6/11/04Part 11 Public Meeting1 Risk-Based Approach Scott M Revolinski Washington Safety Management Solutions Carolyn Apperson-Hansen Cleveland Clinic Foundation.

Slides:



Advertisements
Similar presentations
Building a Cradle-to-Grave Approach with Your Design Documentation and Data Denise D. Dion, EduQuest, Inc. and Gina To, Breathe Technologies, Inc.
Advertisements

Integra Consult A/S Safety Assessment. Integra Consult A/S SAFETY ASSESSMENT Objective Objective –Demonstrate that an acceptable level of safety will.
Lessons Learned from the Application of Risk Management in the Shipment of LNG.
RISK ANALYSIS.  Almost all of the things that we do involve risk of some kind, but it can sometimes be challenging to identify risk, let alone to prepare.
Determining the Significant Aspects
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST.
Strengthening the Medical Device Clinical Trial Enterprise
Project Management Gaafar 2007 / 1 This Presentation is uses information from PMBOK Guide 2000 Project Management Risk Management* Dr. Lotfi Gaafar.
New GAMP Good Practice Guide for Electronic Record and Signature Compliance Arthur D. Perez, Ph.D. Chairman, GAMP Americas.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Overview of Key Rule Features
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
Combining Product Risk Management & Design Controls
1 Risk evaluation Risk treatment. 2 Risk Management Process Risk Management Process.
Tony Gould Quality Risk Management. 2 | PQ Workshop, Abu Dhabi | October 2010 Introduction Risk management is not new – we do it informally all the time.
Bureau of Workers’ Comp PA Training for Health & Safety (PATHS)
CDRH Software Regulation
Session 6: Data Integrity and Inspection of e-Clinical Computerized Systems May 15, 2011 | Beijing, China Kim Nitahara Principal Consultant and CEO META.
Center for Devices and Radiological Health U. S. Department of Health and Human Services Al Taylor Acting Chief, Medical Electronics Branch Office of Science.
Complying With The Federal Information Security Act (FISMA)
Executive summary prepared by some members of the ICH Q9 EWG for example only; not an official policy/guidance July 2006, slide 1 ICH Q9 QUALITY RISK MANAGEMENT.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
QUALITY MANAGEMENT SYSTEM ACCORDING TO ISO
MethodGXP The Solution for the Confusion.
Update on progress with development of DS459
QA Requirements for DOE Accelerator Safety System Software K. Mahoney Group Leader, Safety Systems TJNAF Presented at the 2008 DOE Accelerator Safety Workshop.
Carol L. Sohn Senior Nuclear Safety Advisor, Office of Science, SC-33 1 May 5, 2011 Review of Science Sites Hazard Categorization.
WHAT IS SYSTEM SAFETY? The field of safety analysis in which systems are evaluated using a number of different techniques to improve safety. There are.
Chapter 7 Auditing Internal Control over Financial Reporting McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
© 2011 Underwriters Laboratories Inc. All rights reserved. This document may not be reproduced or distributed without authorization. ASSET Safety Management.
PwC 21 CFR Part 11 – A Risk Management Perspective Patrick D. Roche 07 March 2003, Washington D.C.
Quality Control and Patient Risk Curtis A. Parvin, Ph. D
Presenter’s Name June 17, Directions for this Template  Use the Slide Master to make universal changes to the presentation, including inserting.
FDA Public Meeting on Electronic Records and Signatures June 11, 2004 Presentation of the Industry Coalition on 21CFR Part 11 Alan Goldhammer, PhD Chair.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Development of Methodologies for Independent Verification and Validation of Neural Networks NAG OSMA-F001-UNCLASS Methods and Procedures.
Rules for Supporting Part 803 and Part 806 Decision Making Page 1 Establishing Rules for: Medical Device Reports (803) & Correction and Removal Reports.
Specific Safety Requirements on Safety Assessment and Safety Cases for Predisposal Management of Radioactive Waste – GSR Part 5.
Computer System Validation What is it?
Center for Devices and Radiological Health U. S. Department of Health and Human Services Al Taylor Acting Chief, Medical Electronics Branch Office of Science.
RLV Reliability Analysis Guidelines Terry Hardy AST-300/Systems Engineering and Training Division October 26, 2004.
1 BY LT KOL Hishammuddin bin Abdul RahmanTUDM PENGARAH AAMR.
FDA Part 11 Public Meeting Washington, DC June 11, 2004 Paul D’Eramo Executive Director Worldwide Policy & Compliance Management Quality & Compliance Services.
© 2004, Genentech Electronic Records; Electronic Signatures Public Meeting Docket No. 2004N-0133 Kenneth Kornfield, Associate Director, Global Quality.
Using Risk Assessment to Drive Software Validation Decisions Don Hopkins, Ph.D. Ursa Logic Corporation.
Development, Validation, Implementation and Enhancement for a Voluntary Protection Programs Center of Excellence (VPP CX) Capability for the Department.
© 2011 Michigan State University and United Nations Industrial Development Organization, original at CC-BY-SA HACCP Principle.
Toward a New ATM Software Safety Assessment Methodology dott. Francesca Matarese.
Department of Defense Voluntary Protection Programs Center of Excellence Development, Validation, Implementation and Enhancement for a Voluntary Protection.
Stoimen Stoimenov QA Engineer SitefinityLeads,SitefinityTeam6 Telerik QA Academy Telerik QA Academy.
Lean Six Sigma: Process Improvement Tools and Techniques Donna C. Summers © 2011 Pearson Higher Education, Upper Saddle River, NJ All Rights Reserved.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Risk Assessment: A Practical Guide to Assessing Operational Risk
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Analysis of Current Maturity Models and Standards
Security SIG in MTS 05th November 2013 DEG/MTS RISK-BASED SECURITY TESTING Fraunhofer FOKUS.
Regulation (EU) No 2015/1136 on CSM Design Targets (CSM-DT)
Risk management - HIRAC awareness presentation
Quality Risk Management
Training Course on Integrated Management System for Regulatory Body
NRC Cyber Security Regulatory Overview
SCSC April 2018 A model for including cyber threat in safety cases
Safety & Security of future SATCOM based Aviation Data Links
יוסי שדמתי רק איכות מניהול סיכונים לאימות ותיקוף תהליכי הרכבה From Risk Management to Processes Validation יוסי.
Transmitted by the expert from ISO
European Commission, DG Environment Air & Industrial Emissions Unit
A New Concept for Laboratory Quality Management Systems
ISO and TR Update for FDA Regulated Industries
Presentation transcript:

6/11/04Part 11 Public Meeting1 Risk-Based Approach Scott M Revolinski Washington Safety Management Solutions Carolyn Apperson-Hansen Cleveland Clinic Foundation

6/11/04Part 11 Public Meeting2 Major Points Use of risk based evaluation of electronic records systems Defining which electronic records are Part 11 electronic records

6/11/04Part 11 Public Meeting3 Major Points Use of risk based evaluation of electronic records systems Defining which electronic records are Part 11 electronic records

6/11/04Part 11 Public Meeting4 Existing Risk Guidance Use of COTS software in medical devices

6/11/04Part 11 Public Meeting5 Existing Risk Guidance COTS software in medical devices guide: –Basic Validation Documentation –Residual Risk Discussion

6/11/04Part 11 Public Meeting6 Risk Assessment Difficulties Most electronic records cannot be easily related to human safety categories: –major, moderate, minor Failure probability for software cannot be defined

6/11/04Part 11 Public Meeting7 General Risk Guide (draft) Risk Management as an Integral Part of the Quality Management System, SG3 / N15R6 (draft) Using Failure Mode and Effects Analysis (FEMA) techniques leads to a risk index. This is used to categorize the significance of various hazards

6/11/04Part 11 Public Meeting8 What’s Missing Relationship between electronic records and human safety Evaluation of electronic record hazard probabilities and consequences Basis for judging robustness of risk mitigation controls

6/11/04Part 11 Public Meeting9 Systems Approach Evaluate association between product quality / human safety and System under consideration Examine electronic records use within System Identify electronic record security and integrity hazard scenarios Establish multiple layers of risk mitigation controls commensurate with hazard probability and consequences

6/11/04Part 11 Public Meeting10 Risk Assessment Summary In re-evaluating the risk-based approach to Part 11 requirements consider providing: –an approach to estimate the relationship between electronic records and human safety (e.g., FMEA – Systems Approach) –types of risk mitigation controls (e.g., layers of procedural and / or physical barriers) –basis for accepting residual risk

6/11/04Part 11 Public Meeting11 Major Points Use of risk based evaluation of electronic records systems Defining which electronic records are Part 11 electronic records

6/11/04Part 11 Public Meeting12 Existing Application Guidance Scope and Application Guide for Part 11

6/11/04Part 11 Public Meeting13 Application Difficulties Most predicate rules were written before use of computers for records management Predicate rule requirements for Part 11 issues aren’t addressed Few electronic records have direct links to product quality or human safety yet Part 11 application is anticipated

6/11/04Part 11 Public Meeting14 Risk-Based Systems Approach Business risk is the inappropriate use of narrow Part 11 scope Systems approach to determine use of electronic records and potential regulatory impacts Justification documentation

6/11/04Part 11 Public Meeting15 Application Summary In re-evaluating the scope of Part 11 application consider providing: –some examples of when electronic records could be considered Part 11 records and when they are not (when not specifically identified in the predicate rules) –basis for deciding what is significant to product quality / human safety

6/11/04Part 11 Public Meeting16 Contact Information Scott Revolinski Washington Safety Management Solutions 2131 S. Centennial Avenue Aiken, SC Carolyn Apperson-Hansen Cleveland Clinic Foundation 9500 Euclid Avenue Cleveland, Ohio