, Technical controls to open systems , Signature/record linking , Uniqueness of electronic signatures , Electronic Signature
security etc.
E VA LU ATI O N O F LEG A C Y SY ST EM S – PA RT 11 C O M P LI A N C E
The objective of the evaluation is to identify the system’s functional and/or procedural gaps;
Results of the evaluation will determine whether the operational, maintenance, or security procedures shall provide a controlled
environment, that ensures the integrity of the electronic records and/or signatures as stated in the Part 11 requirements.
An evaluation plan is needed in order to define the nature, extent, schedule, and responsibilities
Each system performing a regulated operation must be identified and the operation it performs must be well understood in order to
prioritize the work
Evaluation shall indicate the priority rating that applicable for each system in the Criticality and Complexity Assessment.
Other factors for prioritization process are –
Based on the Assessment further Remedial and
Corrective actions need to be executed through–
Interpretation
Training
Remediation execution
New applications assessments
Application upgrade assessments
Supplier qualification program
GAMP
• GAMP® 5: A Risk-Based Approach to Compliant GxP Computerized Systems provides pragmatic and practical industry guidance that
aims to achieve compliant computerized systems that are fit for intended use in an efficient and effective manner, while also
• The guide provides a framework for the risk-based approach to computer system validation where a system is evaluated and
• Categorizing the system helps guide the writing of system documentation (including specifications and test scripts and everything in
between).
• GAMP 5 was developed by the ISPE GAMP Community of Practice (CoP), a worldwide group of practitioners and SMEs , with
Key concepts ;
Product & Process understanding
Life cycle approach within a
Quality Management System
Scalable Life cycle Activities
Science based Quality Risk
Management
Leveraging Supplier Involvement
G A M P 5 - C O M P U T E R S Y S T E M C O N F I G U R AT I O N
3 Standard Applications
3C Non – configured Products Raw Water generation system (View the reading , select the
recipe & Print / No data storage is available )
Autoclave , Lyophilzer , BMS etc. (View the reading , select the
3D recipe & Print / Data storage is available )
FTIR , UV Spectrometer , HPLC etc. (View the reading , select
3E the recipe & Print / Data storage & processing is available )
Configured Software LIMS , SCADA , SAP etc. (View the reading , select the recipe &
4 Print / Data storage , processing & configuration is available )
CATEGORY 3A YES Not Applicable Not Applicable Not Applicable Not Applicable