SlideShare a Scribd company logo
11
Most read
12
Most read
24
Most read
Mail : gxpqualityassurance@gmail.com
Phone : +91 8000656594
 A computerized system is a function
integrated with a computer system .
 Generation, measurement, calculation,
assessment, transfer, processing, storage or
archiving of data
 Intended for regulatory submission or to
support regulatory decisions .
 ISO 13485 ; Clause 7.5.2.1 “validation of the
application of computer software for service
provision shall conform to specified
requirements”
 ISO 17025 ; Clause 7.11.2 “The laboratory
information management system(s)
………………shall be validated for functionality
……..by the laboratory before introduction
 OECD No.1 GLP : “ensure that computerized systems
used in the study have been validated”
 ICH E6(R2), GCP : “A process of establishing and
documenting that the specified requirements of a
computerized system ……… of the system or transition
to a new system.
 ICH Q7 (R2), GMP-related computerized systems
should be validated.
 A NEED FOR EVERY REGULATED SYSTEM …!!!
Lets understand the responsibilities
…!!!
 IT Personnel : purchase, installation and
maintenance of a computerized system.
 Supplier : Third parties, vendors, internal IT
departments, service providers including hosted
service providers .
 User : The personnel operating the
computerized system.
 System Owner / IT Owner :The individual who
is responsible for the availability, support and
maintenance of a system and for the security of
the data residing on that system. The System
Owner acts on behalf of the management.
 Validation Director: A delegated person responsible
for a validation project.
 Facility Management person(s) who has the authority
and formal responsibility for the organization and
functioning of the test facility according to these
Principles of Good Laboratory Practice.
 Quality Assurance (QA) has to review the validation
documentation and inspect the validation activities
for regulatory compliance.
 Personnel are responsible for performing activities
with computerized systems in accordance with the
GLP Principles and recognized technical standards
Computerized System Validation : Understanding basics
 Acceptance Criteria : The documented criteria
that should be met to successfully complete a
test phase or to meet delivery requirements.
 Acceptance testing Formal testing of a
computerized system in its anticipated
operating environment to determine whether all
acceptance criteria of the test facility have been
met .
 Authorization concept : A formal procedure to
define and control access rights to and privileges
in a computerized system.
 Back-up Provision made as a part of
contingency plan for the recovery of data files
or software or to restart processing, or for the
use of alternative computer equipment.
 Change Control: Evaluation and documentation
to determine whether a validation process is
necessary following any changes to the
computerized system.
 Change Management : Change management is
the process for the life cycle of changes.
 Configuration: A configuration is an
arrangement of functional units and pertains to
the choice of hardware, software and
documentation that affects function and
performance of the system.
 Corrective and Preventive Actions (CAPA)
The concept of corrective and preventive
actions focuses on the systematic
investigation of the root causes of identified
problems or risks in an attempt to prevent
their recurrence or to prevent occurrence.
 Data migration Data migration is the activity
of transporting electronic data from one
system (computer) to another, transferring
data between storage media or simply the
transition of data from one state to another
Computerized System Validation : Understanding basics
 Data approval Data approval means locking
data after collection and verification and e.g.
transformation to make data suitable for use
in records.
 Data capture Data capture are actions that
typically take place to plan, collect, and verify
data .
 Electronic record Any combination of text,
graphics, data, audio, pictorial, or other
information representation in digital form.
 Electronic Signature An electronic measure
that can be substituted for a handwritten
signature or initials for the purpose of signifying
approval, authorization or verification of specific
data entries.
 Hybrid system : Co-existence of paper and
electronic record and signature components.
 Life cycle : An approach to computerized
system development that begins with
identification of the user’s requirements,
continues through design, integration,
qualification, user validation, control and
maintenance, and ends when use of the
system is retired.
 Life cycle model : A life cycle model
describes the phases or activities of a project
from conception until the product is retired.
 Risk: Combination of the probability of
occurrence of harm and the severity of that
harm.
 Risk analysis: Estimation of the risk associated
with the identified hazards.
 Risk assessment : Risk assessment consists of
the identification of hazards and the analysis
and evaluation of risks associated with exposure
to those hazards .
Computerized System Validation : Understanding basics
 Security: The protection of computer
hardware and software from accidental or
malicious access, use, modification,
destruction or disclosure.
 Software A programme acquired for or
developed, adapted or tailored to the facility
requirements for the purpose of controlling
processes, data collection, data
manipulation, data reporting and/or
archiving.
Computerized System Validation : Understanding basics
 Views Expressed and errors , if any are attributable to
author. If you rely on the above views without a
personalize opinion or study and if you have benefits
you are free to keep it for yourself without any
ACKNOWLEDGEMENT !!!!
 It is a nutshell presentation for training and
understanding purpose only .
 For training session please mail at
gxpqualityassurance@gmail.com or contact +91 8000656594

More Related Content

PPTX
Computer System Validation
PDF
CSV - Computer System Validation
PPTX
Gamp 5 overview by jaya prakash ra
PPTX
Computerized system validation
PPTX
Computer system validations
PPTX
Cross contamination
PPTX
Computerized system validation
PPTX
Computer System Validation
CSV - Computer System Validation
Gamp 5 overview by jaya prakash ra
Computerized system validation
Computer system validations
Cross contamination
Computerized system validation

What's hot (20)

PPT
Computer System Validation
PDF
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
PPTX
Risk assessment for computer system validation
PPT
Overview on “Computer System Validation” CSV
PPT
Gamp Riskbased Approch To Validation
PPTX
Deviation and root cause analysis in Pharma
PPTX
BPR review and batch release
PPTX
21 CFR PART 11
PPTX
Documentation in Pharmaceutical Industry Part I
PDF
Computer System Validation - The Validation Master Plan
PPTX
Good Automated Manufacturing Practices
PPTX
computer system validation
PPT
PPT
Six system inspection model.
PPTX
Process Validation For Ointment/creams and Liquid Orals
PDF
Deviation, OOS & complaint investigation and CAPA
PPTX
GMP Training: Handling of deviation
PPT
GMP- APQR training
PPTX
Auditing of capsule, sterile production and packaging
PDF
Csv concepts
Computer System Validation
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Risk assessment for computer system validation
Overview on “Computer System Validation” CSV
Gamp Riskbased Approch To Validation
Deviation and root cause analysis in Pharma
BPR review and batch release
21 CFR PART 11
Documentation in Pharmaceutical Industry Part I
Computer System Validation - The Validation Master Plan
Good Automated Manufacturing Practices
computer system validation
Six system inspection model.
Process Validation For Ointment/creams and Liquid Orals
Deviation, OOS & complaint investigation and CAPA
GMP Training: Handling of deviation
GMP- APQR training
Auditing of capsule, sterile production and packaging
Csv concepts
Ad

Similar to Computerized System Validation : Understanding basics (20)

PPTX
Oecd glp document no.17
DOCX
Phụ lục 11 GMPEU. Hệ thống máy tính
PPTX
Calibration/PM and Asset Management in Bio-Med Applications
PPTX
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
PDF
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
PDF
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
PDF
Computer systems compliance
PPTX
Epitome Corporate PPT
PDF
RSPL Brochure
PPTX
1 - Introduction to Computerized Systems Validation - for review.pptx
PDF
Appetite For Risk - Continuous Delivery In A Regulated Environment
PPT
Audit of it infrastructure
PPT
Auditing In Computer Environment Presentation
PPTX
Teaching demo.pptx
PPT
System imolementation(Modern Systems Analysis and Design)
PDF
Data Acquisition Systems | Digilogic Systems
PDF
Data Acquisition Systems from Digilogic Systems
PPTX
Security
PPTX
3 Health informationkgouuiiouapp system.pptx
PPTX
Critical Controls Of Cyber Defense
Oecd glp document no.17
Phụ lục 11 GMPEU. Hệ thống máy tính
Calibration/PM and Asset Management in Bio-Med Applications
A GAMP Approach to Data Integrity, Electronic Records & Signatures & Operati...
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Computer systems compliance
Epitome Corporate PPT
RSPL Brochure
1 - Introduction to Computerized Systems Validation - for review.pptx
Appetite For Risk - Continuous Delivery In A Regulated Environment
Audit of it infrastructure
Auditing In Computer Environment Presentation
Teaching demo.pptx
System imolementation(Modern Systems Analysis and Design)
Data Acquisition Systems | Digilogic Systems
Data Acquisition Systems from Digilogic Systems
Security
3 Health informationkgouuiiouapp system.pptx
Critical Controls Of Cyber Defense
Ad

Recently uploaded (20)

PPTX
Nancy Caroline Emergency Paramedic Chapter 14
PPTX
Public Health. Disasater mgt group 1.pptx
PPTX
Theories and Principles of Nursing Management
PPTX
guidance--unit 1 semester-5 bsc nursing.
PPTX
Dissertationn. Topics for obg pg(3).pptx
PPTX
Vaginal Bleeding and Uterine Fibroids p
PPTX
Acute renal failure.pptx for BNs 2nd year
PPTX
HIGHLIGHTS of NDCT 2019 WITH IMPACT ON CLINICAL RESEARCH.pptx
PPTX
Nancy Caroline Emergency Paramedic Chapter 15
PDF
Introduction to Clinical Psychology, 4th Edition by John Hunsley Test Bank.pdf
PPTX
Nancy Caroline Emergency Paramedic Chapter 8
PDF
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
PPTX
Care Facilities Alcatel lucenst Presales
PPTX
Nancy Caroline Emergency Paramedic Chapter 7
PPTX
Full Slide Deck - SY CF Talk Adelaide 10June.pptx
PPTX
DeployedMedicineMedical EquipmentTCCC.pptx
PPTX
Nancy Caroline Emergency Paramedic Chapter 13
PDF
Back node with known primary managementt
PPTX
Nancy Caroline Emergency Paramedic Chapter 16
PPTX
Understanding The Self : 1Sexual health
Nancy Caroline Emergency Paramedic Chapter 14
Public Health. Disasater mgt group 1.pptx
Theories and Principles of Nursing Management
guidance--unit 1 semester-5 bsc nursing.
Dissertationn. Topics for obg pg(3).pptx
Vaginal Bleeding and Uterine Fibroids p
Acute renal failure.pptx for BNs 2nd year
HIGHLIGHTS of NDCT 2019 WITH IMPACT ON CLINICAL RESEARCH.pptx
Nancy Caroline Emergency Paramedic Chapter 15
Introduction to Clinical Psychology, 4th Edition by John Hunsley Test Bank.pdf
Nancy Caroline Emergency Paramedic Chapter 8
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
Care Facilities Alcatel lucenst Presales
Nancy Caroline Emergency Paramedic Chapter 7
Full Slide Deck - SY CF Talk Adelaide 10June.pptx
DeployedMedicineMedical EquipmentTCCC.pptx
Nancy Caroline Emergency Paramedic Chapter 13
Back node with known primary managementt
Nancy Caroline Emergency Paramedic Chapter 16
Understanding The Self : 1Sexual health

Computerized System Validation : Understanding basics

  • 2.  A computerized system is a function integrated with a computer system .  Generation, measurement, calculation, assessment, transfer, processing, storage or archiving of data  Intended for regulatory submission or to support regulatory decisions .
  • 3.  ISO 13485 ; Clause 7.5.2.1 “validation of the application of computer software for service provision shall conform to specified requirements”  ISO 17025 ; Clause 7.11.2 “The laboratory information management system(s) ………………shall be validated for functionality ……..by the laboratory before introduction
  • 4.  OECD No.1 GLP : “ensure that computerized systems used in the study have been validated”  ICH E6(R2), GCP : “A process of establishing and documenting that the specified requirements of a computerized system ……… of the system or transition to a new system.  ICH Q7 (R2), GMP-related computerized systems should be validated.  A NEED FOR EVERY REGULATED SYSTEM …!!!
  • 5. Lets understand the responsibilities …!!!
  • 6.  IT Personnel : purchase, installation and maintenance of a computerized system.  Supplier : Third parties, vendors, internal IT departments, service providers including hosted service providers .  User : The personnel operating the computerized system.  System Owner / IT Owner :The individual who is responsible for the availability, support and maintenance of a system and for the security of the data residing on that system. The System Owner acts on behalf of the management.
  • 7.  Validation Director: A delegated person responsible for a validation project.  Facility Management person(s) who has the authority and formal responsibility for the organization and functioning of the test facility according to these Principles of Good Laboratory Practice.  Quality Assurance (QA) has to review the validation documentation and inspect the validation activities for regulatory compliance.  Personnel are responsible for performing activities with computerized systems in accordance with the GLP Principles and recognized technical standards
  • 9.  Acceptance Criteria : The documented criteria that should be met to successfully complete a test phase or to meet delivery requirements.  Acceptance testing Formal testing of a computerized system in its anticipated operating environment to determine whether all acceptance criteria of the test facility have been met .
  • 10.  Authorization concept : A formal procedure to define and control access rights to and privileges in a computerized system.  Back-up Provision made as a part of contingency plan for the recovery of data files or software or to restart processing, or for the use of alternative computer equipment.
  • 11.  Change Control: Evaluation and documentation to determine whether a validation process is necessary following any changes to the computerized system.  Change Management : Change management is the process for the life cycle of changes.
  • 12.  Configuration: A configuration is an arrangement of functional units and pertains to the choice of hardware, software and documentation that affects function and performance of the system.
  • 13.  Corrective and Preventive Actions (CAPA) The concept of corrective and preventive actions focuses on the systematic investigation of the root causes of identified problems or risks in an attempt to prevent their recurrence or to prevent occurrence.
  • 14.  Data migration Data migration is the activity of transporting electronic data from one system (computer) to another, transferring data between storage media or simply the transition of data from one state to another
  • 16.  Data approval Data approval means locking data after collection and verification and e.g. transformation to make data suitable for use in records.  Data capture Data capture are actions that typically take place to plan, collect, and verify data .
  • 17.  Electronic record Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form.  Electronic Signature An electronic measure that can be substituted for a handwritten signature or initials for the purpose of signifying approval, authorization or verification of specific data entries.
  • 18.  Hybrid system : Co-existence of paper and electronic record and signature components.
  • 19.  Life cycle : An approach to computerized system development that begins with identification of the user’s requirements, continues through design, integration, qualification, user validation, control and maintenance, and ends when use of the system is retired.  Life cycle model : A life cycle model describes the phases or activities of a project from conception until the product is retired.
  • 20.  Risk: Combination of the probability of occurrence of harm and the severity of that harm.  Risk analysis: Estimation of the risk associated with the identified hazards.  Risk assessment : Risk assessment consists of the identification of hazards and the analysis and evaluation of risks associated with exposure to those hazards .
  • 22.  Security: The protection of computer hardware and software from accidental or malicious access, use, modification, destruction or disclosure.  Software A programme acquired for or developed, adapted or tailored to the facility requirements for the purpose of controlling processes, data collection, data manipulation, data reporting and/or archiving.
  • 24.  Views Expressed and errors , if any are attributable to author. If you rely on the above views without a personalize opinion or study and if you have benefits you are free to keep it for yourself without any ACKNOWLEDGEMENT !!!!  It is a nutshell presentation for training and understanding purpose only .  For training session please mail at [email protected] or contact +91 8000656594