(COMPANY LOGO) CGMP COMPUTERIZED SYSTEM VENDOR AUDIT QUESTIONNAIRE
|
|
- Janis Robbins
- 8 years ago
- Views:
Transcription
1 1. GENERAL COMPANY INFORMATION (COMPANY LOGO) 1.1 Name Address Years in Business Number of Employees Services Performed or Products Manufactured Prior Experience with (Company Name) 1.2 Please provide references for whom you have performed services similar to those to be performed for (Company Name). 1.3 Describe the general financial status of your company. Annual Sales Current Financial Status Ownership Structure 1.4 Do you have a Quality Assurance unit? If yes, how is it structured, and if no, how do you deal with Quality Assurance functions? Please outline your Quality Assurance Units functions in software development. 1.5 Are you aware of the pharmaceutical industry practice of validating computerized systems? Are you aware of FDA s GMP requirements and how they apply to software used by FDA regulated industry? Have you identified GMP requirements for your software? If so, what GMP issues have been identified? Have your programmers and development managers had GMP training? Example Only 1
2 1.6 Do you have any experience in assisting a customer with validation of a system or its components? Please give an example. 2. PRODUCT DEVELOPMENT INFORMATION 2.1 If product or service is of a customized nature, please provide major qualifications or resumes of primary individuals involved. 2.2 Do you use professional standards? If yes, list; if no, describe your development process? 2.3 Are requirements and specifications written in early stages of development? If yes, describe this procedure. 2.4 Do you follow a System Development Life Cycle approach or other formal system for software application development? If yes, describe the system. 2.5 How do you assure that the methodology is followed? Describe. How do you document compliance with the methodology? 2.6 Are walk-throughs conducted at designated intervals during design? If yes, describe a typical walkthrough How are code walk-throughs documented? Is this documentation available to the customer? To the FDA? 2.7 What procedure is followed when an error or anomaly is detected (e.g., program, system, hardware, or data error)? Is unit testing performed? How is it documented? Is this documentation available to the customer? To the FDA? Is software integration testing performed? How is it documented? Is this documentation available to the customer? To the FDA? Example Only 2
3 2.8 How is system testing performed and documented? 2.9 Who performs the tests? 2.10 Who approves the test plan and results? 2.11 Are challenges to the tests performed by someone other than the developer? Describe How do you assure that test procedures are followed? 2.13 Are test procedures routinely reviewed and updated? If yes, at what frequency? 2.14 At what point in new product or application development does the client or customer take ownership? What software metrics are collected and evaluated? 3. TECHNICAL DOCUMENTATION Please advise if the following list of technical documentation is provided to a client or customer. If not, please offer explanation and alternative. Diagnostic Kits Description of Data Structures Sample of Output Reports Hardware Manuals Source Code 4. SECURITY POLICY 4.1 Describe the physical security you have at the development facility. 4.2 Describe the specific forms of computer security in place to protect your software development. 4.3 Describe your software archiving and documentation storage procedures. 4.4 Describe how the security policy is enforced. Example Only 3
4 4.5 Describe how unauthorized changes to the source code are prevented. 5. CONFIGURATION MANAGEMENT 5.1 Hardware/Equipment Describe how a customer is notified of a recall Are recalls only honored during the warranty period? Please provide warranty information. 5.2 Software Describe the documentation/help on correcting bugs or errors when they are found Describe the documentation of error and solution Who authorizes software changes? How do you ensure that the changes that are authorized are the ones made? If you use procedures, are they adequate and complete, and do they provide control over changes? Please provide an example of a control of change procedure If major changes to systems are released to the customer as new versions, when and how are version numbers changed? Describe how a customer is notified of a new version Are customers made aware of software defects detected by other customers? If so, describe the system. Example Only 4
5 6. TRAINING 6.1 Describe the type of training you offer the customer. 6.2 Who performs the training? 6.3 Where is the training conducted? 7. PERFORMANCE TESTING 7.1 List and describe the aspects of system performance that are tested (e.g., database, on-line transaction volume, large db batch processing, I/O performance). 7.2 Do you have performance testing results, and are they available for review? If yes, please be prepared to provide these results. 7.3 Do you provide for user acceptance testing? Where and when does testing take place? 8. BACKUP/DISASTER RECOVERY 8.1 Do you have a plan for software backup and storage of backups? If yes, please describe. 8.2 Do you have a plan for disaster recovery. If yes, please describe. 9. Do you have a complete set of high level requirements for currently marketed systems? 9.1 Do you have a complete set of detailed software design specifications for currently marketed systems? 9.2 Do you perform software V & V? Describe. Example Only 5
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT
More informationSan Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
More informationPERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI
Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.
More informationTesting Automated Manufacturing Processes
Testing Automated Manufacturing Processes (PLC based architecture) 1 ❶ Introduction. ❷ Regulations. ❸ CSV Automated Manufacturing Systems. ❹ PLCs Validation Methodology / Approach. ❺ Testing. ❻ Controls
More informationAttachment E. RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive.
Attachment E RFP Requirements: Mandatory Requirements: Vendor must respond with Yes or No. A No response will render the vendor nonresponsive. Questions Support for Information Security 1. The Supplier
More informationFull Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
More informationInformation Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
More informationThis interpretation of the revised Annex
Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation
More informationfdsfdsfdsfdsfsdfdsfsdfdsfsdfsdfsdfs Square Box Systems Technical Support
fdsfdsfdsfdsfsdfdsfsdfdsfsdfsdfsdfs Square Box Systems Technical Support Technical Support Agreement This technical support agreement is made between Square Box Systems Ltd, a company incorporated and
More informationDisaster Recovery Plan. (Updated Aug 30, 2015)
Disaster Recovery Plan (Updated Aug 30, 2015) St. Thomas School Disaster Plan TABLE OF CONTENTS Introduction... 3 General Definition... 3 Goal... 3 Advance Preparation and Emergency Response Phase Leadership...
More informationRisk-Based Validation of Computer Systems Used In FDA-Regulated Activities
September 2, 2003 Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities Purpose This document provides a summary of the requirements relating to use of computer-based systems in activities
More informationSamples of Management Consulting Assignments. Performed by DCAG are. Provided in the following pages.
Samples of Management Consulting Assignments Performed by DCAG are Provided in the following pages. Thomas Bronack 15180 20 th Avenue Whitestone, NY 11357 Phone: (718) 591-5553 Cell: (917) 673-6992 Email:
More information074-8432-552 Page 1 of 7 Effective Date: 12/18/03 Software Supplier Process Requirements
Page 1 of 7 Software Supplier Process Requirements 1.0 QUALITY SYSTEM FRAMEWORK 1.1 QUALITY POLICY The Seller shall document and implement a quality program in the form of Quality manual or detailed Quality
More informationGuidance for Industry Computerized Systems Used in Clinical Investigations
Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance
More informationValidating Enterprise Systems: A Practical Guide
Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise
More informationINFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
More informationUniversity of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
More informationServices Providers. Ivan Soto
SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed
More informationCopyright 2006 Quality Excellence for Suppliers of Telecommunications Forum
Release 4.0 4.2.3 4.2.3.C.1 Control of Customer- Supplied Documents and Data The organization shall establish and maintain a documented procedure(s) to control all customer-supplied documents and data
More informationEMPLOYEE REFERRAL PROGRAM - US
EMPLOYEE REFERRAL PROGRAM - US Objective This policy aims to bring candidates with requisite qualification and skills to our organization. On successful placement of the candidate, the employee will receive
More informationClient Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
More informationSoftware Test Plan (STP) Template
(STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This
More informationInformation Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
More informationThe FDA recently announced a significant
This article illustrates the risk analysis guidance discussed in GAMP 4. 5 By applying GAMP s risk analysis method to three generic classes of software systems, this article acts as both an introduction
More informationJuly 12, 2013 Page 1 of 5 BellHawk Systems Corporation
BellHawk Compliance with CFR 21 Part 11 Introduction This document details the compliance of the BellHawk software with CFR 21 Part 11 (Part 11) dated March 20, 1997 and the document General Principles
More informationAUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM
GENERAL: The Technology department is responsible for the managing of electronic devices and software for the District, as well as the Help Desk for resolution of employee-created help tickets. The subgroups
More informationWhite Paper. Regulatory Compliance and Database Management
White Paper Regulatory Compliance and Database Management March 2006 Introduction Top of mind in business executives today is how to meet new regulatory compliance and corporate governance. New laws are
More informationTECHNOLOGY STRATEGY AUDIT
TECHNOLOGY STRATEGY AUDIT Executive Summary It is our intention to facilitate the understanding of technology strategy and its integration with business strategies. This guideline is organized as series
More informationClient Engagement Methodology
Client Engagement Methodology Media Net Link has spent the last ten years perfecting the art of managing projects to successful completion for large and medium sized companies. We don't do this by shooting
More informationPolicy Outsourcing and Cloud Based File Sharing
Policy Outsourcing and Cloud Based File Sharing Version 3.1 TABLE OF CONTENTS Outsourcing Policy... 2 Outsourcing Management Standard... 2 Overview... 2 Standard... 2 Outsourcing Policy... 3 Policy Statement...
More informationENABIL Managed Services
ENABIL Managed Services Overview ENABIL Solutions provides the following services to our customers: Customer & Revenue Management Services Problem Management Change Management Performance and Capacity
More informationOMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 88 R VALIDATION OF COMPUTERISED SYSTEMS ANNEX 2: VALIDATION OF DATABASES (DB), LABORATORY INFORMATION MANAGEMENT SYSTEMS
More informationŠtitimo naše partnere i korisnike
Cisco servisi Štitimo naše partnere i korisnike Dušan Grčić Partner Services Development Manager dugrcic@cisco.com 2010 Cisco and/or its affiliates. All rights reserved. Protect your technology investment
More informationComputerized System Audits In A GCP Pharmaceutical Laboratory Environment
IVTGXP_july06.qxd 6/28/06 1:09 PM Page 36 Computerized System Audits In A GCP Pharmaceutical Laboratory Environment By Maintaining data integrity for both clinical laboratory processes and patient data
More informationIT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationName: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
More informationGatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
More informationModule 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
More informationHow To Test Software For Safety
Software Supplier Assessment Plan The life cycle for software parallels that for a computer system. It begins during the analysis of the requirements... by Robert W. Stotz, Ph.D. Manager of Validation
More informationWhat is an Extended Warranty Option?
Trimble Extended Warranty FAQs The Geomatics and Engineering Division offer Extended Warranty Options for various Trimble products. Where possible the extended warranty option will include hardware, firmware,
More informationAttachment 7 Requirements Traceability Matrix (RTM) ATMS RFP. New York State Department of Transportation Advanced Traffic Management System
Attachment 7 Requirements Traceability Matrix (RTM) ATMS RFP New York State Department of Transportation Advanced Traffic Management System i 1. INTRODUCTION This Requirements Traceability Matrix (RTM)
More informationGENERAL APPLICATION FOR ELECTRONIC COMMUNICATION SYSTEM ( ECS ) INSURANCE
GENERAL APPLICATION FOR ELECTRONIC COMMUNICATION SYSTEM ( ECS ) INSURANCE (CLAIMS MADE BASIS) APPLICANT S INSTRUCTIONS: 1. Answer all questions. If the answer requires detail, please attach a separate
More informationINTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to
INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software
More informationCompliance Cost Associated with the Storage of Unstructured Information
Compliance Cost Associated with the Storage of Unstructured Information Sponsored by Novell Independently conducted by Ponemon Institute LLC Publication Date: May 2011 Ponemon Institute Research Report
More informationTL 9000 and TS16949 Comparison
TL 9000 and TS16949 Comparison www.questforum.org Copyright QuEST Forum 2007 1 Purpose This summary is intended to give those familiar with TS16949 requirements a general sense of the additional requirements
More informationMHRA GMP Data Integrity Definitions and Guidance for Industry January 2015
MHRA GMP Data Integrity Definitions and Guidance for Industry Introduction: Data integrity is fundamental in a pharmaceutical quality system which ensures that medicines are of the required quality. This
More informationHow to Survive an FDA Computer Validation Audit
How to Survive an FDA Computer Validation Audit The Myth Within the pharmaceutical, biotech, and medical device industry there is much fear and concern over approaching FDA audits. The FDA strikes fear
More informationYour Accident Fact Kit
Your Accident Fact Kit We hope you find our Accident Fact Kit helpful in the event of an accident. Please be sure to print multiple copies and keep them in the glove compartment of your vehicle in the
More informationAudit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member
City of Gainesville Inter-Office Communication April 3, 2012 TO: FROM: SUBJECT: Audit, Finance and Legislative Committee Mayor Craig Lowe, Chair Mayor-Commissioner Pro Tem Thomas Hawkins, Member Brent
More informationSiebel Business Process Framework: Workflow Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Business Process Framework: Workflow Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
More informationAPPLICATION FOR LOUISIANA STATE ARCHIVES IMAGING EXCEPTION TO LA. R.S. 44:39 SSARC 790
APPLICATION FOR LOUISIANA STATE ARCHIVES IMAGING EXCEPTION TO LA. R.S. 44:39 SSARC 790 Mailing: PO Box 94125, Baton Rouge, LA 70804-9125 Location: 3851 Essen Lane, Baton Rouge, LA 70809-2137 BEFORE completing
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationImplementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC
More informationComputer System Configuration Management and Change Control
Computer System Configuration Management and Change Control What Your IT Department Is Really Doing Justin J. Fisher, Pfizer IT Quality and Compliance Manager Agenda 1. Background 2. Audience Demographics
More informationIBM Tivoli Storage Productivity Center (TPC)
IBM Tivoli Storage Productivity Center (TPC) Simplify, automate, and optimize storage infrastructure Highlights The IBM Tivoli Storage Productivity Center is designed to: Help centralize the management
More informationCA Database Performance
DATA SHEET CA Database Performance CA Database Performance helps you proactively manage and alert on database performance across the IT infrastructure, regardless of whether the database is located within
More informationITD BACKUP MANAGEMENT PROCEDURE
ITD BACKUP MANAGEMENT PROCEDURE PURPOSE The purpose of this document is to ensure that effective and efficient processes are in place to identify and safeguard data required to run and support applications
More informationGuidance for Industry COMPUTERIZED SYSTEMS USED IN CLINICAL TRIALS
Guidance for Industry COMPUTERIZED SYSTEMS USED IN CLINICAL TRIALS U.S. Department of Health and Human Services Food and Drug Administration Center for Biologic Evaluation and Research (CBER) Center for
More informationAdoption by GCP Inspectors Working Group for consultation 14 June 2011. End of consultation (deadline for comments) 15 February 2012
10 December 2013 EMA/INS/GCP/600788/2011 Compliance and Inspection Reflection paper on the use of interactive response technologies (interactive voice/web response systems) in clinical trials, with particular
More informationCA Explore Performance Management for z/vm
PRODUCT SHEET CA Explore Performance Management for z/vm CA Explore Performance Management for z/vm CA Explore Performance Management for z/vm (CA Explore for z/vm) is a comprehensive performance management
More informationGRIDScaler-WOS Bridge
-WOS Bridge Version 1.6.0 Product Release Notes Revision A0 March 2015 Important Information Information in this document is subject to change without notice and does not represent a commitment on the
More informationService Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous
Service Level Program for Ariba cloud Services Service Accessibility Warranty Security Miscellaneous 1. Service Accessibility Warranty a. Applicability. The Service Accessibility Warranty applies to the
More informationEnterprise Vault 10 Feature Briefing
Enterprise Vault 10 Feature Briefing Nirvanix Cloud Storage This document is one of a set of Feature Briefings which detail major new or changed features in Enterprise Vault 10. This document covers the
More informationDomain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services
Service Level Agreement Page 1 of 7 Domain Name Service Service Level Agreement (SLA) Vanderbilt Information Technology Services 1. Agreement This agreement is to define Domain Name Service (DNS) provided
More informationInformation Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
More informationCONTENTS. List of Tables List of Figures
Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation
More information*Applies to eligible hardware and software. Contact your Cisco Certified Partner for details.
Q & A Smart Care Service Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a smart, collaborative networkwide service that enables your partner to deliver proactive network monitoring,
More informationAttachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent Health
Attachment A Form to Describe Sensitive Data Security Plan for the Use of Sensitive Data from the National Longitudinal Study of Adolescent Health Data Stored on an External Hard Drive All requests for
More informationYour Accident Fact Kit
Your Accident Fact Kit We hope you find our Accident Fact Kit helpful in the event of an accident. Please be sure to print multiple copies and keep them in the glove compartment of your vehicle in the
More informationComputer and Software Validation Volume II
Table of Contents Maintaining the Validated State in Computer Systems Orlando Lopez Use Automated Testing Tools? Janis V. Olson Considerations for Validation of Manufacturing Execution Systems Chris Wubbolt
More informationInternational GMP Requirements for Quality Control Laboratories and Recomendations for Implementation
International GMP Requirements for Quality Control Laboratories and Recomendations for Implementation Ludwig Huber, Ph.D. ludwig_huber@labcompliance.com Overview GMP requirements for Quality Control laboratories
More informationASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION
PHARMACEUTICAL INSPECTION CONVENTION PHARMACEUTICAL INSPECTION CO-OPERATION SCHEME PI 038-1 26 March 2012 AIDE-MEMOIRE ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION PIC/S March 2012 Reproduction
More informationBack to index of articles. Qualification of Computer Networks and Infrastructure
Back to index of articles Qualification of Computer Networks and Infrastructure R.D.McDowall McDowall Consulting Validation of computerised systems generally focuses on the providing documented evidence
More informationRisk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
More informationCHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
More informationCDC UNIFIED PROCESS JOB AID
CDC UNIFIED PROCESS JOB AID Independent Verification & Validation Activities Document Purpose This Job Aid is a brief document listing the items to be noted, checked, remembered, and delivered when completing
More informationTraining Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003. Change Control
Training Course Computerized System Validation in the Pharmaceutical Industry Istanbul, 16-17 January 2003 Change Control Wolfgang Schumacher Roche Pharmaceuticals, Basel Agenda Change Control Definitions
More informationInfasme Support. Incident Management Process. [Version 1.0]
Infasme Support Incident Management Process [Version 1.0] Table of Contents About this document... 1 Who should use this document?... 1 Summary of changes... 1 Chapter 1. Incident Process... 3 1.1. Primary
More informationAttachment to Data Center Services Multisourcing Service Integrator Master Services Agreement
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department
More informationwww.novell.com/documentation Database Maintenance ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Database Maintenance ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationJD Edwards World. Database Audit Manager Release A9.3 E21957-02
JD Edwards World Database Audit Manager Release A9.3 E21957-02 April 2013 JD Edwards World Database Audit Manager, Release A9.3 E21957-02 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
More informationKeywords: SQA,Black Box Testing( BBT), White Box testing(wbt).
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Enhancing Software
More informationThe first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.
CIPS Overview Introduction The reliability of the energy grid depends not only on physical assets, but cyber assets. The North American Electric Reliability Corporation (NERC) realized that, along with
More informationGE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems
GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of
More informationMapGuide Open Source Repository Management Back up, restore, and recover your resource repository.
MapGuide Open Source Repository Management Back up, restore, and recover your resource repository. Page 1 of 5 Table of Contents 1. Introduction...3 2. Supporting Utility...3 3. Backup...4 3.1 Offline
More informationStorage Considerations for Database Archiving. Julie Lockner, Vice President Solix Technologies, Inc.
Storage Considerations for Database Archiving Julie Lockner, Vice President Solix Technologies, Inc. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies
More informationTine 2.0 Maintenance and Support Services
Tine 2.0 Maintenance and Support Services 1 Overview of Maintenance and Support Services Metaways Tine 2.0 Maintenance and Support Editions: SERVICES Software Maintenance Business Professional SW Maintenance
More informationMHRA GMP Data Integrity Definitions and Guidance for Industry March 2015
MHRA GMP Data Integrity Definitions and Guidance for Industry Introduction: Data integrity is fundamental in a pharmaceutical quality system which ensures that medicines are of the required quality. This
More informationComputer System Validation for Clinical Trials:
Computer System Validation for Clinical Trials: Framework Standard Operating Procedure (F-SOP) Author: Tim Cross Version History: 0.1di DRAFT 24-April-2013 0.2 DRAFT 12-June-2013 Current Version: 1.0 17-June-2013
More informationUsing SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium
Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint
More informationDeltaV Capabilities for Electronic Records Management
January 2013 Page 1 DeltaV Capabilities for Electronic Records Management This paper describes DeltaV s integrated solution for meeting FDA 21CFR Part 11 requirements in process automation applications
More informationCloud Computing Contracts: Hazards Ahead
Cloud Computing Contracts: Hazards Ahead General Cloud Concerns Internal Network Requirements Connectivity Dependent Sustainability Loss of Control Legal Requirements Specific Hazards in the Contracts
More informationHP Technical Phone Support service agreement ( Agreement ) terms and conditions
HP Technical Phone Support service agreement ( Agreement ) terms and conditions Thank you for purchasing this HP Technical Phone Support Service Agreement. Service descriptions with more detailed information
More information21 CFR Part 11 Electronic Records & Signatures
Gap Analysis - Checklist 21 CFR Part 11 Electronic Records & Signatures his document is a proposal and starting point only. he type and extent of documentation depends on the process environment. he proposed
More informationSYLOGENT DEDICATED HOSTING
HOSTING & PROCESS SYLOGENT DEDICATED HOSTING VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM HYPERVISOR HYPERVISOR HYPERVISOR DB1 active DB2 passive Clustered hypervisors that host dedicated VMs integrated
More informationComputer System Configuration Management and Change Control
Computer System Configuration Management and Change Control Using Risk-Based Decision Making to Plan and Implement IT Change Justin J. Fisher Senior Manager, BT Quality and Compliance Pfizer Agenda 1.
More informationUMHLABUYALINGANA MUNICIPALITY
UMHLABUYALINGANA MUNICIPALITY BACKUP AND RESTORE POLICY Backup and Restore Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director of
More informationsample questions Practitioner module Release and Control (IPRC) ITIL Practitioner module Release and Control Sample questions IPRC edition June 2005
sample questions Practitioner module Release and Control (IPRC) ITIL Practitioner module Release and Control Sample questions IPRC edition June 2005 contents 3 introduction 4 sample questions 11 answer
More information