Requirements for Computer Systems in the clinical practice

Slides:



Advertisements
Similar presentations
How to Validate a Vendor Purchased Application
Advertisements

Re-use of PSI Data Protection Issues Cécile de Terwangne Professor at the Law Faculty, Research Director at CRIDS University of Namur (Belgium) 2 nd LAPSI.
Public Sector Information & Data Protection: A plea for personal privacy settings for the re-use of PSI Bart van der Sloot Institute for Information Law.
PRIVACY ASPECTS OF RE-USE OF PSI: BETWEEN PRIVATE AND PUBLIC SECTOR
1 Enforcement Powers of National Data Protection Authorities and Experience gained of the Data Protection Directive Safe Harbour Conference Washington.
Identifying Data Protection Issues Developing Lifelong Learner Record Systems and ePortfolios in FE and HE: Planning for, and Coping with, Legal Issues.
Legal & Regulatory Compliance. Overview What types of information should be included? What issues or problems might there be? What benefits could be obtained?
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi David Cauchi Office of the Commissioner for Data Protection.
The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
2009 Data Protection Seminar
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
The New GMP Annex 11 and Chapter 4 Deadline for coming into operation: 30 June 2011.
Introduction to basic principles of Regulation (EC) 45/2001 Sophie Louveaux María Verónica Pérez Asinari.
Clinical QA Data Audits A GCP Point of View Linda Del Paggio GCP Compliance BioBridges, LLC.
The Data Protection (Jersey) Law 2005.
Audit of IT Systems SARQA / DKG Scandinavian Conference, October 2002, Copenhagen Sue Gregory.
GMP Document and Record Retention
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
DATA PROTECTION and Research University Research Ethics Committee – David Cauchi Office of the Data Protection Commissioner.
The European Union legal framework for clinical data access: The European Union legal framework for clinical data access: potential challenges and opportunities.
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Instructions and forms
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
National Smartcard Project Work Package 8 – Security Issues Report.
Project co-financed by European Union Project co- financed by Asean European Committee for Standardization Implementing Agency1 GMP Workshop Kuala Lumpur.
MethodGXP The Solution for the Confusion.
FDA Docket No. 2004N-0133 Themes for Renewal of 21 CFR Part 11 Rule & Guidance by Dr. Teri Stokes, GXP International
The Data Protection Act 1998 The Eight Principles.
Product Development Chapter 6. Definitions needed: Verification: The process of evaluating compliance to regulations, standards, or specifications.
Data Protection Act AS Module Heathcote Ch. 12.
Massella Ducci Teri Italian approach to long-term digital preservation Policies for Digital Preservation ERPANET Training Seminar.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
Insufficient personal data protection Personal Data protection Act.
Author(s): David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
Part 11, Electronic Records; Electronic Signatures
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Part 11 Public Meeting PEERS Questions & Responses The opinions expressed here belong to PEERS members and not the corporate entities with which they are.
The world leader in serving science OMNIC DS & Thermo Security Administration 21 CFR Part 11 Tools for FT-IR and Raman Spectroscopy.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Protection of Personal Information Act An Analysis on the impact.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
Data Protection Laws in the European Union John Armstrong CMS Cameron McKenna.
21 CFR PART 11.
FDA 21 CFR Part 11 Compliance
Overview eSignature Features: Field Type vs Record Locking Regulations
Международные требования к использованию электронных систем в клинических исследованиях Timur Galimov, CTO.
Issues of personal data protection in scientific research
General Data Protection Regulation
GDPR Overview Gydeline – October 2017
Data Protection Legislation
GDPR Overview Gydeline – October 2017
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
State of the privacy union
G.D.P.R General Data Protection Regulations
בקרה תוך שימוש ב 21CFR Part 11 / אילן שעיה סמארט לוג'יק
Recording Clinical Data
FDA 21 CFR Part 11 Overview June 10, 2006.
GDPR Workshop MEU Symposium Prague 2018
Recording Clinical Data
Recording Clinical Data
Welcome IITA Inbound Insider Webinar: An Introduction to GDPR
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

Requirements for Computer Systems in the clinical practice Danilo Neri, PhD Pomezia, 13 Settembre 2005

Requirements for Computer Systems in the clinical practice Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario

Fundamental Requirements for clinical data Security Integrity Traceability Data shall be (regardless the format !) attributable legible contemporaneous (timeliness) original Accurate

Different implications for different environments CLOSED Records are fully under Responsibility of the Firm Traceability Security Integrity OPEN Traceability Security Integrity Responsibility of Records is shared with Third Parts

Requirements for Computer Systems in the clinical practice Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario

Evolution of Computer System in GCP: the old Scenario Case History Paper CRF Clinical DB (eCRF) w/o eSignature Data are registered in the paper Case History Data are reported in the CRF Paper Form Data are migrated in the Clinical DB (option: Electronic Signature)

Compliance Requriments for Computer Systems Source Data Verification Case History Paper CRF Clinical DB (eCRF) w/o eSignature Regulations ICH E6 for Computer Systems 21 CFR Part 11 Requirements (Closed System) Protection of Privacy (21 CFR Part 21, EU 95/46/EC)

ICH E6 Requirements for Computer Systems (1.2) 5.5.3.a Ensure and document that the electronic data processing system(s) conforms to the Sponsor’s established requirements for completeness, accuracy, reliability, and consistent intended performance (i.e. validation). International Conference on Harmonisation of Technical Requirements for Registration of Pharmaceuticals for Human Use - ICH Harmonised Tripartite Guideline – Guideline For Good Clinical Practice

ICH E6 Requirements for Computer Systems (2.2) Par. 5.8: Integrity of Data and Computer Software The credibility of the numerical results of the analysis depends on the quality and VALIDITY of the method and software used both for data management (data entry, storage, verification,correction and retrieval) and also for processing the data statistically. The computer software used for data management and statistical analysis should be reliable and documentation of appropriate software testing procedures should be available. International Conference on Harmonisation of Technical Requirements for Registration of Pharmaceuticals for Human Use – ICH Harmonised Tripartite Guideline – Guideline Guideline for statistical principle on Clinical trial

Code of Federal Regulations 21 CFR Part 11 Code of Federal Regulations 21 CFR Part 11; Eletronic Records; Electronic Signature August, 1997 RECORD LIFE CYCLE creation modifying maintenance archiving retrieving transmission Electronic Records Criteria set forth for Electronic Signature Electronic Record Electronic Signature Criteria set forth for EQUIVALENCE Paper Record Handwritten Signature

21 CFR Part 11 Requirements for Electronic Records Control for Closed Systems [ref. §11.10] - The use of closed systems to manage electronic records implies: (a) Validation of computer system (b) Accurate and complete copies of records (c) Protection of the data (d) Limiting access (e) Audit trails (f) Operational system checks (g) Authority checks (h) Control on validity of input actions (i) Adequate education and training (l) Control on documentation distribution and change control procedure application

What is Computer System Validation? CSV is the documented evidence, to a high degree of assurance, that a computer system performs its intended functions accurately and reliably. Documented evidence High degree of assurance intended functions accurately and reliably

ISO equivalent Requirements (The Quality is) The totality of characteristics of an entity that bear on its ability to satisfy stated and implied need. [ISO 8402: 1994] Note: In ISO/IEC 14598 the relevant entity is a software product An entity is a product, process, person, activity, machine, service, system, department, company, institution, or organization.

GAMP Validation Lifecycle Operational Qualification User Requirements Specification Process Risk Assessment Performance Qualification related to Function Risk Assessment Operational Qualification Functional Specification Configuration related to Design Specification Installation Qualification related to Testing System Build Design Review

Validation Deliverables User Requirements Specifications Decommissioning Plan/Report Audit Report De commissioning Functional Specifications SOPs Design Specifications Test Plan Installation Operational Performance Qualification Protocol & Reports Unit Testing System Acceptance Testing

Part 11 vs ICH E6 Requirements (1/2) Validation of Computer system 11.10.(a) 5.5.3.a Accurate and Complete Copies of Record 11.10.(b) 4.9.7 Data Protection 11.10.(c) 2.10; 4.9.1; 5.5.3.f Limiting Access 11.10.(d) § 2.11; 5.5.3.d Audit Trail 11.10.(e) 4.9.3; 5.5.3.c

Part 11 vs ICH E6 Requirements (2/2) Operational System check 11.10.(f) 2.6 4.9.1 Authority Check 11.10.(g) 2.11; 4.1.5; 4.9.3 5.5.3.e Device Check 11.10.(h) -- Training 11.10.(i) 2.8 System Documentation 11.10.(k) 5.5.3.b

Requirements for Computer Systems in the clinical practice Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario

Evolution of Computer System in GCP: the current Scenario Case History Network Clinical DB (eCRF) + eSignature Data are registered in the Case History Data are directly recorded in the Clinical DB through remote access and electronically signed

Compliance Requriments for Computer Systems Source Data Verification Case History Network Clinical DB (eCRF) + eSignature Regulations ICH E6 for Computer Systems 21 CFR Part 11 Requirements (Open System + eSig Reqs) Protection of Privacy (21 CFR Part 21, EU 95/46/EC)

21 CFR Part 11: Requirements for Open Systems Control for Open Systems [ref. §11.30] - The use of open systems to manage electronic records implies: Controls for Closed System (see previous slide); several requirements (I.e. Device Checks) might be enforced Document encryption Digital signatures standards

21 CFR Part 11: Requirements for Electronic Signatures [ref. §11.50; 11.70; 11.100] - The use of Electronic Signature (ES) for signing Electronic Records (ER) implies: Using ES when required by the predicate rule(s) ES manifestation ES / ER linking Procedure for managing attribution and use of ES

Fundamental requirement: Signature-Record Linking 21 CFR PART 11 Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means. Ref. §11.70. Preamble 15,53,107,108,109,110,11,112,113 Signed Record Signature IMMUTABLE BY ORDINARY MEANS

Requirements for Computer Systems in the clinical practice Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario Requirements for Computer Systems in GCP The old scenario The current scenario The next scenario

Evolution of Computer System in GCP: the near next Scenario Electronic Case History Network Clinical DB (eCRF) + eSignature Paper CRF Printed Case History Data are registered directly in the electronic Case History (ECH) Case History are printed based upon ECH Data are reported in paper CRF and then migrated to the clinical DB or directly entered in the Clinical DB

Current use of Computer System for Electronic History Case

Requirements for Computer Systems Regulations Regulations ICH E6 for Computer Systems 21 CFR Part 11 Requirements (Open System + eSig Reqs) Protection of Privacy (21 CFR Part 21, EU 95/46/EC) Ministry of Health Rules Quality ISO requirements Privacy related local laws (DL675/196, DL196/2003) Electronic Case History + eSignature Network Clinical DB (eCRF) + eSignature Paper CRF Printed Case History ? Source Data Verification

Requirements for Privacy Protection Legal “trigger” Directive 95/46/EC, 24 October 1995 Member States shall protect the fundamental rights and freedoms of natural persons, and in particular their right to privacy with respect to the processing of personal data

Processing of Personal Data Directive 95/46/EC, 24 October 1995 Any operation or set of operations which is performed upon personal data, whether or not by automatic means, such as: collection recording organization storage adaptation or alteration, retrieval Consultation use disclosure by transmission dissemination or otherwise making available alignment or combination blocking, erasure or destruction Directive 95/46/EC, 24 October 1995 Chapter I, Art. 2

Directive 95/46/EC: Application Field Processing of personal data wholly or partly by automatic means Processing of personal data which form part of a filing system or are intended to form part of a filing system Directive 95/46/EC, 24 October 1995 Chapter I, Art. 3

Directive 95/46/EC: Data Quality Controller has to ensure that data are: Processed fairly and lawfully Collected for specified, explicit and legitimate purposes Adequate, relevant and not excessive in relation to the purposes Accurate and, where necessary, kept up to date Kept in a form which permits identification of data subjects for no longer than is necessary Directive 95/46/EC, 24 October 1995 Chapter II, Art. 6

Directive 95/46/EC: Data Subject’s Rights Information Access to Data Right to object

Directive 95/46/EC: Data Subject’s Information Data subject has to know: Identity of the Controller (or Representative) Purpose of the Data Processing Recipient of the Data Own rights Directive 95/46/EC, 24 October 1995 Chapter II, Art. 10

Directive 95/46/EC: Data Subject’s Access to Data Data Subject has to obtain from the Controller: Information about subject’s personal data effective use, data undergoing process, logic involved in any automatic processing of data, own rights Erasure or blocking of data not compliant to 95/46/EC Notification about data disclosure to third parties Directive 95/46/EC, 24 October 1995 Chapter II, Art. 12

Confidentiality of Processing Directive 95/46/EC, 24 October 1995 “Any person acting under the authority of the controller or of the processor, including the processor himself, who has access to personal data must not process them except on instructions from the controller, unless he is required to do so by law.” “ Directive 95/46/EC, 24 October 1995 Chapter II, Art. 16

Security of Processing Directive 95/46/EC, 24 October 1995 Safely processing Protection against accidental or malicious loss alteration unauthorized disclosure or access Security measures implementation Directive 95/46/EC, 24 October 1995 Chapter II, Art. 17

Local Laws application Italian laws DL675/196, DL196/2003 include the statements of EU directive The Technical attachment B dedicated to Electronic data management. The law and the Technical attachment B address nearly the same requirements set forth by pharmaceutical regulations, such as 21 CFR Part 11

Requirements set forth by the Technical Attachment for data management (1.2) (2) Le credenziali di autenticazione consistono in un codice per l'identificazione dell'incaricato associato a una parola chiave riservata conosciuta solamente dal medesimo oppure in un dispositivo di autenticazione in possesso e uso esclusivo dell'incaricato, eventualmente associato a un codice identificativo o a una parola chiave, oppure in una caratteristica biometrica dell'incaricato, eventualmente associata a un codice identificativo o a una parola chiave. Security Management (5) La parola chiave, quando è prevista dal sistema di autenticazione, è composta da almeno otto caratteri oppure, nel caso in cui lo strumento elettronico non lo permetta, da un numero di caratteri pari al massimo consentito; essa non contiene riferimenti agevolmente riconducibili all'incaricato ed è modificata da quest'ultimo al primo utilizzo e, successivamente, almeno ogni sei mesi. In caso di trattamento di dati sensibili e di dati giudiziari la parola chiave è modificata almeno ogni tre mesi. Password Management

Requirements set forth by the Technical Attachment for data management (2.2) (13) I profili di autorizzazione, per ciascun incaricato o per classi omogenee di incaricati, sono individuati e configurati anteriormente all'inizio del trattamento, in modo da limitare l'accesso ai soli dati necessari per effettuare le operazioni di trattamento. ; User Profiles (19.3) (Il documento programmatico sulla Sicurezza (DPS) deve contenere) l'analisi dei rischi che incombono sui dati; Risk Analysis (19.4) (Il documento programmatico sulla Sicurezza (DPS) deve contenere) le misure da adottare per garantire l'integrità e la disponibilità dei dati, nonchè la protezione delle aree e dei locali, rilevanti ai fini della loro custodia e accessibilità Backup (19.5) (Il documento programmatico sulla Sicurezza (DPS) deve contenere) la descrizione dei criteri e delle modalità per il ripristino della disponibilità dei dati in seguito a distruzione o danneggiamento Restore

ISO Requirements Implementation of ISO Quality System in hospital management has been recommended by the Ministry of Health The Electronic Case History may be a powerful and fundamental key point of the Quality System provided that following requirements are met: Traceability Clarity Accuracy Trustworthiness Completeness Implied requirements almost equal to the ones set forth by pharmaceutical regulations

Electronic Data for Source Data Verification Only if these requirements are met, Electronic Case History can be used for Source Data Verification Ministry of Health Rules Quality ISO requirements Privacy related local laws (DL675/196, DL196/2003) Electronic Case History + eSignature Network Clinical DB (eCRF) + eSignature Paper CRF Printed Case History Source Data Verification

Conclusions Requirements for data managed by Computer System are increasing due to the increment of Computer System in the product life cycle Electronic Case History might be used provided that they verify the provisions set for Regulated Records The checklist for Computer System Compliance may be used in order to justify the use of Electronic Case History within the Source Data Verification

Thanks for your attention Should you have any question, feel free to contact me