Software Validation in Accredited Laboratories

Slides:



Advertisements
Similar presentations
1 COMPUTER GENERATED & STORED RECORDS CONTROLS Presented by COSCAP-SA.
Advertisements

Configuration Management
PRINCIPLES OF A CALIBRATION MANAGEMENT SYSTEM
Software Quality Assurance Plan
Document Control DAP Quality Conference May 12, 2008 Debbie Penn.
Audit of IT Systems SARQA / DKG Scandinavian Conference, October 2002, Copenhagen Sue Gregory.
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Laboratory Personnel Dr/Ehsan Moahmen Rizk.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
QMS Documentation Click the mouse to advance slides and animations in this slide show…
OHT 3.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 The need for comprehensive software quality requirements Classification.
Factors to be taken into account when designing ICT Security Policies
Transmille Training Quality System.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley The Impact of Information Technology on the Audit.
D. Keane June Internal Quality Audits (4.14) -ISO Requirements for Internal Audits -The Audit Process -Templates for Meeting Requirements.
Technical requirements  Sampling  Analysis  Reporting of the results.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
5.2 Personnel Use competent staff Supervise as necessary
Instructions and forms
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Software Validation in Accredited Laboratories A Practical Guide Greg Gogates Fasor Inc. 26 Sept 2001 A copy of this paper will be maintained.
Chapter 22 Systems Design, Implementation, and Operation Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 22-1.
Configuration Management, Logistics, and Universal CM Issues Larry Bauer Boeing Commercial Airplanes NDIA Conference Miami March 4-5, 2005
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Module 13: Configuring Availability of Network Resources and Content.
Seattle Area Software Quality Assurance Group Release and Configuration Management, The Acceleration of Change and Its Contribution To Software Quality.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Dan Parish Program Manager Microsoft Session Code: OFC 304.
Chapter Fourteen Windows XP Professional Fault Tolerance.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
A Level ICT Unit Implementing CBIS’s. Support Installing a new system is disruptive and the support program will need to be planned well in advance.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Performing Software Installation with Group Policy BAI516.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Getting Started with REACH Delivery. Free to Receive messages and files Easy and completely free to install Comprehensive online help Free Support Forum.
Archival Workshop on Ingest, Identification, and Certification Standards Certification (Best Practices) Checklist Does the archive have a written plan.
Software quality factors
SAAMF Roadshow Durban CSIR NML Eddie Tarnow Metrologist: Torque & Automotive 14 June 2006 ISO/TS 16949:2002 certification – Meeting the requirements of.
Electronic Records and Signatures: Warning Letters and Observations including proposed solutions.
VALIDATIONS: TOWARDS RELAIBLE QUALITY OUTCOMES DR. SHIVPRAKASH MANAGING DIRECTOR SYNCHRON RESEARCH SERVICES PVT. LTD., INDIA.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Configuration Management- Basic Concepts. Agenda  Configuration Management process Overview  Process Stages  Planning & Setup  Control  Audit  Case.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
Chapter 7: Delivery, Installation, and Documentation Ronald J. Leach Copyright Ronald J. Leach, 1997, 2009, 2014,
HAMILTON VENUS Security Settings. Security Settings are set in the System Configuration Editor.
DOCUMENTATION ISO/IEC 17025:2005 Documentation.
Laboratory equipment Dr. W. Huisman Cairo, November 21th 2012.
FDA 21 CFR Part 11 Compliance
DOCUMENT AND DATA CONTROL
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
ISO/IEC
Integrated Consulting Solutions
Software Quality Assurance Software Quality Factor
Software Documentation
Release Management Release Management.
Managing the IT Function
The Certified Quality Process Handbook 2nd edition Ch. 1: pp
Operating Systems Networking for Home and Small Businesses – Chapter 2 – Introduction To Networking.
Chapter 11: Printers IT Essentials v6.0 Chapter 11: Printers
Radiopharmaceutical Production
Presentation transcript:

Software Validation in Accredited Laboratories A Practical Guide Greg Gogates Fasor Inc. gdg@fasor.com 26 Sept 2001 A copy of this paper will be maintained on ftp.fasor.com/pub/iso25/validation/

Preamble ISO guide 25 “Adequate for Use” ISO 17025 “Suitably Validated” Validation - Reasonable Assurance Maintain Design Control Know what's where! Keep it Simple EA/GA(98)95 Draft “EA Guidelines for the use of Computers and Computer Systems in Accredited Laboratories” 26 Sept 2001 NCSL Presentation

Software Classifications COTS - Commercial Off the Shelf MOTS - Modified Off the Shelf CUSTOM - Written from scratch 26 Sept 2001 NCSL Presentation

COTS Use as delivered No modifications/customizations Verify functionality Verify menu contents Verify parameter files Lock down changes Installation checkout 26 Sept 2001 NCSL Presentation

MOTS Needs configuration/customization prior to use. Customizations require validation. Non-modified portion treated as COTS Installation checkout. 26 Sept 2001 NCSL Presentation

CUSTOM Home Brew or Consultant code Functional Requirements Software Design Traceability Matrix Structural / Functional Tests Installation Checkout 26 Sept 2001 NCSL Presentation

Software Life Cycle 26 Sept 2001 NCSL Presentation

Products / Systems 26 Sept 2001 NCSL Presentation

Software Configuration Management What software is on what machine Store originals on Network Share, Tape, or CD-R Maintain all published versions Control Access Ensure user access 26 Sept 2001 NCSL Presentation

Documentation Configuration Management Evidence of validation Evidence of adequate for use Owners / User manuals Software Lifecycle documents Test Evidence 26 Sept 2001 NCSL Presentation

Good Practices - 1 Treat each software product a piece of calibration equipment. Do checks to ensure nothing changes. Place software product masters in a read only directory. Network computers that access a shared program on a server. 26 Sept 2001 NCSL Presentation

Good Practices - 2 Lock spreadsheet cells that contain math. Password protect configuration files or setup screens. Backup, back-up, and backup off site! Plan for hardware/software disaster recovery. Good information maintained @ ftp://ftp.fasor.com/pub/iso25/validation 26 Sept 2001 NCSL Presentation

Software Checklist - 1 Has the Firmware been validated via the calibration by a cal lab who has the capability to thoroughly check the software (i.e. OEM or Authorized partner) (Note: for non-calibratable device Firmware, treat as Software) Have all of the "used" firmware parameters been documented and confirmed that they are correct? Does a Software Requirements document exist for the Software? Does a Software Design document exist detailing either the full design or details of the configuration? Does software testing documents exists describing completed, unique, test cases that exercise the design both +/- and confirms the requirements? Is there a test log showing test failures and corresponding retests/dispositions? Does evidence exist confirming correct software deployment at each target installation? [5.5.11] 26 Sept 2001 NCSL Presentation

Software Checklist - 2 Has configuration control been applied to all of their Software/Firmware to ensure that: [4.12.1.4] The Software source code location is access controlled. [5.4.7.2.b] Firmware/Software formulas & parameters are "locked" to prevent inadvertent changes. [5.5.12] Equipment lists identify Software as a separate line item showing correct version and location. [5.5.5] Does evidence exist showing that personnel involved in Custom Software development have adequate training? Do Databases and spreadsheets include "audit trails" to not allow previously data to be obscured? [4.12.2.3] Do adequate instructions exist for the operation & maintenance of the Software? [5.4.1] Does the accuracy of the Firmware/Software meet or exceed the accuracy required by the test method? [5.5.2] 26 Sept 2001 NCSL Presentation

S U M A R Y 26 Sept 2001 NCSL Presentation

QUESTIONS? 26 Sept 2001 NCSL Presentation http://www.sfgate.com/sf/zippy/ 26 Sept 2001 NCSL Presentation