background top icon
background center wave icon
background filled rhombus icon
background two lines icon
background stroke rhombus icon

Download "2-2.4"

input logo icon
Video tags
|

Video tags

-2.
Subtitles
|

Subtitles

subtitles menu arrow
  • ruRussian
Download
00:00:01
[music]
00:00:26
minus specialists inspection department
00:00:29
produce and medicines
00:00:31
little state power
00:00:33
relevant practices 2002
00:00:36
I'm here to talk to the inspection team
00:00:37
place that is inserted
00:00:39
inspection of foreign
00:00:40
drug manufacturers
00:00:42
compliance with regulations
00:00:43
good manufacturing practices for
00:00:46
I am a biotechnologist by education and place of work
00:00:49
for the production of sterile non-sterile
00:00:50
medicines and today my
00:00:53
the presentation will focus on questions
00:00:54
maintaining proper production
00:00:57
Practitioner regarding alignment yes
00:00:59
the topic is quite extensive, so we
00:01:02
we will stick to the following plan
00:01:05
Let's review the principles of integrity
00:01:07
data and will show it inside the boot, we’ll discuss it
00:01:10
expectations regarding paper recordings
00:01:12
media in relation to electronic recording
00:01:14
we'll talk about support
00:01:16
data alignment of such scorpion tons
00:01:18
culture of staff behavior and
00:01:20
applying a risk-based approach
00:01:22
to data management we will
00:01:25
a management model from
00:01:27
comments delivered out of shame
00:01:28
technical report ideas after which we
00:01:31
Let's discuss the life cycle in lido slightly
00:01:34
motorized systems and
00:01:35
We also provide the relevant documentation
00:01:38
let's review just one hundred
00:01:39
applications with the same not Russian advice
00:01:42
economic commission but what not
00:01:44
We will discuss working with electronic data
00:01:46
table with data in the quality control department
00:01:49
using the example when logical
00:01:50
physico-chemical bathory and conclusion
00:01:53
Let's consider, for example, potential
00:01:55
linked data problems in production
00:01:58
I would like to start with lists of any
00:02:01
paired requirements and guidelines which
00:02:02
need to know a production employee
00:02:04
not all of these sites are possible
00:02:07
you need to know the documents thoroughly
00:02:09
because some of them talk about
00:02:11
one and the same that but in principle for
00:02:13
understand the requirements regarding the method
00:02:15
hence the requirements for freeze-up and
00:02:17
operation of compensated systems
00:02:19
It is recommended to know what these documents are about
00:02:21
like
00:02:23
acceptance must be carried out when working with
00:02:25
actual data in 2003 in the USA and
00:02:29
on the day it was released updated and
00:02:31
industry guide with recommendations
00:02:33
in relation to electronic records or
00:02:36
podcast scope of activity application
00:02:38
2007 cooperation scheme in the field
00:02:41
political inspections 5 places I released
00:02:45
guidance on good practice for
00:02:47
be backup systems in regulated
00:02:49
in principle, the environments on target documents were
00:02:51
provide reference recommendations
00:02:53
information regarding politicized
00:02:56
systems that will be useful to the spector
00:02:58
training purposes and during active
00:03:00
systems in European requirements Jane and
00:03:04
Odessa was revised in 2011
00:03:06
computerized system application
00:03:08
which had certain requirements in
00:03:11
regarding operational validation
00:03:13
preserved systems in Russia since 2013
00:03:16
year to act is an order
00:03:19
The Ministry of Industry and Trade of Russia needs 916 which
00:03:22
has the number one apps in antiquity
00:03:24
number one app from Europe
00:03:25
requirements further in 2016 there was a wife
00:03:29
77 birth which also contains
00:03:31
application number 11 is identical
00:03:34
application number eleven of
00:03:35
European requirements in addition to
00:03:37
application number 11 also have
00:03:42
documentation requirements and requirements in
00:03:44
regarding operational validation clause
00:03:47
backup systems and in production
00:03:49
pharmaceutical substances
00:03:52
employees of our institute were
00:03:54
management and integrity developed
00:03:56
data bond outline green systems
00:03:58
which should be considered as
00:04:00
means to understand the position
00:04:02
Department of Development of Pharmaceutical and
00:04:04
medical industry of the Ministry of Industry and Trade
00:04:05
Russia and football dance in relation to
00:04:09
consistency of data and minimum expectations
00:04:13
achieving compliance
00:04:15
requirement methods considered in this
00:04:18
manual are given in accordance with
00:04:20
expectations defined in
00:04:21
relevant guidelines issued
00:04:23
competent and wanderings for example
00:04:25
world health organization
00:04:28
sow s.p.
00:04:30
British agency and mothers released
00:04:33
2018
00:04:35
guidance and definition from shame
00:04:37
in principle it is aimed at eliminating
00:04:40
fundamental errors revealed by help
00:04:42
their international partners
00:04:44
regulation during processes in
00:04:47
time for these checks jill pj jay
00:04:50
Jay
00:04:51
2018 in the USA per day was released
00:04:55
Q&A guide
00:04:57
related stealth here the purpose of this
00:05:00
management had to clarify the role
00:05:02
integrity to current proper
00:05:04
industrial practice for
00:05:05
medicines
00:05:07
world health organization
00:05:09
technical reports number a were issued
00:05:12
996 is a guide to proper
00:05:15
records data management practices and
00:05:17
number 1025 good practice
00:05:20
taking photographs
00:05:22
2020 and at the end you see the project
00:05:25
Pestle's Guide to Data Management
00:05:28
misalignment resolved genie pdp environments
00:05:35
common practice for most
00:05:38
tourism enterprises is
00:05:39
using the approaches described in
00:05:42
industry guides that you
00:05:43
you see on this slide these are
00:05:46
organizations as an international association
00:05:48
pharmaceutical engineering and
00:05:50
Oral Parade Manufacturers Association
00:05:52
medications frequently
00:05:54
data integrity violations
00:05:56
we discover and recent years have prompted
00:05:58
any paired organs are given environment on
00:06:00
priority during
00:06:03
traditional checks and from employees
00:06:04
after six Kanska pirates continues
00:06:06
discover conditions and methods that
00:06:09
endangered created among whom
00:06:11
there are human errors
00:06:13
inadequate supervision
00:06:15
guidance I am not enough and training
00:06:17
employees, system failures are not
00:06:20
relevant qualifications
00:06:22
system configurations are of poor quality
00:06:24
procedures or observation sites procedure
00:06:26
also falsification
00:06:28
worldwide pharmaceutical industry
00:06:31
is it a highly regulated industry or
00:06:33
interaction between rival paired organs and
00:06:35
acoustic companies for example when
00:06:37
registration of medicines
00:06:39
and during activities are associated with
00:06:41
inspection of production sites
00:06:43
are checked by regulatory authorities
00:06:45
documents also include technical data
00:06:48
shredded information or will receive but
00:06:51
initial information must be
00:06:54
third-party complete and reliable measurements
00:06:57
control to ensure alignment
00:06:58
data must be embedded in
00:07:00
practical quality system which
00:07:02
guarantees about medicines
00:07:03
have the required quality
00:07:06
data integrity applies to all
00:07:09
elements of the prognostic system
00:07:10
qualities and principles that will be below
00:07:13
considered should be applied in
00:07:14
respect
00:07:15
paper records
00:07:18
made using electronic
00:07:19
systems throughout the life cycle
00:07:22
data that covers all stages
00:07:25
existence of tourism data
00:07:26
companies must follow proper
00:07:28
record keeping practices
00:07:30
to develop a data control strategy
00:07:33
production site is necessary
00:07:34
use risk assessment and analysis
00:07:37
process data integrity
00:07:38
chromatic companies bear from for
00:07:41
the electronic systems they use
00:07:42
data generated by these systems for
00:07:45
good practices regarding
00:07:47
data integrity management
00:07:49
includes data received within the framework of as a
00:07:52
single and management activities
00:07:54
companies are primarily responsible for
00:07:56
resource allocation and implementation
00:07:58
control measures aimed at seats
00:08:01
minimum potential risks for
00:08:03
data integrity and also for
00:08:05
identification of residual risks key
00:08:08
principles are like a piece of paper like this
00:08:10
electronic document management combined
00:08:12
in the acronym l sang and
00:08:15
traceability readability
00:08:16
timeliness in range and accuracy
00:08:18
which was a rasp by adding others
00:08:20
attribute completeness
00:08:23
consistency stability and
00:08:25
accessibility which is now called
00:08:28
lcl and plus
00:08:31
fulfillment of expectations l100 and plus which
00:08:36
we will consider below guarantees that
00:08:38
event properly
00:08:39
documented and data can
00:08:41
be used to make reasonable
00:08:43
solutions on the next slides we are with you
00:08:46
let's look at what they are
00:08:47
given attributes and expectations regarding
00:08:50
generated data
00:08:53
trace
00:08:54
the data must belong to the sheet
00:08:56
who created the data based on importance
00:08:59
data and should also be tracked yes
00:09:02
device systems in which the data was
00:09:04
generated recorded
00:09:06
sender information for example
00:09:08
operator systems of data senders and
00:09:10
system such as devices or process
00:09:13
must be stored as part of the method
00:09:15
metadata is the data of the data
00:09:18
structured the information that
00:09:21
describes explain or otherwise
00:09:24
makes it easier to receive
00:09:26
use or management of data
00:09:29
metadata for a specific piece of data
00:09:31
can begin to self-date and time stamp
00:09:34
documenting when the data was
00:09:36
obtained from the user ID then
00:09:39
there are persons conducting a test or analysis
00:09:41
by generating this certificate
00:09:44
tools used to collect
00:09:47
data given state of material and .
00:09:50
tion number of materials and control
00:09:52
log and expectation regarding recording on
00:09:55
paper media is the use
00:09:58
employee ID for example
00:10:00
initials
00:10:01
complete with manual signature or personal
00:10:04
print expectations regarding electronic
00:10:06
stock up
00:10:07
we use the system must be
00:10:09
unique user accounts
00:10:12
or electronic signature biometric
00:10:15
line biometric audit trail
00:10:17
audit auditor
00:10:19
Well, the electronic signature is not biometric
00:10:22
electronic signature this combination
00:10:24
digital data with which you can
00:10:26
identify the person
00:10:28
biometric signature is when
00:10:30
biometric feature of the signer
00:10:32
saved on the system is average
00:10:35
which characterizes physiological
00:10:36
biological feature of a person and
00:10:39
audit trail the auditor is
00:10:42
secure computer generated
00:10:44
electronic record with time stamp
00:10:46
which allows you to reconstruct
00:10:48
events related to creation changes
00:10:51
or deleting an electronic record
00:10:54
read data should be kept readable
00:10:59
form so they can be viewed
00:11:01
let's fill in the context therefore change
00:11:03
data such as compress encryption and
00:11:06
coding must be completely
00:11:08
reversible so that we cut it off and preserve it
00:11:10
data can be both static and
00:11:12
dynamic static recording is
00:11:15
We fix the document with data, for example
00:11:18
paper record electronic image
00:11:21
practically preventing interaction
00:11:23
between the user's post content and
00:11:25
chemical recording format for example
00:11:28
electronic records that allow
00:11:30
interactive communication between the user
00:11:32
and the contents of records for example
00:11:33
electronic records of chromatograms
00:11:35
saved in electronic format
00:11:37
allows user or verify
00:11:39
to re-process
00:11:41
data and zoom in to
00:11:43
see the details more clearly
00:11:46
data stability should be maintained
00:11:49
properly so that they remain
00:11:52
intact and durable
00:11:54
life cycle depending on
00:11:57
situations in accordance with regulations
00:11:59
storage requirements
00:12:02
Availability of data must be constant
00:12:05
stored to be accessible to
00:12:07
views if necessary waiting
00:12:10
regarding paper recording
00:12:12
should be used here
00:12:14
indelible ink
00:12:16
one-line drawing for writing
00:12:18
do not change date name and reason entries
00:12:22
corrective must be used
00:12:23
liquid or other methods that can
00:12:25
make it difficult to see the stock should
00:12:27
controlled release of stitched
00:12:29
notepad with branched pages of
00:12:31
numbered sequentially
00:12:32
pages must be controlled
00:12:35
exhalation sequentially numbered
00:12:37
copies of empty forms must be made and
00:12:41
beliefs of paper documents and
00:12:43
expectation regarding electronic stock
00:12:46
content is important for dynamic data
00:12:50
record values ​​possibility
00:12:52
interact with data using
00:12:53
a suitable application should
00:12:56
used protected control
00:12:58
log and killed with time stamps
00:12:59
which independently record actions
00:13:01
users must be specific
00:13:03
configuration parameters and standard
00:13:05
operating procedure
00:13:07
disable and disable capabilities
00:13:09
overwriting data and tea talk and
00:13:11
intermediate brother where
00:13:13
strict control must be carried out
00:13:15
configuration tool used
00:13:18
annotate the data so that
00:13:20
stop hiding display and
00:13:22
printing data regularly should
00:13:26
backup the recording
00:13:28
to provide emergency
00:13:30
recovery to create a copy of files and
00:13:34
folders on additional media
00:13:36
information such as external hard
00:13:37
disk or regional storage and
00:13:40
archive here or
00:13:44
is the storage of electronic information in
00:13:47
unchanged
00:13:48
archiving is different from backup
00:13:50
copying primarily because
00:13:52
intended for long-term storage
00:13:54
information and does not provide
00:13:56
demand towards access when
00:13:58
necessity
00:14:01
timeliness of data must
00:14:03
generated by the system or recorded
00:14:06
information to the person during observation
00:14:09
observation time constant time
00:14:11
conservation should be about places as part
00:14:14
metadata including audit trail
00:14:15
audit
00:14:17
accurate date and time information
00:14:20
should automatically record
00:14:23
linked and specified by external standards
00:14:25
for example it could be the universal Venus
00:14:27
during song or center time
00:14:29
servers
00:14:31
expectations regarding paper recordings
00:14:33
media
00:14:34
training procedures must be used
00:14:37
reviews of algity itself inspections which
00:14:40
ensures that staff take notes
00:14:42
data and information during sleep
00:14:44
peaches activity directly into
00:14:46
official controlled documents
00:14:48
the procedure must require that
00:14:50
actions were recorded on paper
00:14:52
media indicating validity dates
00:14:57
Expectations regarding electronic records
00:14:59
parameters must be used
00:15:02
configurations standard rations and
00:15:03
procedures that provide fixation
00:15:06
electronic data on reliable media
00:15:08
during actions and before moving on to
00:15:10
next step for the event
00:15:12
sequence of stages or events
00:15:14
marking systems must be used
00:15:17
dates and times that cannot be
00:15:19
changed
00:15:20
staff should be analysts
00:15:22
procedures and service program
00:15:25
provide date and time synchronization
00:15:27
in all operations jack and
00:15:30
controls allows you to place
00:15:33
time of one action to another
00:15:37
under
00:15:38
data must be from us data
00:15:41
first generation
00:15:42
capture
00:15:44
observation certified copies may
00:15:46
replace original data information
00:15:49
originally recorded dynamically
00:15:50
condition should be simply accessible and in
00:15:52
in this state
00:15:53
completeness to restore completely
00:15:57
understand to be given must be given in full
00:15:59
presentation of the observation made
00:16:01
must be presented in use
00:16:03
context and associated metadata
00:16:04
including the audit log data in
00:16:08
which source text or data
00:16:11
including the audit trail were lost
00:16:13
are incomplete
00:16:16
expectations regarding paper recordings
00:16:19
media must be ensured
00:16:21
staff conduct adequate
00:16:23
verification and approval of similar paper
00:16:25
documents including document
00:16:27
used to record timely
00:16:30
collecting information
00:16:31
review procedures data should describe
00:16:34
analysis of relevant metadata
00:16:37
data review should be
00:16:39
documented on paper
00:16:41
usually means signing a record on
00:16:44
papers that have been reviewed
00:16:47
procedures must describe actions
00:16:49
what needs to be done if
00:16:50
data analysis reveals errors or
00:16:53
put omissions with principles
00:16:55
plus
00:16:57
it is not possible to recreate the recording on
00:16:59
paper of the named shapes
00:17:04
relationship of expectation here in relation
00:17:07
electronic records such that in principle
00:17:10
they are similar and required here too
00:17:14
ensuring staff
00:17:16
adequate checks of institutions and
00:17:18
bedroom electronic records including
00:17:21
read the original electronic records
00:17:23
data procedures review data should
00:17:25
describe the analysis of controversial electronic
00:17:27
data from such methods overview of data
00:17:30
must be documented in
00:17:32
electronic records are usually
00:17:33
indicated by an electronic signature
00:17:35
corrugated data set which I was
00:17:38
reviewed waiting for procedures must
00:17:40
describe the action that is needed
00:17:41
undertake what if data analysis
00:17:44
is or omission in accordance with
00:17:47
principles and plus and
00:17:51
electronic functionality
00:17:53
control she low detail
00:17:56
accuracy can be based on facts
00:18:00
related to equipment such
00:18:03
qualifications calibration
00:18:06
maintenance and were available
00:18:09
90 with watering and control procedure
00:18:13
actions and behavior
00:18:15
processes for assessing data for
00:18:17
compliance with procedural requirements for
00:18:20
deviation management including analysis 3
00:18:22
years reason for impact assessment and capa on
00:18:26
trained and qualified personnel
00:18:27
understand the importance of compliance
00:18:29
established procedures and
00:18:31
documentation in action matte
00:18:35
use of computerized
00:18:37
systems and must guarantee data
00:18:38
will be at least as accurate
00:18:40
like data recorded on paper
00:18:42
media process of transferring data between systems
00:18:45
rowan must be valid for the data
00:18:47
data must remain accurate
00:18:50
contain accurately reflects what has been done
00:18:52
observation metadata must contain
00:18:55
information to describe observations during
00:18:57
if necessary they may also contain
00:18:59
information confirming their accuracy on
00:19:03
consistency is about what should
00:19:06
create processes provide and
00:19:09
uniformity of the definition of creation
00:19:12
collection and management including migration
00:19:16
data throughout life
00:19:18
cycle these processes must be
00:19:21
implemented in such a way that
00:19:22
minimize the risk of contradiction
00:19:24
for example through standardization
00:19:26
data and training checks
00:19:29
control measures must be followed
00:19:33
caliber qualification and maintenance
00:19:35
equipment
00:19:36
carrying out printing
00:19:38
activision validation of their systems validation
00:19:42
production processes
00:19:43
review record xp and investigation
00:19:46
deviations
00:19:49
slide 18
00:19:53
data management is purchased
00:19:56
organizational events
00:19:57
ensuring data integrity on
00:20:00
data management even for growth
00:20:01
extend to data ownership and
00:20:04
will suit us throughout
00:20:06
life cycle and design
00:20:10
process usage and monitoring
00:20:12
system in accordance with the principles
00:20:14
created including control with
00:20:17
intentional and unintentional
00:20:19
changes to
00:20:21
effective data management system
00:20:23
demonstrate understanding and commitment
00:20:26
company management is reliable to practitioners
00:20:28
data management including necessity
00:20:29
combinations correspond to organizational
00:20:31
staff culture and behavior and
00:20:34
understanding of risk is related to data on
00:20:37
throughout the life cycle
00:20:40
data lifecycle extends
00:20:42
then the data is submitted and processed
00:20:45
reported checked used for
00:20:49
decisions are kept permanently
00:20:53
deleted at the end of saving
00:20:55
data transfer can take between
00:20:58
relatives and these systems or between
00:21:01
across different organizational boundaries
00:21:03
as internal for example between
00:21:05
production quality control and
00:21:07
quality assurance and external
00:21:09
for example between service providers or
00:21:12
contractors and customers
00:21:14
data according to the recording method can be
00:21:17
paper
00:21:19
paper record observation whether
00:21:21
manual activity data
00:21:23
received manually on paper can
00:21:25
require an independent review if
00:21:27
it will be forgiven necessary according to
00:21:30
data integrity risk assessment or
00:21:32
as per requirement
00:21:34
electronic electronic for seats
00:21:37
obtained when used as
00:21:39
simple and complex equipment
00:21:42
politicized systems
00:21:43
Are the trial systems simple and
00:21:46
software setting and from electronic
00:21:48
storing data such as your meters and
00:21:50
scales and
00:21:52
I will only require thermometers
00:21:54
calibration and or verification at the same time
00:21:58
difficult grain capture system requires
00:22:00
validation
00:22:02
data may be
00:22:05
hybrid this record in which the original
00:22:09
records are made both on paper and
00:22:10
electronic recording when using
00:22:13
hybrid systems must be clearly
00:22:15
primary records are identified that
00:22:17
must be reviewed and retained
00:22:19
original post is
00:22:22
data in the form of a file or formats in which
00:22:24
they were originally created with
00:22:27
maintaining integrity, for example
00:22:29
original paper record received
00:22:31
manually or electronically
00:22:33
raw data from
00:22:34
politicization of the system
00:22:36
this data should allow full
00:22:40
reconstruct activities leading
00:22:42
to obtain data what is primary
00:22:44
record primary record record which
00:22:47
shall prevail in those
00:22:48
cases where the data that is collected
00:22:51
and are stored simultaneously
00:22:53
more than one method does not match
00:22:56
There are also
00:22:57
this type of stuff
00:23:00
this is such such such information
00:23:05
how to such data as photographs on
00:23:08
image and chromatographic
00:23:10
plates if
00:23:12
received data
00:23:15
recorded using photography or
00:23:17
image or other media then for
00:23:20
choosing storage conditions for this format
00:23:23
data throughout their life
00:23:24
cycle follows guide
00:23:26
was guided by the same considerations
00:23:28
as for other data formats
00:23:31
taking into account any additional elements
00:23:35
regardless of the format, paper or
00:23:38
electronic all data including
00:23:40
raw data meta data should
00:23:43
meet the l skill requirements
00:23:44
plus
00:23:46
information originally recorded as
00:23:49
dynamic must remain
00:23:50
available in this condition
00:23:52
raw data should allow
00:23:54
completely reconstruct the order
00:23:56
actions taken
00:23:59
data management policy is approved
00:24:01
at the highest levels of the mystical
00:24:03
the company's quality culture must be
00:24:06
transparent and open in which staff and
00:24:09
are encouraged to freely communicate their
00:24:11
mistakes including social problems with
00:24:13
reliability of the data so that you can
00:24:15
was to carry out adjustments expect
00:24:18
event
00:24:20
management can stimulate culture
00:24:22
quality through the creation of a code
00:24:25
ethics and code of conduct
00:24:28
leadership by example through
00:24:30
which management should
00:24:31
demonstrate the behavior that
00:24:33
expects to see his subordinates
00:24:37
ensuring accountability for action
00:24:39
solutions for constant active participation
00:24:42
setting realistic expectations
00:24:44
taking into account the limitations that
00:24:46
pressure on employees code of value
00:24:49
because you have to reflect the salmon
00:24:51
management through policies that
00:24:53
complies with the quality culture and
00:24:54
create an atmosphere of trust in which everyone
00:24:57
employees are responsible for
00:24:59
ensuring patient safety
00:25:00
product quality policy code
00:25:03
behavior must clearly define the norms
00:25:05
ethical behavior such as
00:25:07
tess it should be brought to 100
00:25:10
units of all personnel
00:25:11
ideas, a document was developed for the industry
00:25:15
elements of a code of conduct regarding
00:25:17
data alignment which can be
00:25:20
used on company places beach issue
00:25:23
medicines
00:25:24
the entire staff of the mystical enterprise
00:25:27
should be ordinary Sasov politicians
00:25:30
data comply with it
00:25:31
managers and employees of quality services
00:25:34
must be trained in measures to
00:25:35
violation prevention and detection
00:25:37
suspicious data
00:25:39
training must be provided upon admission
00:25:42
work and regular through certain
00:25:44
time intervals must be assessed
00:25:45
learning efficiency
00:25:48
application of modern principles
00:25:50
risk management for quality and
00:25:53
closest data management practice
00:25:55
existing prognostic system
00:25:57
quality serves to modernize the system
00:26:00
quality in order to solve problems that
00:26:02
do data generation occur?
00:26:04
company chromatic quality system
00:26:06
should provide appropriate
00:26:08
controls on which are described in
00:26:11
procedure which is aimed at
00:26:13
maintaining cookie data integrity
00:26:15
life cycles such as assessment and
00:26:19
Management of risks
00:26:21
investigation programs are aimed at
00:26:23
when there is a violation of integrity
00:26:25
data and
00:26:27
or study of identified violations
00:26:31
validation data review practice
00:26:34
management software
00:26:36
suppliers and contractors
00:26:38
the training program is included when
00:26:40
procedure data integrity policy
00:26:42
on data integrity for inclusion in
00:26:45
data accuracy self inspection program
00:26:48
quality indicators and reporting to
00:26:50
senior management
00:26:53
on this slide you see
00:26:56
responsibility of senior management and
00:27:00
senior management's responsibilities include
00:27:03
promotion and support of culture which
00:27:07
maintains data integrity
00:27:10
ensuring staff training in the principle
00:27:12
data integrity and detection method
00:27:14
data integrity problems
00:27:17
management must create a working environment
00:27:19
which allows you to see errors and
00:27:21
omissions not and not these night results
00:27:23
management should encourage
00:27:25
transparent investigation and analysis and
00:27:29
mechanisms must be installed
00:27:31
guaranteeing that staff will not
00:27:33
be subject to commercial political
00:27:36
financially and on each other
00:27:38
pressure or conflict of interest that
00:27:40
may negatively affect the quality
00:27:43
their work and from this data
00:27:47
should conduct regular reviews
00:27:50
quality indicators from the outside
00:27:52
guidelines, including those related
00:27:54
data integrity quality indicators
00:27:57
should cover the following types
00:27:58
action on preventive action is
00:28:01
supervision of rules to prevent
00:28:03
violations
00:28:05
corrective is on the monitor
00:28:07
compliance between execution and results
00:28:10
running comparison with requirements and
00:28:11
narrow plus and
00:28:13
monitoring is quantity control
00:28:15
actual violation of integrity and
00:28:17
appropriate follow-up actions
00:28:20
For
00:28:23
periodic performance checks and
00:28:26
control measures in relation to these
00:28:27
indicators
00:28:28
aimed at demonstrating
00:28:30
commitment leadership assurance
00:28:32
alignment of data management in the field
00:28:34
jimmy key is it possible to attract independents
00:28:36
experts
00:28:39
the data may be different because not all
00:28:42
data processing stages are the same
00:28:45
implications for product quality and
00:28:47
patient safety to determine
00:28:50
the importance of each stage of data processing
00:28:53
control must be used
00:28:55
risks
00:28:56
risk must be controlled independently
00:28:59
from that they are controlled nearby using manual
00:29:01
system or motivated electronic
00:29:03
system any potential violation
00:29:05
data integrity loss of pass
00:29:09
deleting and changing data must be done once
00:29:11
be required to be eliminated and taken into account
00:29:13
quality system and reflected in
00:29:16
risk management documentation
00:29:18
The following factors are identified:
00:29:20
data criticality and
00:29:23
susceptibility to disruption
00:29:27
there are three possible ways to carry out
00:29:29
risk assessments are the first path from assessment
00:29:32
risks must be carried out proactively in
00:29:36
time to implement any news system
00:29:38
data management and should
00:29:40
fixed by change control 2
00:29:42
let when executed in existing
00:29:44
assessment data management systems
00:29:47
should identify potential vulnerabilities
00:29:48
data based on existing level
00:29:51
control and criticality of data for their
00:29:54
intended use
00:29:56
companies should also consider
00:29:59
Possibility of risk assessment
00:30:01
after a deviation or incident to
00:30:04
identify potential gaps in the system
00:30:06
data management and third key
00:30:08
data integrity risk assessment also
00:30:10
should be carried out in combination with
00:30:12
system change management processes
00:30:15
data management to avoid
00:30:18
creating new or additional risks
00:30:22
identify key attack targets
00:30:25
is the root cause related to the gap
00:30:27
manage yes and if yes then accepted
00:30:30
degree of impact on data
00:30:33
about mystical companies should
00:30:35
develop and implement and operate
00:30:38
documented system providing
00:30:40
and acceptable state of control on
00:30:42
risk-based approach to
00:30:44
data integrity management
00:30:46
appropriate justification
00:30:48
an example of an acceptable approach is
00:30:50
risk assessment of data equipment in which
00:30:52
processes producing data or
00:30:55
as a result of which the map data was obtained
00:30:57
practically influences or spokes are removed
00:31:00
ensures inherent risks are documented
00:31:03
the risk assessment will then have to be exactly
00:31:06
business process for example production
00:31:09
quality control quality assurance
00:31:12
data flows need to be assessed and
00:31:15
methods for obtaining data they are simple
00:31:17
learned functionality or complexity
00:31:18
canned system in the stalls for
00:31:21
considerations get themselves complicated
00:31:24
process methods for generating storage and
00:31:27
data deletion ability
00:31:30
ensure accuracy and readability
00:31:32
medal cost data sequence
00:31:35
processes and degree of automation on
00:31:38
human factor and cool kim out
00:31:40
the result that is the process
00:31:42
open or clearly defined
00:31:44
result of data comparison
00:31:46
electronic system and events
00:31:49
registered manual understanding
00:31:52
production process and processes
00:31:54
data lifecycle is critical
00:31:56
implications for developing successful
00:31:58
risk management strategies
00:32:02
data integrity control should be
00:32:04
be treated as behavioral
00:32:07
from a technical point of view
00:32:09
behavior general culture quality
00:32:11
including communication and learning closely
00:32:14
is related to the effectiveness of its software
00:32:16
ensuring data integrity when
00:32:18
considering the influence of human
00:32:20
behavior when studying elements
00:32:22
posing a risk to data
00:32:24
two categories need to be considered
00:32:26
actions are unintentional and
00:32:29
deliberate actions
00:32:30
reasons for unintentional actions
00:32:32
there may be a gap procedure for example
00:32:36
due to poor detailing of the standard
00:32:38
operating procedure procedure work
00:32:40
with deviations mechanics make mistakes
00:32:43
when registering deviations that
00:32:45
occur during setup
00:32:46
critical equipment gap in
00:32:49
knowledge, for example, incorrect
00:32:51
operation and registration at the same time
00:32:54
data during critical operation
00:32:55
equipment, for example, from 0 about because
00:32:58
them actively conducted training
00:32:59
operator
00:33:01
lack of attention to examples from these
00:33:04
taxes allowed in calculations
00:33:06
protocols for the production of medicinal products
00:33:07
drugs due to concomitant
00:33:10
operation of several production lines
00:33:12
lack of memory for examples of such
00:33:15
controllers who carry out
00:33:16
in-production control
00:33:18
packaging lines is with untimely
00:33:21
there must be appropriate
00:33:24
procedures are required and documented
00:33:26
investigation in case of any
00:33:28
mishandling or misuse
00:33:31
in the use of data that
00:33:33
obtained as a result of such failures
00:33:35
intentional actions
00:33:36
investigation should reveal the main
00:33:38
reason
00:33:39
determine impact and criticality
00:33:41
deviations and assign appropriate
00:33:42
do you correct any warnings?
00:33:44
actions
00:33:45
if it is assumed or certain
00:33:49
the cause of human error and and should
00:33:51
justify by taking care not to
00:33:54
lose sight of procedural
00:33:56
possible procedural and system errors
00:33:58
or problems if any
00:34:03
reasons for intentional actions can
00:34:05
be a scam for example yes a couple
00:34:09
will be via electronic system
00:34:11
factually unreliable and critical
00:34:13
process parameters despite the fact that
00:34:15
they differ from the specified allowed or
00:34:19
misdemeanor e.g. data defecation
00:34:21
microclimate parameters in refrigeration rooms
00:34:23
cameras that are registered manually
00:34:26
employees in operation logs
00:34:29
many cameras employee maybe 1
00:34:32
what is important to understand here is not to know
00:34:35
deliberate actions can be
00:34:37
identified and investigated
00:34:40
deliberate may be 9 office and
00:34:43
Ravana and not investigated
00:34:45
as we already said, that data is recorded in
00:34:48
electronic and paper required
00:34:50
risk management approaches to
00:34:52
determine which control measures are important for
00:34:55
ensuring alignment to evaluate
00:34:58
level exposed to potential
00:35:00
access problems for gypsies they need
00:35:03
take into account the following elements
00:35:05
data criticality
00:35:08
current existing level trolls
00:35:11
these but include you
00:35:14
managing data when it is recorded
00:35:17
manual automated processes
00:35:19
human factor volume humanity
00:35:22
enthusiastic intervention
00:35:23
hand sculpted production process
00:35:25
motivated and process jim and includes
00:35:27
written training check procedures
00:35:29
and so on thus criticality
00:35:32
data and current data troll level
00:35:35
taken together can help identify
00:35:37
data vulnerability risk vulnerability
00:35:40
data it can point to
00:35:42
level of exposure problem
00:35:45
data integrity for internal
00:35:47
disadvantages of managing three parties have
00:35:50
or elements of this collection technology
00:35:52
data, that is, manage data
00:35:54
human factor and
00:35:56
production processes or combinations
00:35:59
those three elements
00:36:00
pictured in stock control model
00:36:03
data integrity risks
00:36:05
provides for the construction of a map
00:36:07
data vulnerability and depending on
00:36:09
zones that the data falls into or
00:36:12
control strategy is determined or
00:36:14
I guarantee the current level of control
00:36:16
that unintentional problems with shame
00:36:18
unlikely let's look at what
00:36:21
there may be a classification of criticality
00:36:24
for a long time
00:36:25
it can be critical when the east
00:36:27
intended use of the data
00:36:29
directly affects the quality of the product or
00:36:33
or product safety
00:36:35
we are talking about quality monitoring here
00:36:38
product and process management
00:36:41
who may not be responsible for
00:36:43
building of variability during time
00:36:45
production release or distribution
00:36:47
influence practical attributes on
00:36:50
quality technical attributes materials
00:36:53
critical process process parameters and
00:36:58
or control of political processes
00:37:01
including those that may be related to
00:37:02
registration dossier for medicines
00:37:05
products if applicable and
00:37:10
or product safety monitoring and
00:37:13
control of processes that provide
00:37:15
effective alert management
00:37:18
various reviews, complaints or
00:37:21
adverse events average
00:37:23
criticality is
00:37:26
whose data belongs to attributes
00:37:28
quality attribute material
00:37:31
process parameters
00:37:33
key process parameters or
00:37:36
means of managing processes that
00:37:40
not one of the critical attributes on
00:37:42
critical process parameters and
00:37:44
may or may not be in
00:37:46
registration for medicinal
00:37:48
means multiple personality is when
00:37:50
intended use
00:37:53
before is to provide
00:37:55
evidence of correspondence between Jane and
00:37:57
associated with monitoring and control with them
00:38:01
fall under the category of juice and medium
00:38:05
to determine existing controls
00:38:08
given levels of android data needed
00:38:11
evaluate them controls
00:38:14
high level data associated with
00:38:16
proven automated
00:38:18
processes and minimal real
00:38:21
person throughout the positive
00:38:23
Western then as control up
00:38:25
low level are controls
00:38:27
data that includes manual processes
00:38:30
with a high degree of human intervention
00:38:33
throughout the entire life cycle
00:38:35
data high level is a high degree
00:38:38
automation of its alloying processes
00:38:41
electronic life cycle e.g. collection
00:38:44
analysis of reporting to the minimum
00:38:46
human intervention medium level
00:38:49
hybrid manual processes
00:38:51
semi-automatic life processes
00:38:53
data cycle
00:38:54
partial or lack of systemic
00:38:57
interfaces low level is vital
00:39:00
data loop
00:39:02
maintained manually data manually e.g.
00:39:05
there's capture and
00:39:09
or data confirmation
00:39:12
including
00:39:14
2nd person who confirms the deposit
00:39:18
data manual technological measurements and
00:39:21
testing manual processes with high
00:39:24
degree of human intervention
00:39:27
data vulnerability as we already said
00:39:29
this is an indicator of the degree of exposure to
00:39:33
data integrity problems
00:39:34
internal shortcomings 3 key
00:39:36
elements of this control technology
00:39:37
human factors data and
00:39:40
Jim's production processes and or
00:39:43
combinations to determine vulnerability
00:39:45
collected data user first
00:39:47
must assess the level of criticality
00:39:49
data and exist at the level of control
00:39:52
so everyone will be rated as high
00:39:56
average or no stool according to
00:39:58
definitions
00:40:00
given on the previous flight after
00:40:03
you can create a wall of nine children and
00:40:06
comparing the level of accuracy to levels
00:40:08
data management network of 9 people
00:40:11
helps to visualize how critical
00:40:14
data and data controls
00:40:17
interact to rank the level
00:40:20
risk
00:40:21
the finiteness of the data will determine
00:40:23
string of walls and vulnerability while
00:40:27
level of control related to data
00:40:30
will determine the corresponding column
00:40:32
this grid is based on levels
00:40:35
ranking high medium and low
00:40:36
risks, businesses can adapt it
00:40:39
to reflect your needs and
00:40:42
use different criteria can
00:40:44
risk reduction for criticality data and
00:40:47
data control level
00:40:50
will receive a premium vulnerability dunk the same
00:40:52
will be necessary
00:40:54
adapt if production
00:40:55
they use their hike as a platform
00:40:59
grid includes 9 unique combinations
00:41:03
pairs of data criticality and control levels
00:41:06
data that can be grouped
00:41:08
four different categories of season 1 are
00:41:12
significant vulnerability yes to the level
00:41:14
data troll drives for data only
00:41:16
criticality orange zvana it will moderate
00:41:19
vulnerability and where is the level of control
00:41:22
incommensurate with data criticality green
00:41:25
zone is an acceptable data vulnerability
00:41:27
troll level of measurable transience
00:41:29
data and the blue zone is insignificant
00:41:32
data vulnerability can be identified
00:41:35
more controls she demands it
00:41:39
applicable only don't have data
00:41:41
high criticality
00:41:44
the goal of this approach is to
00:41:46
name is the correct level of control in
00:41:50
depending on the importance of the data avoid
00:41:52
hits red or orange fields
00:41:54
thus the goal of the mitigation strategy is
00:41:57
move from right to left by
00:41:59
increasing the level of control is given in this
00:42:02
evaluation all data from real jim
00:42:04
are decisive even if they
00:42:06
relate to Putin's operations grid
00:42:09
make cells does not give any
00:42:10
opportunities or cover for
00:42:12
data falsifications are shown on the slide
00:42:16
children only data controls
00:42:19
related workshop control technology
00:42:21
data for a complete vulnerability assessment
00:42:24
necessary in the same way with her
00:42:26
controls
00:42:27
data related to human
00:42:30
factor and the process is not immediately
00:42:33
let's talk briefly about how again
00:42:36
data analysis is carried out
00:42:38
the first stage products are selected product
00:42:42
and define data that can
00:42:44
affect compliance with specification
00:42:46
or intended use
00:42:48
the second stage sets priorities for
00:42:51
internal assessments determine factors
00:42:54
risk and classifies data vulnerability
00:42:56
for critical processes third stage
00:42:58
three categories need to be considered
00:43:01
do you influence the vulnerability of data?
00:43:04
data management technologies
00:43:05
human factor and the extraction process and
00:43:09
at the fourth stage these
00:43:13
three categories when assessing a specific
00:43:15
data management process for
00:43:17
evaluate operations after completion
00:43:20
this analysis for a specific process
00:43:22
or single operations
00:43:25
received completed information can
00:43:27
be used for the same process
00:43:30
or lower operations
00:43:32
used for other products must
00:43:36
to be alone potentially
00:43:38
various
00:43:39
what is important is that for management
00:43:41
data must take into account the full
00:43:45
data life cycle to determine
00:43:47
area of ​​your vitriol
00:43:49
This slide provides examples
00:43:52
potential data reciprocity probe
00:43:54
associated with each of these three categories
00:43:57
disks as for the quality factor then
00:44:00
to identify data vulnerabilities
00:44:02
must take into account the point of human
00:44:04
data lifecycle interventions
00:44:06
because people tend to make mistakes
00:44:09
processes that are largely
00:44:11
depends on manual collection and analysis
00:44:13
data are considered inherently more
00:44:15
vulnerable topics automated process
00:44:18
for the Jay Pei process necessary
00:44:21
your complexity and reliability of the person being assessed
00:44:23
production process to
00:44:24
determine the area of ​​data vulnerability
00:44:27
more complex processes can produce
00:44:29
a larger volume is given that can
00:44:33
increase
00:44:34
number of factors influencing
00:44:35
vulnerability of data when assessing is necessary
00:44:38
consider those aspects
00:44:39
production process and evaluate
00:44:42
each process in each specific
00:44:44
case
00:44:47
adjustable electronic recording
00:44:49
controlled using simple autonomous and
00:44:53
large integrated complex systems
00:44:56
fantastic companies carry
00:44:58
responsibility for complete control of all
00:45:02
windows of server systems and controls
00:45:05
has on the left no jimpet at the enterprise
00:45:08
assessments of the used
00:45:11
computerized systems including
00:45:12
their intended use and
00:45:15
operation as well as any risks or
00:45:17
data integrity vulnerabilities
00:45:19
which can be
00:45:21
exposed to
00:45:23
special attention to lose definition
00:45:27
criticality towards green systems and any
00:45:29
related data relationships
00:45:32
product quality when determining
00:45:34
vulnerabilities and risks to data are important
00:45:37
to end the backup system
00:45:38
contextualize the use
00:45:40
within the business process requirements for whether
00:45:43
Danish operating grain map system
00:45:45
reflected in Appendix No. 11 to
00:45:47
good manufacturing practices
00:45:49
practices approved by order of the Ministry of Natural Resources
00:45:51
bargaining grow number 916 not seventy
00:45:54
the seventh decisions in these documents
00:45:56
are determined
00:45:58
regulatory requirements critical
00:46:01
records in the field of jumpy managed with
00:46:04
through politicized systems that
00:46:06
oriented data integrity cookies
00:46:10
feed the eroded system must
00:46:12
comply with regulatory requirements
00:46:13
and applicable guidelines which include
00:46:16
System validation requirements must be
00:46:19
in the lead for use by
00:46:20
purpose which requires an understanding of the function
00:46:22
capture jealousy from the theme within
00:46:24
specific business process validation
00:46:26
the system is politicized
00:46:28
documented process of achievement and
00:46:30
maintaining compliance with applicable
00:46:32
rules of jumpy and suitability for
00:46:34
intended use through implementation
00:46:35
principles of approaches and
00:46:38
life cycle event within
00:46:41
editorial plans and reports as well as
00:46:43
by applying appropriate
00:46:44
operational with android throughout
00:46:46
the entire service life of the system
00:46:48
validation should include
00:46:50
necessary control measures for
00:46:52
ensuring data integrity including
00:46:54
original electronic data or
00:46:56
print or chicks in electronic
00:46:58
formats received from the system therefore
00:47:00
when validating collective systems and when
00:47:03
subsequent control of changes is required
00:47:05
implementation of confirmation that everything
00:47:07
necessary controls for
00:47:09
data integrity is available in
00:47:11
presence that errors occur in
00:47:14
Data is lonely Minin
00:47:15
computer systems validation process
00:47:18
this is a key step to ensure
00:47:19
electronic data integrity process
00:47:22
validation is provided by documented
00:47:24
evidence allows with high
00:47:26
degree of confidence in concluding that
00:47:28
conquer grain system is functioning
00:47:30
in accordance with its specifications and
00:47:32
quality requirements and regulatory
00:47:35
requirements for permanent
00:47:36
on a reproducible basis in addition
00:47:39
the validation process must ensure
00:47:41
documentary evidence that
00:47:43
the system includes automated
00:47:45
points are focused on ensuring
00:47:47
compliance requirements jane and and
00:47:48
principles and managed and plus in relation to
00:47:51
political electronic records
00:47:54
if you came across see and
00:47:56
mothballing systems means faster
00:47:58
most of you know spears left
00:47:59
Gump 5 recommendations which
00:48:02
describes a flexible approach based on
00:48:05
risk assessment for green
00:48:07
systems that meet jig requirements
00:48:10
spin
00:48:11
when developing specifications
00:48:13
design and testing
00:48:15
computerized systems are necessary
00:48:16
use rice clinker approach
00:48:18
if we talk about the stages at which it can
00:48:21
be a Jew with no quality systems
00:48:23
products then this arrow stage is about
00:48:27
determining the planning requirements
00:48:29
stage oriented staging necessary
00:48:31
set the distribution of responsibilities for
00:48:34
definition of timing procedure and table
00:48:36
system-related implementation project
00:48:39
based
00:48:40
documented specification
00:48:42
user requirements on alloyed
00:48:45
to detail the business need and
00:48:47
users from the point of view
00:48:49
business processes for compliance
00:48:51
requirements and technical lines
00:48:53
functional standards that will
00:48:56
the initial stages of the project have been determined
00:48:58
implementation
00:48:59
specifications and creations based on
00:49:03
Everest supplier performer creates
00:49:06
set of documented specifications for
00:49:09
configuration design definitions
00:49:10
system quantity and level of detail
00:49:13
Specifications may vary
00:49:15
depending on the type of system and
00:49:17
intended use it is
00:49:19
qualifications the project is created by the mother for
00:49:22
traceability and demonstrates
00:49:24
relationship between specifications
00:49:26
relevant requirements and
00:49:28
performing source code verification in
00:49:31
in case the systems are custom-designed
00:49:33
acceptance testing stage verification
00:49:37
directional confirmation system
00:49:39
that the specifications have been met
00:49:42
may include several stages of verification
00:49:43
and not testing depending on type
00:49:45
systems
00:49:46
the method used to develop it
00:49:49
usage testing should
00:49:51
be based on assessment results
00:49:53
functional claims and so release it
00:49:58
the system is officially accepted
00:50:01
use the release and you procyon and
00:50:03
production environment in accordance with
00:50:06
controlled and documented
00:50:09
documented processes include
00:50:12
birth from owners business process
00:50:14
technical owner and
00:50:15
the representative office would like quality work
00:50:18
through a helper process
00:50:20
This
00:50:22
post-release phase after system release
00:50:26
And
00:50:28
after release the system will manage
00:50:31
via auxiliary processes
00:50:32
focused on maintaining MBA
00:50:33
doped status
00:50:35
end of use is the stage when
00:50:38
the system is put out of service
00:50:40
These supported systems must
00:50:43
be available after their expiration date
00:50:44
storage
00:50:45
it is usually expected that there will be manifested
00:50:47
prospective validation licensed
00:50:49
system however for already installed
00:50:52
systems can be pleasant acceptable
00:50:54
conducting retrospective validation on
00:50:56
based on the assessment of all historical data
00:50:58
systems that have already been produced
00:51:03
to mother greenness theme does not include
00:51:06
software only
00:51:07
application
00:51:09
directly to the software
00:51:11
provision for everything friend and subject
00:51:13
connected tools and infrastructure
00:51:16
personnel who can affect the jeep
00:51:18
and atrophic process
00:51:20
executed by the system each element
00:51:23
systems must be documented and
00:51:26
be monitored for shutdown
00:51:27
bring down this status risks fights or
00:51:31
defects usually increase with
00:51:32
increase
00:51:33
share of user software and
00:51:36
hardware vs.
00:51:38
share of standard software and
00:51:39
hardware
00:51:40
increased risk in agreed read
00:51:43
more complexity and experience
00:51:46
user categorization combined with
00:51:48
risk assessment and supplier assessment
00:51:51
may be part of an effective approach to
00:51:53
quality risk management in
00:51:55
Most systems have components
00:51:56
some various difficulties
00:51:58
operating systems are not
00:52:00
configured components and
00:52:02
customized or custom components
00:52:04
to make it easier to define
00:52:06
appropriate to the verification strategy and
00:52:08
depths were defined into four categories
00:52:13
on this slide
00:52:17
presented category number 1 category
00:52:21
my number one is infrastructure
00:52:23
software on
00:52:25
infrastructure elements are connected together
00:52:27
creating an integrated environment for
00:52:29
launching and supporting services application
00:52:32
examples can be established
00:52:34
webcams available multi-level
00:52:36
software for example
00:52:38
operating systems database manager
00:52:41
programming languages
00:52:42
middleware
00:52:45
role interpreters taxes tool
00:52:48
mental programming and package
00:52:50
spreadsheet but not app
00:52:52
developed using very packages and
00:52:54
an example would be a tool
00:52:57
software structure
00:52:58
for example software for
00:53:00
monitoring
00:53:01
network packet planning tools
00:53:05
tasks software for providing
00:53:07
security antivirus programs and
00:53:10
configuration management tools
00:53:15
offering of the first category that is
00:53:19
the expectation is that the documentation should
00:53:21
correspond
00:53:23
complexity and criticality of the system
00:53:25
documentation for any system should
00:53:27
contain all the necessary elements to
00:53:29
demonstrate what she can do
00:53:32
has been validated and is in a state
00:53:34
control and how many documents are not important
00:53:37
if all necessary elements are available
00:53:41
the third category is not configuration
00:53:44
components runtime parameters
00:53:47
can be entered and saved on
00:53:49
the software cannot be
00:53:50
configured according to
00:53:52
business process examples of such systems
00:53:55
there may be application firmware on
00:53:57
ready-to-use software
00:53:58
use or tools loosening
00:54:01
see with whom v-shaped validation scheme
00:54:05
this type on such systems
00:54:08
4 categories 4 categories configuration
00:54:12
components for software
00:54:15
often very difficult when it can be
00:54:17
users are configured for
00:54:20
meet specific needs
00:54:21
user business process software
00:54:24
the code where changes with examples of such
00:54:25
systems and electronic document systems
00:54:28
turnover resource planning system
00:54:30
enterprises
00:54:31
or scada system
00:54:34
building management systems and so on
00:54:38
us they also presented a diagram of gan
00:54:42
5 for validation into imagery, can I?
00:54:45
will give this type of system
00:54:47
fifth category is custom
00:54:50
self-developed application
00:54:52
amazing and coded
00:54:54
user what business processes are there
00:54:56
software are examples of such
00:54:59
systems and be a computer application
00:55:02
custom electronic circuits
00:55:05
macros in the table and on the slide as well
00:55:07
a v-shaped diagram is presented and
00:55:09
validation of this type of systems
00:55:14
usually the level of detail and
00:55:17
depth
00:55:21
confirm documentation must
00:55:24
increase with increasing category
00:55:26
systems complex combined systems
00:55:29
may consist of several components
00:55:32
which may relate to different
00:55:34
categories in this case the system should
00:55:36
be classified look with
00:55:38
highest category in related
00:55:40
components if one or
00:55:42
limited number of components
00:55:43
custom designed system everything is possible
00:55:46
still classified as category 4 on the list
00:55:48
custom developed components
00:55:50
classified into category 5
00:55:53
the validation life cycle is complex and
00:55:55
backup systems shown in this
00:55:57
slide of this figurative model in short
00:56:00
describe something during validation to material
00:56:02
systems can be highlighted as follows
00:56:03
stage planning and evaluation stage
00:56:06
supplier
00:56:08
stage requirements and specifications detailed
00:56:13
a risk assessment is required for this
00:56:14
system creation specifications
00:56:16
through the execution of process and
00:56:19
or functional risk analysis with
00:56:22
for the purpose of identifying those who
00:56:24
may affect the correct or
00:56:26
reliable operation of the system
00:56:28
process level and items respectively
00:56:31
functional risk assessment determines
00:56:34
regulatory compliance and
00:56:36
comparison risk severity
00:56:38
existing functional
00:56:39
system capabilities and supported
00:56:42
processes
00:56:43
the next step is
00:56:45
test reception to mother systems and
00:56:49
the last stage is commissioning
00:56:53
inspection process
00:56:54
production sites is carried out
00:56:56
documentation check connectivity
00:56:57
validation of collective systems for
00:57:00
subsequent slides
00:57:02
These types of plan documents are considered
00:57:05
were will give it
00:57:07
the strategic document confirms that
00:57:09
all electronic events are held
00:57:11
must in a manner using risk
00:57:13
nuclear approach document should
00:57:16
determine life how much validation and
00:57:18
volume indulged in by determining
00:57:20
system boundaries is also the result of an assessment
00:57:24
supplier must be considered together
00:57:26
with terms of use of documentation
00:57:28
provided by the supplier
00:57:30
in terms of isolation there should be
00:57:32
the list of created
00:57:35
documentation
00:57:36
distribution of responsibilities and
00:57:38
general eligibility criteria
00:57:40
revolutionary process
00:57:41
evolutionary plans must be
00:57:43
applications
00:57:45
the purpose of documents and rice is
00:57:48
determination of the purpose and functions of the system
00:57:51
including all basic requirements
00:57:53
functional specifications should
00:57:55
contain accurate and detailed descriptions
00:57:57
how the system satisfies
00:57:59
requirements for computer
00:58:02
system and external interface
00:58:04
this includes a description of the function
00:58:06
representation of wind restrictions
00:58:09
the document defines what should be done
00:58:12
what functions of the tools are allowed by the system?
00:58:15
the system itself, including a list of design
00:58:17
system goals
00:58:21
configuration specifications are created
00:58:23
to describe the list of components
00:58:25
hardware and software
00:58:28
scientists motivation topic
00:58:30
system parameters for example password length
00:58:33
which may affect one or
00:58:35
several gimpet functions
00:58:37
configuration specification defines
00:58:39
system configuration baseline
00:58:41
addressed by the component interface
00:58:43
software and
00:58:45
system parameters mainly
00:58:47
focusing on configuration items
00:58:49
which may affect the jeep
00:58:52
functionality
00:58:54
the project does not have the specifications required for
00:58:57
benefits of the skit components in order to
00:59:00
provide detailed technical
00:59:02
description of certification functionality
00:59:04
to explain how the system does something
00:59:06
what is defined by the highest specification
00:59:09
level
00:59:10
installation qualifications this also
00:59:13
called configuration there is this
00:59:15
activities regarding installation verification and
00:59:20
device program configuration
00:59:21
system components and related
00:59:24
documentation for installation qualification
00:59:26
it is necessary to take into account the conditions in which there will be
00:59:28
tests are carried out as a rule
00:59:30
special is highly recommended
00:59:32
testing during you should be
00:59:34
completed checks required
00:59:36
activities to give
00:59:38
documentary evidence that
00:59:40
testing and production always
00:59:41
And
00:59:42
qualifications of all connected
00:59:44
tools and equipment and
00:59:46
relevant infrastructure
00:59:47
are considered as
00:59:49
preconditions for this
00:59:50
installation qualifications
00:59:52
purpose of qualification of operation purpose
00:59:56
is to demonstrate
00:59:58
then the system and each of its functions
01:00:02
processes
01:00:03
identified as operating critically
01:00:05
according to specification a
01:00:07
testing should be based on
01:00:09
anticipation of fictions is functional
01:00:11
requirements specifications
01:00:13
users and so on and also
01:00:15
results of a detailed risk assessment for
01:00:17
type definitions in tests if the system
01:00:20
controls adjustable electronic
01:00:23
records and signatures protocol
01:00:25
operation qualifications must
01:00:26
contain such tests and
01:00:30
these tests should be aimed at
01:00:32
providing controls to ensure
01:00:34
coaxiality given
01:00:36
in addition, if testing a garden with a common
01:00:39
Regulatory requires features enabled
01:00:41
documented control implemented
01:00:43
supplier then at the qualification stage
01:00:46
functioning prognostic
01:00:48
the company must verify
01:00:50
these points are responsible for compliance
01:00:52
regulatory requirements for example
01:00:54
control environment protection and
01:00:58
this must be done in relation to
01:01:00
specific environment and intended
01:01:03
use every test
01:01:05
carried out using in advance
01:01:06
certain data and scenarios
01:01:08
the result obtained with deliver
01:01:11
expected derived from functional
01:01:13
specifications
01:01:16
peak operation qualification stage
01:01:19
or requirements verification oriented
01:01:22
to demonstrate that the system
01:01:23
works efficiently and reproducibly
01:01:25
suitable for intended use
01:01:28
and that both the system and the operating
01:01:31
environment including users ready
01:01:32
launch into production
01:01:34
dive operating qualifications must
01:01:37
be carried out primarily by those assigned
01:01:38
user representatives should
01:01:41
be focused on confirming that
01:01:43
that these are completed and correspond
01:01:46
a tet approved for any creation
01:01:48
analyzed and closed that everything
01:01:50
connected to the standard system
01:01:52
operating procedures manual
01:01:54
installation and administration and
01:01:56
user manual approved
01:01:58
are not available and that all users
01:02:01
who can access the system
01:02:02
trained that everyone has access
01:02:05
user was created in accordance with
01:02:07
his skills and responsibilities that
01:02:10
checking supported processes
01:02:11
system based on results
01:02:13
detailed risk assessment and what has been completed
01:02:16
backup and recovery
01:02:18
data in the work environment in electronic
01:02:21
report
01:02:22
collected and description of actions and
01:02:25
relevant documents for the purpose
01:02:27
demonstration of correct and complete
01:02:29
performing the validation process in
01:02:30
according to the plan will give in
01:02:32
aviation account provides analysis
01:02:34
data collected during the validation process
01:02:37
and document all the results
01:02:39
evolutionary activity including any
01:02:41
compliance and follow-up
01:02:44
approval of the registry variation report
01:02:47
for motivated systems there must be
01:02:48
updated to reflect confirmed
01:02:51
system status include link to you
01:02:54
worthy report is compiled matrix
01:02:56
traceability that verifies coverage
01:02:59
and the relationship between specifications and risks
01:03:02
related to the system and performed
01:03:04
testing activities
01:03:07
when operating canned systems
01:03:10
must be carried out to help or and
01:03:12
processes that support
01:03:14
preserved systems
01:03:15
doped state
01:03:18
The first such process is
01:03:20
security management is an event and
01:03:23
such activities must be carried out
01:03:26
throughout the entire life cycle
01:03:27
there is an automated system
01:03:30
physical security which
01:03:32
included for all relevant measures
01:03:33
precautions for
01:03:35
access and environment control
01:03:39
protection of computerized objects
01:03:41
systems about the theft of various destructions
01:03:43
uncontrolled change or
01:03:45
violations are logical safety
01:03:48
This
01:03:49
that security that includes those
01:03:52
precautions for protection
01:03:54
programs and data from
01:03:58
unauthorized access or
01:03:59
misuse or
01:04:01
data manipulation such as protection
01:04:04
anti-virus protection against external threats
01:04:08
user identification procedures
01:04:11
audit trail for created changed
01:04:13
or deleted data role
01:04:16
security must be implemented for
01:04:19
providing access to jumpy data only
01:04:22
pre-authorized operator
01:04:24
respectively corresponding roles in
01:04:25
companies
01:04:27
maintaining separation of duties
01:04:29
security management procedures
01:04:31
apply to all users
01:04:32
including super administrator
01:04:35
end user users
01:04:37
support staff including
01:04:39
employees already receive support from suppliers
01:04:44
the second process is agent management
01:04:47
this is the process this process is intended
01:04:50
to create a high level structure
01:04:54
support and detailed standard
01:04:56
operational procedures that give
01:04:58
recommendations for action scenarios
01:05:00
escalations and assessments and related
01:05:04
tools this process can
01:05:06
supported by software
01:05:09
change management is procedures
01:05:12
control
01:05:14
informing about changes in abilities
01:05:16
affect configuration items and
01:05:20
and lego doped status system
01:05:23
change management includes
01:05:24
change tracking
01:05:26
from their appearance to their implementation
01:05:29
backup is a process
01:05:31
copying data record and software
01:05:34
protection against loss
01:05:35
integrity and accessibility of the original
01:05:38
data recovery is the next step
01:05:40
record recovery
01:05:42
or software when
01:05:44
these procedures are necessary
01:05:46
necessary to ensure
01:05:49
system data recovery case
01:05:51
system failures and subsequent loss
01:05:54
data reliability recovery process
01:05:56
must be checked during validation
01:06:00
service level agreement should
01:06:03
be signed with the supplier and or
01:06:06
integrator gin pastis for medium or
01:06:08
high level attachment agreement
01:06:10
must provide adequate and
01:06:13
timely service in case of incident
01:06:15
this is also for the purpose of proper
01:06:17
secure storage of system documentation
01:06:20
which was created during development
01:06:22
and which is stored by the supplier
01:06:25
some activities for each
01:06:27
system support plan sits fishily
01:06:30
contains
01:06:31
the following information
01:06:34
These are alternative procedures in case
01:06:37
unforeseen circumstances
01:06:39
use instead of process steps
01:06:41
which includes access to diesel
01:06:43
systems management plans and methods
01:06:46
making decisions on which will
01:06:49
use during an emergency failure
01:06:51
computer identification systems are important
01:06:53
in terms of continuity
01:06:55
activities of documents that
01:06:57
must be temporarily stored until
01:06:58
restoration of combined
01:07:00
systems and
01:07:01
test procedure for boring
01:07:04
contingency requirements
01:07:06
to going concern Chinese
01:07:09
strictly given only for those
01:07:10
systems that
01:07:12
support critical
01:07:14
time process and that is, systems
01:07:15
which executes processes that are not
01:07:17
can be interrupted without potential
01:07:20
impact on patient safety and
01:07:22
product quality and integrity
01:07:24
data need to have a plan
01:07:26
ensuring business continuity
01:07:27
is determined in Linz, he plans for us
01:07:31
archiving is the process of archiving
01:07:33
and data recovery it should be
01:07:36
documented to undergo testing
01:07:37
during the life cycle
01:07:40
periodic review
01:07:42
periodicity depth of periodic
01:07:44
checks are determined based on analysis
01:07:46
risks associated with the system for
01:07:49
planning periodic inspections
01:07:50
personally included directly
01:07:53
electronic master plan periodically
01:07:56
reviews are carried out in accordance with
01:07:59
pre-established procedure
01:08:02
and training and procedures for use
01:08:05
systems
01:08:07
What is important here is that such procedures should
01:08:10
contain a section dedicated to special
01:08:12
manner with a strong action appropriate
01:08:13
each system such as
01:08:16
adding a change and deleting an entry
01:08:19
uploading or downloading data to workers
01:08:21
stations or remote collection device
01:08:23
system data check control
01:08:26
trace
01:08:27
curriculum and educational records must
01:08:30
be supported in order to
01:08:31
demonstrate to the inspector that
01:08:33
system
01:08:35
uses qualified and trained
01:08:38
staff
01:08:40
global systems validation process
01:08:43
validation of such systems may include
01:08:46
global validation package
01:08:48
priority oriented
01:08:49
ensuring functional reliability
01:08:51
systems, each site can officially
01:08:54
accept the result of global validation and
01:08:57
create local specification
01:09:00
testing documentation associated with
01:09:02
functionality of the site
01:09:04
there are those they have
01:09:06
the validation process must include bio
01:09:08
verification of processes performed
01:09:11
through the system for each individual
01:09:13
production site between
01:09:15
the service provider company must be
01:09:17
a technical agreement has been concluded or
01:09:19
agreement which
01:09:21
provides timely
01:09:23
access to data including metadata and
01:09:27
audit trails for data owners
01:09:30
the company itself and national
01:09:32
competent authority upon request
01:09:34
contracts with suppliers
01:09:36
determine responsibility for
01:09:37
archiving and continuous readability
01:09:40
data during the entire storage period
01:09:42
companies
01:09:44
up to the following types can be provided
01:09:47
services on the slide are presented
01:09:50
software as a service is
01:09:52
when pharmaceutical companies don't
01:09:54
manage and do not control the basic
01:09:56
structure or even individual capabilities
01:09:59
applications except for limited ones
01:10:01
custom configuration options
01:10:03
applications platform as a service is
01:10:07
when pharmaceutical companies don't
01:10:09
manages and does not control the basic
01:10:11
cloud infrastructure including network
01:10:13
operating servers for him or store but
01:10:16
still controls deployed
01:10:18
application and possible environment configurations
01:10:21
placement of proposals
01:10:23
infrastructure as a service is about it
01:10:25
mystical companies they run
01:10:27
basic cloud infrastructure but
01:10:29
has control over
01:10:31
operating systems
01:10:33
were stored in detailed sentences and
01:10:36
possibly limited control
01:10:38
selected network components
01:10:42
operation of the combined system
01:10:45
are in the area of ​​responsibility
01:10:46
companies therefore life cycle and
01:10:48
validation are linked the same way as before
01:10:50
reflected on the slides earlier in the number
01:10:53
other things must be checked and
01:10:55
confirmed
01:10:56
supplier assessment it should be
01:10:59
done on the spot and kind and up to
01:11:01
defining a validation strategy in terms of
01:11:03
cavitation evaluation method of the supplier should
01:11:06
be based on risk and related systems
01:11:09
validation plan takes into account the results of the stage
01:11:12
supplier assessments
01:11:14
validation documentation may
01:11:16
use specifications documentation
01:11:19
according to installation qualifications and
01:11:21
functioning fell which was
01:11:23
provided by the supplier
01:11:25
and if these documents are recognized on
01:11:27
keep when evaluating the supplier
01:11:29
sales performance agreement
01:11:31
service level must be checked
01:11:33
at the stage of testing but qualification
01:11:36
Beijing operation or acceptance tests
01:11:39
user are executed by the end
01:11:42
pharmaceutical company user
01:11:44
check that the system works according to
01:11:47
assignment to the user himself based on
01:11:49
rs requirements in all expected
01:11:52
operating ranges
01:11:54
there should be an audit of these security
01:11:57
focused on at least the following
01:12:00
aspects of how the supplier notifies
01:12:02
regulated company about problems
01:12:05
that affect data integrity
01:12:07
security authorization requirements
01:12:10
separation of duties process
01:12:13
change management for improvement
01:12:14
update fixes
01:12:17
control storage requirements
01:12:19
audit trails and event log
01:12:21
access control mechanism mechanism
01:12:24
identification and authentication
01:12:26
encryption mechanism
01:12:29
and fictions about structures even if
01:12:30
infrastructure is managed by a third
01:12:32
party and specification validation package
01:12:35
testing protocol
01:12:37
most often the group of auditors is included
01:12:41
to an employee at a production site with
01:12:42
relevant knowledge and
01:12:44
competencies in these areas
01:12:48
areas on and applications considered
01:12:50
only as per the relevant categories
01:12:53
four or five about classifications yes with
01:12:57
pharmaceutical company point of view
01:12:59
cloud application configuration should
01:13:01
considered category 4 at the same time
01:13:03
any custom development
01:13:05
interfaces or data transfers are affected
01:13:07
on Jim and associated with the cloud
01:13:10
applications should be considered as
01:13:11
corresponding to category 5 and should
01:13:14
be tested accordingly
01:13:18
spreadsheet validation each
01:13:21
spreadsheet
01:13:23
considered as singles
01:13:25
canned systems and therefore
01:13:27
critical spreadsheets are subject to
01:13:30
inventory risk assessment and validation
01:13:33
Accordingly, there are three categories
01:13:36
tables purpose this category 3
01:13:40
not configuring this is electronic
01:13:43
tables are simply used
01:13:45
functions without configuration e.g. data
01:13:48
conditional formatting validation
01:13:51
category 4 configuration is
01:13:55
spreadsheet performs calculations
01:13:57
using customized formula formulas
01:14:01
use basic zyxel for example
01:14:03
addition subtraction division and category 5
01:14:06
this is custom this is electronic
01:14:09
table use custom
01:14:11
macros for complex or stacked
01:14:14
logical similar functions
01:14:17
Many laboratories use
01:14:19
calculations customize spreadsheet
01:14:22
to avoid possible data leaks
01:14:24
must be checked to ensure that
01:14:27
spreadsheet for him
01:14:29
intended use
01:14:31
this template will be on protect limited
01:14:34
permissions to change the template and
01:14:36
removal until usually
01:14:38
validation customizing spreadsheets
01:14:40
provides for checking the form which
01:14:43
entered into a spreadsheet by
01:14:45
fixes with accurate calculations
01:14:47
testing boundaries and related
01:14:49
functions
01:14:51
minimal means of control that
01:14:53
must be installed for custom
01:14:56
spreadsheets and which should be
01:14:58
standard operating procedures are prescribed
01:14:59
procedures are
01:15:02
encryption with password protection
01:15:05
limit editing by click
01:15:08
set to read-only so that
01:15:10
this was stored in that blog
01:15:12
saving spreadsheets to
01:15:14
specified location on the server
01:15:16
periodic password changes and revolution
01:15:18
in accordance with standard specifications
01:15:20
procedures
01:15:22
what problems can there be with
01:15:24
using spreadsheets
01:15:25
for example a spreadsheet on it
01:15:28
leading
01:15:29
or pour accidental or intentional
01:15:32
changes in forms
01:15:35
entered by unsecured electronic
01:15:37
tables
01:15:38
here are other control results
01:15:41
corresponding place not corresponding
01:15:43
in a sophisticated spreadsheet
01:15:46
lack of access controls
01:15:49
spreadsheets where lack
01:15:50
personnel training on use
01:15:52
passwords
01:15:54
the following slides will discuss
01:15:57
Zarinsky's main requirement
01:15:59
applications with themes 7 solutions
01:16:02
systems must be designed for
01:16:05
correct data collection obtained from
01:16:08
using manual or automated
01:16:11
manual entry facilities
01:16:13
this should only be carried out
01:16:17
authorized persons, the system must
01:16:19
record progress and face data
01:16:23
creating a record on and time to oblige
01:16:26
has been done data must be entered
01:16:29
on the provided format which
01:16:31
controlled by software
01:16:34
the validation event should
01:16:35
confirm that they are valid and
01:16:37
data formats they accept these walls
01:16:40
All data entered manually must be
01:16:42
verified either by a second operator or
01:16:44
were green computer tools
01:16:46
in that case and if
01:16:49
they may affect product quality
01:16:51
or patient safety
01:16:54
changes in records including reasons for it
01:16:58
register as a control
01:17:00
trace and
01:17:02
checked by the appropriate authorized
01:17:04
and an independent person in accordance with
01:17:07
risks to product quality and
01:17:08
patient safety for
01:17:09
automated data collection
01:17:11
interface between source system
01:17:14
data collection and recording systems
01:17:16
you must be in the lead to ensure
01:17:18
accuracy of data on data received
01:17:21
systems must be stored in memory
01:17:23
format that is not subject to
01:17:25
manipulation and loss or change
01:17:28
the system software must
01:17:31
include in alloy checks for
01:17:33
ensuring the completeness of the received data and
01:17:35
also any methods related to data
01:17:37
all necessary data changes must
01:17:40
authorize and delete accordingly
01:17:43
approved procedures, for example manual
01:17:46
cropping and reprocessing
01:17:48
laboratory test results
01:17:49
must be carried out by an approved and
01:17:52
in a controlled manner
01:17:53
quality service company must
01:17:56
take measures to ensure and introduce
01:18:00
data changes only in case
01:18:01
necessary and only designated
01:18:03
persons
01:18:04
This slide presents the requirements
01:18:07
To
01:18:10
here you are from the city
01:18:12
this is considered strength control
01:18:15
which says that for
01:18:17
critical data, we enter it manually
01:18:19
additional consideration should be given
01:18:21
control of data entry accuracy
01:18:24
control should be carried out on
01:18:26
atr market or using its alloyed
01:18:28
electronic means and paragraph 10
01:18:31
configuration change management
01:18:34
which states that any changes in
01:18:36
nervous system including configuration
01:18:38
systems should only be carried out
01:18:40
in a controlled manner and in accordance
01:18:43
with established procedure
01:18:47
access to the system for controls
01:18:51
user access both physically and
01:18:53
so electronic they should be
01:18:55
configured and used for
01:18:59
crouched unauthorized access
01:19:01
change not and delete data for everyone
01:19:05
employees need access and
01:19:07
use specific on electronic
01:19:09
systems are established by Christ his
01:19:11
individual logins and shared passwords
01:19:14
Login credentials do not allow
01:19:17
track the person who performed it
01:19:18
actions for this reason general passwords
01:19:20
should be completely banned
01:19:23
beam and there is a system they turn on for
01:19:26
access control functions using an example for
01:19:28
it does not require a password or if it should
01:19:31
use shared accounts
01:19:34
or valences must be realized
01:19:36
control measures which may include
01:19:38
for example, we fill out a paper journal
01:19:41
transparent ensures traceability
01:19:43
access to the system or third party
01:19:45
the software allows
01:19:47
provide the system only
01:19:49
pre-authorized by the emperor
01:19:52
suitability of such alternative note
01:19:56
must be justified and
01:19:57
documented
01:19:59
user authorization
01:20:01
should be fully used
01:20:04
access control mechanisms for
01:20:06
ensuring that it is difficult to have
01:20:08
access only to the relevant
01:20:10
official role and so that action
01:20:12
treated tankred
01:20:14
the company must be able
01:20:16
demonstrate access level
01:20:18
provided to individual employees and
01:20:20
ensured after all retrospective
01:20:22
information about access levels
01:20:23
users
01:20:25
access control should be applied as
01:20:28
when leaving the operating system even
01:20:30
at the application level to the individual
01:20:32
taste of the system at the operating level
01:20:34
systems may not require driving
01:20:37
appropriate controls for
01:20:39
ensuring data integrity
01:20:42
computer administrator access
01:20:44
systems
01:20:45
used to launch the application
01:20:47
must be controlled by normal
01:20:49
users should not have access via
01:20:51
critical aspect of software
01:20:53
software for example to system
01:20:55
time for file deletion functions and so on
01:20:57
Further
01:20:58
system administrator right
01:21:02
allowing actions such as deletion
01:21:04
database change data or
01:21:07
changes to the system configuration should not be
01:21:09
be assigned to you directly
01:21:11
interested in data, that is, those who
01:21:13
creates this test she approves with whom
01:21:17
Users must authorize
01:21:18
ensure separation of duties
01:21:22
backup backup process
01:21:24
data backup and recovery
01:21:27
must be documented using
01:21:29
procedures are not determined exactly
01:21:31
backup steps
01:21:33
restoration that should
01:21:34
be carried out if necessary
01:21:36
backup process and
01:21:38
recovery must be
01:21:40
tested for
01:21:42
provision
01:21:44
full recovery possibilities
01:21:46
data and metadata failure case by all
01:21:49
a mechanism must be created
01:21:52
backup for current
01:21:54
upcoming corruption process
01:21:56
backup and recovery file
01:21:58
must be documented with us
01:22:01
for example, using the procedure there should be
01:22:03
should take the lead
01:22:05
periodic checking is recommended
01:22:07
so that a regular backup, for example
01:22:10
media on which copies are stored
01:22:12
data were born in a remote place
01:22:15
physically separate in case of emergency
01:22:19
situations
01:22:22
data transfer check transfer then
01:22:27
the data transfer itself is
01:22:29
transfer process and method of income
01:22:32
between media types or
01:22:34
convert at the same time
01:22:36
data transfer may be necessary
01:22:38
change the data format to
01:22:41
make them usable
01:22:42
or visible to native Voltaire
01:22:44
computer system transfer procedures
01:22:46
data must contain appropriate
01:22:49
rationale and you are carefully designed
01:22:51
and tested to ensure integrity
01:22:52
data over the course of life many cycles and
01:22:56
on this slide
01:22:58
you see
01:23:00
data security requirements is a point
01:23:03
5 data with the data storage in which
01:23:09
point m2 which says happy
01:23:12
perform regular backup
01:23:13
copying all necessary data for
01:23:17
maintaining the accuracy of backup copies
01:23:20
also the possibility of data recovery
01:23:21
must be checked during the process
01:23:23
validation is periodically monitored
01:23:25
And
01:23:27
on this slide we see 12 I won't
01:23:33
read the points here regret
01:23:36
means of ensuring
01:23:40
protection
01:23:41
yes and
01:23:44
on this slide you see
01:23:48
Issue 15 of the series which says that
01:23:51
from for registration procedure
01:23:54
series release approval used
01:23:56
the system is politicized it should
01:23:58
provide access to release the series
01:24:00
only to an authorized person and
01:24:02
must clearly identify and
01:24:03
register an employee who
01:24:05
approved and exported the series for sale
01:24:08
actions must be carried out with
01:24:10
using
01:24:11
electronic signature
01:24:13
as I already said access control to
01:24:17
electronic system is necessary for
01:24:18
prevent potential problems
01:24:20
related to data integrity for
01:24:23
systems to protect to high criticality
01:24:26
for each individual user
01:24:27
means must be provided
01:24:29
unique identification and
01:24:31
authentication
01:24:33
others should also be available
01:24:35
functions such as mandatory shift
01:24:36
password after a certain number
01:24:39
days
01:24:40
bloggers account after
01:24:42
a certain number of unsuccessful
01:24:44
repeated password attempts
01:24:46
use of previously used
01:24:48
password should only be allowed
01:24:50
after a certain number of cycles
01:24:53
annual account review
01:24:55
users for systems that store data from an average
01:24:58
degree of criticality
01:24:59
measures can be of the same many types
01:25:02
strict for low critical system
01:25:04
access control can be much
01:25:05
less strict for these types of systems
01:25:08
a password or group password is acceptable
01:25:12
cut however must be
01:25:14
controls are provided to
01:25:16
ensure separation of duties
01:25:17
between user levels for example
01:25:20
administrator engineer and operator password
01:25:24
or group account should
01:25:25
change after a certain period
01:25:27
time and frequency with which should
01:25:29
perform certain actions
01:25:30
which
01:25:32
I said
01:25:34
must be determined based on
01:25:36
risk assessments to ensure that
01:25:38
frequency of action of mirri maz
01:25:39
demonstrated risks, this assessment should
01:25:41
take into account the overall system architecture
01:25:44
interface between systems criticality
01:25:47
access by unauthorized persons and the possibility
01:25:49
network security violations
01:25:52
regarding backup
01:25:54
electronic data were identified two
01:25:56
different scenarios which are acceptable
01:25:59
distinguish between the control measures applied in
01:26:02
depending on criticality first
01:26:04
script for clean execution
01:26:07
production backup
01:26:08
data stored electronically
01:26:10
companies should consider
01:26:12
possibility of development
01:26:14
principles-based strategies
01:26:16
backup to
01:26:18
differentiate periodicity
01:26:19
backup this strategy
01:26:22
must take into account the company's tolerance for
01:26:25
risk including the mouth
01:26:27
how can I recreate it in production?
01:26:29
activities in case of system failure when
01:26:32
backup failed
01:26:34
data if single and foliage
01:26:37
activities that affect
01:26:38
the safety or quality of the product is
01:26:42
lost data this company should
01:26:44
be prepared to reject the series and may
01:26:47
require more frequent backup
01:26:49
copying from the other side from the main
01:26:51
if you can create it with the help of others
01:26:53
means, for example, a fingerprint is recorded in
01:26:55
manual information it may be
01:26:57
used to justify less than 5
01:27:00
electronic backup
01:27:01
data if the equipment supports
01:27:04
automatic backup
01:27:05
It is recommended to make a backup
01:27:08
with the same frequency as
01:27:10
data is created
01:27:13
if new data is created daily and
01:27:15
require daily backups
01:27:18
in addition, the volume should also be taken into account
01:27:21
data generated within a given period
01:27:24
time period and ability
01:27:25
electronic systems they have a volume of data
01:27:27
without overwriting existing data
01:27:30
the second scenario is associated with cyclical
01:27:33
memory upon reaching capacity limit
01:27:35
new data automatically
01:27:37
re-record old ones for example long time ago
01:27:40
don't wait for him capable they are 10 packs
01:27:42
data given for package 11
01:27:45
automatically overwrite this
01:27:46
package number one for storage systems
01:27:49
especially important data backup
01:27:51
must occur before the data
01:27:53
will be overwritten
01:27:55
a similar expectation should be in
01:27:57
regarding the system storing data
01:27:59
medium criticality system should
01:28:02
provide automatic recording
01:28:03
audit trail
01:28:05
which is a form
01:28:07
metadata
01:28:08
containing information related to
01:28:10
actions related to creatures
01:28:12
changes and deletions settled
01:28:15
electronic records
01:28:16
control environment notes must have
01:28:19
the form and content are clear and they don’t believe it yet
01:28:21
the following information
01:28:22
name of person external change to data on
01:28:27
description of time change date
01:28:30
changes reason for change in item
01:28:34
audit trail must be maintained at all times
01:28:36
enabled and access to it is blocked as
01:28:39
and other functionality
01:28:40
aimed at ensuring integrity
01:28:42
data to control should
01:28:44
verify during system validation
01:28:46
the system should be based on
01:28:48
properly controls
01:28:50
synchronized time for
01:28:52
registration of events in order to ensure
01:28:54
reconstruction possibilities and
01:28:56
traceability a bunch of information hourly
01:28:59
the zone in which this data is used
01:29:01
if there are several remote sites
01:29:04
operator does not return to change
01:29:06
time or panel train case
01:29:10
lack of automatic
01:29:11
snake trace
01:29:14
Jim with critical data as
01:29:16
example, temporary measures will be
01:29:19
papers and notes were used but when
01:29:22
as long as the system is functioning
01:29:24
audit trail and will not become available
01:29:26
according to where the audit trail
01:29:29
related to regulates donut throne
01:29:31
are subject to external audit
01:29:33
authorized user for the purpose
01:29:35
checking for correct execution
01:29:37
operations and making any changes
01:29:39
modifications deletion or when writing these
01:29:43
changes in source information in
01:29:46
electronic dreams in those changes should
01:29:49
be duly authorized
01:29:50
check are related to control data
01:29:53
traces should be part of the routine
01:29:55
data verification approval process
01:29:58
frequency of functions and responsibilities for
01:30:01
audit trail testing should
01:30:03
be based on risk assessment
01:30:06
compliance and data recorded
01:30:08
the topic should be motivated
01:30:10
a procedure has been developed that
01:30:13
describes how to check
01:30:15
control environment
01:30:17
This slide presents the requirements
01:30:20
traceability of relationship data
01:30:22
audit trail that says that
01:30:25
control from the environment should
01:30:27
available to be able to
01:30:29
transformations are clear to users
01:30:31
forms and
01:30:33
be checked regularly
01:30:36
electronic audit trail for can
01:30:38
include several
01:30:40
sources
01:30:42
related to equipment on
01:30:45
production, that is, information can
01:30:46
stored files are called antennas than
01:30:50
audit trail for example log what
01:30:52
you and the system alarm log
01:30:54
log file is worth the trend and tet them
01:30:58
understanding where it is recorded
01:30:59
information in the system at the same level
01:31:01
operating system is still at the level
01:31:02
applications is important for data protection and
01:31:05
understanding where to become in the system
01:31:07
information when performing a check
01:31:09
audit trail and the person performing
01:31:12
audit trail must be checked
01:31:14
be independent and technically capable
01:31:16
understand
01:31:17
the audit trail is not recorded by this person
01:31:20
must take part in the creation or
01:31:22
checking checking in dana
01:31:24
audit trail review assessment is
01:31:28
risk-based tool
01:31:30
which can help determine which
01:31:32
audit trail elements should be
01:31:34
check how often
01:31:35
the tool can be used for
01:31:38
any system having electronic
01:31:40
control log and this assessment
01:31:42
focus on change detection
01:31:44
given and criticality to the point of view
01:31:48
patient safety or quality
01:31:49
products as well as the likelihood or
01:31:52
possibility of changing data for
01:31:54
assessment, it is necessary to gather between
01:31:56
functional group in the team should
01:31:58
enter people who fully understand
01:32:01
technical capabilities and system
01:32:03
understand how it works from the point of view
01:32:06
user management where they are stored
01:32:09
data what type of data is part of
01:32:12
audit trails command also
01:32:15
should include users familiar with
01:32:17
operation of the system is the first step in the process
01:32:20
the score is the score of each of the three
01:32:23
factors presented on the slide
01:32:25
we discover the signs of seriousness and
01:32:28
probabilities that may require
01:32:30
checking based on system stuff
01:32:32
controls for each element
01:32:34
in the audit trail for each
01:32:37
factor, a lower score means
01:32:39
less risk, for example, assessments that
01:32:42
can be used are shown on the slide
01:32:45
although each company can change
01:32:47
assessment based on your own
01:32:48
analysis for indicators we find
01:32:50
together based on probability
01:32:52
change or deletion detection
01:32:54
data has two possible values
01:32:56
detected units or 0 if
01:33:00
it is possible to detect any changes
01:33:02
or deleting data to contain in
01:33:04
audit trail and this data is what
01:33:06
tested as part of existing
01:33:08
checks according to requirements
01:33:10
stops are the execution of additional
01:33:12
audit trail checks for
01:33:14
detection of potential integrity
01:33:16
data
01:33:18
not required, for example, if the report
01:33:21
production series listed
01:33:23
critical parameters are used in
01:33:25
production time and any snakes shown
01:33:27
entered into these parameters during
01:33:29
series production
01:33:31
audit trail review that is later
01:33:34
no information needed
01:33:36
suppose the report is created
01:33:38
automatically on the equipment cannot
01:33:39
be changed
01:33:41
put at20 if you add days were
01:33:44
have been verified or have only been verified
01:33:46
some further may be required
01:33:48
audit trail estimates then
01:33:49
rating remains 1 severity rating
01:33:52
based
01:33:53
she always evaluates critically
01:33:56
potential impact of a change or
01:33:58
data deletion exists exists
01:34:01
three possible values ​​of the degree
01:34:02
severity 10 4 or days place if
01:34:06
data is considered very important or has
01:34:08
direct impact on patient safety
01:34:10
or product quality for example
01:34:13
temperature change
01:34:16
being outside the permissible limits
01:34:18
range
01:34:19
then the potential impact has
01:34:21
high severity
01:34:22
the action is rated if it’s been a while
01:34:25
has an indirect impact on safety
01:34:26
patients or product quality, that is
01:34:29
changes to data that are only related
01:34:31
with the risk of compliance with indirect
01:34:34
influence only on the quality of the product or
01:34:36
patient safety
01:34:39
this is a special average potential
01:34:42
severity level
01:34:44
score 4 if the data is significant
01:34:47
influence or and influence safety
01:34:48
patient or product quality
01:34:52
they have a low potential for seriousness
01:34:55
then the score is 1 rating
01:34:58
probability it is based on possibility
01:35:01
changing or deleting data
01:35:03
users and system operators
01:35:05
there are three possible meanings
01:35:07
probabilities
01:35:09
10th or units if the data can be
01:35:12
changed or deleted user
01:35:14
user applies to anyone in the forest world
01:35:18
fixed as independent
01:35:20
registrar then estimate 10 months if data
01:35:23
cannot be changed or deleted
01:35:27
user may be changed or
01:35:29
deleted by an independent administrator then
01:35:31
there is a face they have direct interest
01:35:33
yes then
01:35:35
the assessment was given
01:35:37
if the data cannot be changed or
01:35:42
deleted by more than one user or
01:35:44
the administrator considers this very
01:35:45
low probability he is trying score 1
01:35:50
after that then threaten'd and
01:35:52
discover the severity and likelihood
01:35:54
multiply to get the final
01:35:56
ratings, the lower the rating, the lower the risk in
01:35:59
The table shows how to use
01:36:00
final grade to reduce
01:36:02
required frequency of inspection
01:36:04
audit trails when used
01:36:06
risk-based approach
01:36:09
the frequency of inspections should be
01:36:11
measurable with identified system risks
01:36:13
and and apply if during
01:36:15
periodic checks detect
01:36:17
a number of friends disagree on the matter and
01:36:20
controls or frequency
01:36:23
checks should be re-evaluated to
01:36:25
stop violating the future or quickly
01:36:28
or detects a violation faster
01:36:32
practical examples of shades
01:36:35
maybe if we, for example, are with you
01:36:38
consider
01:36:40
we can consider three different types
01:36:42
data
01:36:44
electronic audit trail which
01:36:48
which registers given
01:36:51
during the production of the rs series he drug
01:36:54
for example, the audit trail may be
01:36:56
such data related to settings
01:37:00
series such as the recipe used and
01:37:04
set value or time
01:37:06
planned for certain
01:37:08
operations during batch production
01:37:11
throne magazine may not include information about
01:37:13
series that represent data
01:37:15
production process for example
01:37:16
temperature operation duration
01:37:19
then the action was performed and the log be
01:37:23
system configuration data included
01:37:25
which are not data related
01:37:28
to the series are data associated with
01:37:31
system configurations such as information
01:37:33
about the user account
01:37:35
but provided by the user
01:37:38
privileges where data is stored
01:37:40
the audit log contains all this data and
01:37:43
each of these parts which log
01:37:45
has a number of elements that can be
01:37:47
considered during inspection
01:37:49
consistent assessment tool
01:37:50
should be used for everyone
01:37:52
separate element to define
01:37:54
final assessment
01:37:56
data verifiability requirements
01:37:59
electronic copy the system should
01:38:02
allow you to create accurate and complete
01:38:04
copies of the recording as we read in the ice in
01:38:07
electronic form suitable for verification
01:38:09
for grades and first place sides
01:38:13
inspectors
01:38:14
data archiving should be done periodically
01:38:16
archive in accordance with written
01:38:19
backup archival procedures
01:38:21
copies of data should be stored in different
01:38:23
data must be accessible and
01:38:26
readable and their stealth should
01:38:28
be supported throughout
01:38:31
period surgery should be
01:38:33
recovery procedure provided
01:38:34
archived data is better than necessary
01:38:36
conducting an investigation
01:38:38
recovery procedure for archived data
01:38:40
should be checked regularly
01:38:42
removal must be worked out
01:38:44
procedures describing the removal process
01:38:47
electronically stored data
01:38:49
these procedures must contain
01:38:51
guidelines for assessing data and their
01:38:54
during the storage period and
01:38:56
describes the order
01:38:57
they are data that is no longer required
01:38:59
This slide presents the requirements
01:39:02
verifiability from requirements data
01:39:04
printout for working with printouts and
01:39:08
archiving
01:39:11
to confirm suitability and control
01:39:16
regarding signed entries should
01:39:18
carry out proper validation is related to
01:39:20
topic signature processes case preparation
01:39:23
paper or pdf copies of the document with
01:39:26
metadata is associated with an electronic signature
01:39:29
with an electronic signature must be preserved
01:39:30
per month of relevant documents
01:39:32
electronic signature or systems
01:39:35
electronic signature must
01:39:36
provide for the manifestation that is
01:39:38
display
01:39:39
within the visible record of the one who
01:39:41
signed the position to sign what
01:39:44
where possible date and time if it is
01:39:47
necessity means we and also
01:39:50
value of signatures for example verified
01:39:52
inserted image approved
01:39:54
signatures or footnote indicating that
01:39:57
the document was signed electronically
01:39:59
form and if it was visible in a way
01:40:01
excellent aque doped process
01:40:03
electronic signatures are
01:40:04
insufficient if the document is signed in
01:40:08
electronic form
01:40:09
who the metadata associated with the signature should
01:40:11
be stored in
01:40:12
This slide presents the requirements in
01:40:16
respect
01:40:18
whose electronic signature says
01:40:21
that electronic signatures must
01:40:24
within the enterprise has the same
01:40:25
meaning as a handwritten signature be
01:40:28
inextricably linked with the corresponding
01:40:30
records include the time and date when they
01:40:33
were delivered
01:40:36
basic principles for ensuring
01:40:39
alignment of these laboratories on how
01:40:42
previously discussed data can and
01:40:44
static
01:40:45
that is, devices
01:40:49
laboratories can take
01:40:53
paper printout or static
01:40:57
images during data collection in
01:40:58
as the original recording and if we
01:41:01
talking about dynamic data here
01:41:03
the device on the printout cannot convey
01:41:06
the nature of the data is only part
01:41:07
original recording
01:41:09
companies must justify their choice of entry
01:41:11
paper electrons depending on
01:41:13
static and dynamic data in
01:41:15
in case of dynamic data is required
01:41:17
enter the original electronic record
01:41:20
records include original data with those
01:41:22
this data must be recorded
01:41:23
simultaneously with step a or event for
01:41:25
xp regardless of whether
01:41:27
process and data manual paper or
01:41:30
automatic electrons at
01:41:32
conducting microbiological tests
01:41:35
visual graphic data after
01:41:37
established incubation times
01:41:39
must be observed
01:41:42
extracted from materials such as
01:41:45
petri dish contact plates and
01:41:47
recorded either manually on paper
01:41:50
document or into a digital system without
01:41:52
Various changes or distortions
01:41:54
psychological factors can cause
01:41:57
or put pressure on a person in
01:41:59
as a result of which a person may behave
01:42:01
inappropriately or to allow
01:42:03
careless mistakes
01:42:05
every company should have
01:42:07
related controls and
01:42:09
system that will allow you to easily
01:42:11
detect by seeing and pattern and which
01:42:14
does not meet the expected norm and may
01:42:17
affect the quality of the product
01:42:18
products
01:42:20
let's talk about data integrity in
01:42:23
microbiological laboratory
01:42:25
approaches used for investigation
01:42:28
problems related to data integrity
01:42:30
which originated from microbiological
01:42:32
laboratories can be problematic in
01:42:34
in some cases they can be very
01:42:36
different from those used
01:42:38
to assess similar incidents in
01:42:40
chemistry laboratories many
01:42:42
microbiological methods are performed
01:42:44
manually and subsequently accurate results
01:42:47
are common based on visual
01:42:49
observations of an individual specialist
01:42:51
perform a protest on the slide
01:42:53
examples provided do not correspond
01:42:56
related to data accuracy
01:42:58
microbiological duck is a practice
01:43:00
foreign regulatory authorities
01:43:05
let's look at each example
01:43:09
microbiological results
01:43:11
monitoring the production side of the environment
01:43:12
were unreliable here we are talking about
01:43:15
that the results found
01:43:17
microbiological monitoring during
01:43:19
inspection
01:43:21
that is, 1 to 3 on a petri dish after
01:43:25
counting microorganisms and
01:43:30
the results were inconsistent
01:43:33
the results that were reflected in
01:43:36
electronic monitoring report
01:43:38
it would be a stretch to kill thrush organisms and
01:43:40
Cairo was discovered but in the reports there were
01:43:43
have you written down the value
01:43:46
in this example at the production site
01:43:50
the site was not provided
01:43:51
carrying out
01:43:53
investigations upon receipt
01:43:54
unsatisfactory results with
01:43:56
conducting testing of intermediate
01:43:58
products according to the indicator moved the approach
01:44:01
the enterprise provided for carrying out
01:44:03
investigation of the case of receipt do not tell
01:44:06
this result obtained repeatedly
01:44:09
that is, on more than one loss
01:44:11
intermediate products
01:44:14
the following example company used
01:44:17
used the services of 2 9 points gical
01:44:19
laboratories and
01:44:21
periodic checklist somewhere
01:44:23
third party laboratory was filled
01:44:25
employees of a third-party laboratory and not
01:44:27
was born by company employees
01:44:29
in the following example the entry was found
01:44:32
all his personal unofficial note
01:44:33
microbiology book entries
01:44:36
testified to the discovery
01:44:38
pathogenic microorganism in water for
01:44:39
mental application she herself records
01:44:42
this information was missing
01:44:45
in the following example were found
01:44:48
materials about erase what and what
01:44:50
All that's left is just a nutrient medium
01:44:52
used for
01:44:54
conducting a media phil test
01:44:57
there was information missing from the records
01:44:59
that the growth properties of nutritional
01:45:01
Wednesdays were confirmed
01:45:03
This slide presents ongoing
01:45:06
microbiological laboratory operation
01:45:08
when carrying out these operations one way or another
01:45:11
otherwise problems may arise with
01:45:12
data plane for the most part
01:45:15
which are related to the specifics of work on
01:45:17
I wanted to go to the biological laboratory
01:45:19
I would like to highlight here two groups related to
01:45:22
equipment that is used for
01:45:24
microbiological laboratory work and
01:45:26
discuss various equipment and
01:45:29
measuring
01:45:30
used microbiological
01:45:31
laboratories can become a source
01:45:33
problems associated with accuracy
01:45:35
for example, improper operation
01:45:38
equipment or durable calibration
01:45:40
may lead to unreliable
01:45:42
results if handled incorrectly
01:45:44
various equipment and tools
01:45:47
use of microbiological
01:45:48
laboratories, for example, water incubators
01:45:51
bathhouse crying meter and devices for
01:45:54
production environment monitoring
01:45:56
temperature control systems microscopes
01:45:58
may become a source of problems associated
01:46:01
it was worth here what could be an example
01:46:04
connect the appropriate ones
01:46:06
equipment and
01:46:07
potential receipt corresponds
01:46:09
Always
01:46:10
for example during
01:46:13
inspections or audits including
01:46:15
himself and inspections for example can be
01:46:18
checked for electronic data that
01:46:20
were determined by automated
01:46:21
microorganism identification system
01:46:24
regular files store information in
01:46:26
all isolates that were Ravana spokes
01:46:29
electronic data can be
01:46:31
compared with the data that is attached
01:46:33
to up to 7 on the drug stereo
01:46:35
or contributed paths to the backup system
01:46:39
backup system used in
01:46:41
laboratories, discrepancies in data may
01:46:43
cause non-conformity or
01:46:45
for example, an operation log
01:46:48
equipment include repair records
01:46:50
calibration of equipment during alcohol
01:46:53
data can be compared
01:46:55
from such magazines with actual
01:46:57
using
01:46:58
equipment that can be traced
01:47:01
test reports, but it might work out
01:47:03
so it was exploited in fear
01:47:05
uncalibrated equipment then this
01:47:07
may cause a violation
01:47:08
data integrity since the result
01:47:10
tests may not be delivered
01:47:14
the following example is related to
01:47:19
clogging of samplers over time
01:47:23
and the holes of the sampler which
01:47:25
is used for
01:47:26
aspiration sampling
01:47:29
gets clogged, which significantly impedes
01:47:32
filling the air volume
01:47:34
so that this air gets to the surface
01:47:37
then despite the fact that
01:47:39
communication technical malfunction
01:47:41
maintenance or operation
01:47:43
equipment this directly affects
01:47:44
for data integrity
01:47:47
microbiological
01:47:51
physical-chemical data integrity
01:47:53
laboratories
01:47:54
physico-chemical cureit is blocked
01:47:57
hybrid system is technical
01:48:00
equipment
01:48:01
the use of which depends on the rewards
01:48:04
electronic and paper hybrid
01:48:07
systems can be simple and systems
01:48:10
capable of storing system test data
01:48:12
this is an analytical balance, our meter and
01:48:15
systems are capable of storing data this
01:48:17
titrators
01:48:19
equipped for dissolving and so on
01:48:21
and if the devices are connected to a computer and
01:48:23
is there any software
01:48:25
then this is already laboratory optimized
01:48:28
system risks associated with thick data
01:48:31
when working with hybrid systems can
01:48:34
be such a lack of traceability
01:48:38
for all received data absence
01:48:40
no passwords, no audit trail
01:48:43
or deactivating it vulnerability dates and
01:48:46
time for manual change
01:48:49
is not enough and recovery is backup
01:48:51
copying or single failure for example
01:48:53
with hard drive no funds
01:48:56
control preservation of original electronic
01:48:59
data and data that is complete
01:49:00
and regarding meta-data that can
01:49:03
be associated with access to the computer itself
01:49:05
basket or file lack of verification
01:49:08
the second person of what is printed
01:49:10
the document is an exact copy
01:49:12
original data or effective
01:49:14
fruitless electronic data report
01:49:16
including all metadata result
01:49:20
canned systems are devices
01:49:23
which are connected by a computer to collect
01:49:25
analysis and data storage typical
01:49:27
examples are equipment for
01:49:29
your g
01:49:33
systems include hardware and
01:49:35
sleep platform software
01:49:38
as well as management
01:49:40
standard operating procedures and
01:49:43
ordinary analysts are shown in the picture
01:49:46
typical data flow when conducting
01:49:48
chromatographic methods of analysis and
01:49:52
data management are included for
01:49:55
creating processing reporting
01:49:57
archiving before
01:49:59
creation up
01:50:01
criteria or characteristics that
01:50:04
define the file yes this is the name of the analyst
01:50:08
name of the drug
01:50:13
sample description date and time of printing
01:50:18
method parameters flow wavelength
01:50:20
directorate volume recording time
01:50:22
chromatograms
01:50:23
sequential information about
01:50:25
controls recommended for
01:50:28
logging events in a log somewhere
01:50:30
this is the number name introduction
01:50:32
analyst name
01:50:35
medicinal product
01:50:37
reasons for change
01:50:38
descriptions of the lek there for testing are not a review
01:50:42
or permission of 2 analysts before
01:50:44
performing the following test behavior
01:50:46
data processing and peak requirements
01:50:49
the quality service must determine
01:50:51
standard protocols for processing
01:50:53
data depends on the device or application
01:50:58
must be determined again
01:51:00
peak processing application tool
01:51:03
specific applications by integrating
01:51:05
event algorithm
01:51:06
full integration of peaks banning or
01:51:10
requirements of any games for test lameness
01:51:13
gram without scientific basis
01:51:15
application of one and the same
01:51:18
integration for everyone about a set of samples
01:51:20
and for the sequence rim base
01:51:21
any changes to the integration
01:51:23
printed on the programs must be
01:51:25
visibility scale is presented according to
01:51:28
corresponding analysis there is the top and
01:51:30
the base of the peak is clearly visible for analysis
01:51:32
after integration the results can
01:51:35
be saved electronically
01:51:37
results printed or published are not
01:51:41
option of putting data on paper in
01:51:43
in this case this is when it works out
01:51:45
the final result which is impossible
01:51:46
change without prior approval
01:51:49
in the right system where you can't
01:51:52
be changed without re-analysis
01:51:53
which will only give you cheese
01:51:57
after the approval of the manager and so on
01:51:59
the final result is checked
01:52:01
manager in accordance with
01:52:03
established procedure
01:52:05
chromatograms can be printed on
01:52:08
paper and they should also be available in
01:52:10
system for viewing
01:52:13
in this slide you see the type
01:52:15
audit trails
01:52:17
control somewhere which may include
01:52:20
chromatographic system
01:52:22
Means
01:52:24
there is sometimes an audit log at the level
01:52:27
systems
01:52:28
this is the testing log any along the way
01:52:32
inputs-outputs
01:52:33
ID
01:52:35
dates and times of login and logout attempts
01:52:38
device used functions
01:52:41
executed when logging into applications
01:52:43
And
01:52:44
Application level audit log is
01:52:48
control over the years at the project level is
01:52:50
monitoring is available for such open and
01:52:53
closure of data and actions regarding
01:52:55
data for example editing walls
01:52:57
processing and deleting records and fields on
01:53:00
published and journal reports somewhere
01:53:03
techniques clarify registration actions
01:53:06
in the process of carrying out the technique this story
01:53:08
changes in methodology methodology for and no
01:53:12
changes between sequence
01:53:14
log results somewhere
01:53:17
chromatogram or reports contain type
01:53:19
integrating the date of collection and processing and
01:53:23
who performed them
01:53:24
changes in chromatograms after
01:53:27
obtaining results
01:53:29
vogue magazine to sequence
01:53:32
registration change make process
01:53:34
sequence or or changes
01:53:36
titles for series about or lectures
01:53:39
after centuries you
01:53:41
series changes about
01:53:44
changing the sample name on time
01:53:47
execute sequences using
01:53:50
method for all injection removal
01:53:52
sequence audit log on
01:53:55
project level this registration is
01:53:57
performed in relation to the series about entrances
01:54:00
results of calibration curves a and
01:54:03
peaks and the injection log is a registration
01:54:06
date and time information
01:54:09
The room is unsuitable for those standards
01:54:12
sample and either simply
01:54:14
let's now look at the possible
01:54:16
problems related to data integrity
01:54:19
this is also a practice in production
01:54:23
foreign regulators and
01:54:27
let's consider
01:54:29
like each group and possible examples
01:54:33
problems that may be associated with
01:54:35
full data
01:54:37
bond falsification fabrication
01:54:40
record for example visual data
01:54:43
control record for cleaning validation
01:54:46
series production record annual
01:54:49
reviews product quality check
01:54:52
integrity of gloves insulator
01:54:54
false or misleading
01:54:57
statements made to inspectors
01:55:01
or delay of castes
01:55:04
restrictions when checking failure
01:55:07
provide access to recording objects on
01:55:09
google document or responsible persons
01:55:11
and what prevents the inspector from completing
01:55:13
check
01:55:14
computer access control
01:55:18
unsecured spreadsheet and for
01:55:20
performing calculations and statistical
01:55:23
general production data evaluation
01:55:25
credentials that did not allow
01:55:27
infect a specific person
01:55:29
using a common login and for binding
01:55:32
certain actions and to a certain
01:55:33
to the operator in the general password used
01:55:36
several people to gain access
01:55:39
for each individual unit
01:55:40
equipment and access level are not
01:55:43
insufficient control to ensure that
01:55:46
change in main production
01:55:48
during control notes or other
01:55:50
entries are made only by authorized
01:55:52
staff
01:55:54
next group
01:55:57
[music]
01:55:58
the following example is the absence of records
01:56:01
data made simultaneously with
01:56:02
of the operation being performed is a preliminary
01:56:05
behind as if described by the notes
01:56:07
production in the recording series
01:56:09
production series signed by persons
01:56:10
who did not perform the action
01:56:13
control not spreadsheets
01:56:15
which are used to record data
01:56:17
quality in the production process which
01:56:20
then transcribe and retroactively
01:56:21
is recorded in the production record and
01:56:23
in the recording both vices do not match
01:56:26
video recordings serial data
01:56:29
production in the 1st on breadboards
01:56:32
for the next one for the next one
01:56:34
transfer to official record
01:56:36
dated words
01:56:38
unexplained discrepancies in data
01:56:42
production equipment marked
01:56:43
as clean but found dirty in records
01:56:46
production series missing important
01:56:49
signature information
01:56:51
erroneous grows and and use and
01:56:53
correct amount of starting material
01:56:55
during production on not accurate
01:56:57
quantity for quality defects
01:57:00
or recording optical filters
01:57:04
production record tracking
01:57:06
series
01:57:07
well here
01:57:10
programmable logic controller and
01:57:14
production equipment
01:57:16
and with general credentials that are not
01:57:18
allowed
01:57:19
stains or who uses that common label
01:57:25
dante deleted destroyed or missing
01:57:28
For example, records for
01:57:30
series production, subscriptions,
01:57:33
sanitization annual reviews
01:57:35
product quality change control
01:57:39
filtration checking filter integrity
01:57:41
this media fil test this
01:57:43
sterilizers checking weight in progress
01:57:46
production output calculations
01:57:49
undocumented deviations
01:57:52
broken audit trail
01:57:55
lack of audit trail for
01:57:57
documented who had access
01:57:59
to each of
01:58:03
controllers and equipment shortage
01:58:07
cars
01:58:08
operating equipment parameters or
01:58:10
electronic taste disabled
01:58:11
audit trails for the system
01:58:13
aerosol particle monitoring
01:58:17
inaccurate incomplete data or records
01:58:19
inaccurate entries in records
01:58:22
production series is incorrect
01:58:24
amount of active ingredients or
01:58:25
raw precision, media stupidity inaccurate
01:58:29
notes about spotter you win
01:58:32
events or inaccurate clearance recording
01:58:35
product quality
01:58:37
series production records
01:58:40
given in pencil and
01:58:42
no one will wash down this use
01:58:45
social
01:58:46
recording which draft notes
01:58:50
This slide shows the conclusions
01:58:55
means when building a control system
01:58:59
data you need to know the requirements and
01:59:01
recommendations which you which
01:59:03
defined in regulatory standards
01:59:05
documents about mystical companies
01:59:08
bear full responsibility for
01:59:09
computerized ones they use
01:59:11
electronic systems and generation
01:59:14
data fulfillment of expectations I managed and
01:59:16
plus this is a guarantee of product quality and
01:59:19
patient safety quality culture
01:59:22
must be transparent open
01:59:24
improved the prognostic system
01:59:26
quality is the use of modern
01:59:29
principles of risk management and
01:59:30
application of good practices
01:59:32
data management
01:59:34
computerized system must be
01:59:36
he was led by demands
01:59:38
regulatory requirements regarding
01:59:39
operation of compensated systems
01:59:41
must be respected colleagues thank you for
01:59:44
attention

Description:

On this page you can download the media «2-2.4» highest quality possible WITHOUT any restrictions on the number of downloads or download speed.

Preparing download options

popular icon
Popular
hd icon
HD video
audio icon
Only sound
total icon
All
* — If the video is playing in a new tab, go to it, then right-click on the video and select "Save video as..."
** — Link intended for online playback in specialized players

Questions about downloading video

mobile menu iconHow can I download "2-2.4" video?mobile menu icon

  • http://unidownloader.com/ website is the best way to download a video or a separate audio track if you want to do without installing programs and extensions.

  • The UDL Helper extension is a convenient button that is seamlessly integrated into YouTube, Instagram and OK.ru sites for fast content download.

  • UDL Client program (for Windows) is the most powerful solution that supports more than 900 websites, social networks and video hosting sites, as well as any video quality that is available in the source.

  • UDL Lite is a really convenient way to access a website from your mobile device. With its help, you can easily download videos directly to your smartphone.

mobile menu iconWhich format of "2-2.4" video should I choose?mobile menu icon

  • The best quality formats are FullHD (1080p), 2K (1440p), 4K (2160p) and 8K (4320p). The higher the resolution of your screen, the higher the video quality should be. However, there are other factors to consider: download speed, amount of free space, and device performance during playback.

mobile menu iconWhy does my computer freeze when loading a "2-2.4" video?mobile menu icon

  • The browser/computer should not freeze completely! If this happens, please report it with a link to the video. Sometimes videos cannot be downloaded directly in a suitable format, so we have added the ability to convert the file to the desired format. In some cases, this process may actively use computer resources.

mobile menu iconHow can I download "2-2.4" video to my phone?mobile menu icon

  • You can download a video to your smartphone using the website or the PWA application UDL Lite. It is also possible to send a download link via QR code using the UDL Helper extension.

mobile menu iconHow can I download an audio track (music) to MP3 "2-2.4"?mobile menu icon

  • The most convenient way is to use the UDL Client program, which supports converting video to MP3 format. In some cases, MP3 can also be downloaded through the UDL Helper extension.

mobile menu iconHow can I save a frame from a video "2-2.4"?mobile menu icon

  • This feature is available in the UDL Helper extension. Make sure that "Show the video snapshot button" is checked in the settings. A camera icon should appear in the lower right corner of the player to the left of the "Settings" icon. When you click on it, the current frame from the video will be saved to your computer in JPEG format.

mobile menu iconWhat's the price of all this stuff?mobile menu icon

  • It costs nothing. Our services are absolutely free for all users. There are no PRO subscriptions, no restrictions on the number or maximum length of downloaded videos.