Foreword |
|
xv | |
Preface |
|
xvii | |
|
|
1 | (6) |
|
|
5 | (1) |
|
|
5 | (2) |
|
2 E-records Lifecycle Revisited |
|
|
7 | (10) |
|
|
7 | (1) |
|
|
8 | (6) |
|
Records Identification Phase |
|
|
9 | (1) |
|
Records Standardization Phase |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
Regulatory Agencies' Expectations |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
14 | (1) |
|
|
15 | (2) |
|
3 Data and E-records Lifecycles - A Comparison |
|
|
17 | (8) |
|
|
17 | (1) |
|
|
18 | (2) |
|
|
20 | (3) |
|
Correlation of Data and E-records Lifecycles |
|
|
23 | (1) |
|
|
23 | (2) |
|
4 MHRA Guidance -- Revisited |
|
|
25 | (16) |
|
|
25 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
Computer Systems Validation |
|
|
28 | (1) |
|
|
29 | (10) |
|
|
39 | (2) |
|
5 E-records Integrity Expectations of EU GMP Inspectors |
|
|
41 | (8) |
|
|
41 | (1) |
|
EMA E-records Integrity Technical Requirements |
|
|
42 | (1) |
|
EU E-records Integrity Guidelines |
|
|
43 | (1) |
|
Expectations of EU GMP Inspectors |
|
|
44 | (3) |
|
|
47 | (1) |
|
|
48 | (1) |
|
6 Comparison of Health Authorities E-records Integrity Expectations |
|
|
49 | (8) |
|
|
49 | (1) |
|
Elements to Compare Guidance Documents |
|
|
50 | (2) |
|
Key Elements of Each Guidance Document |
|
|
52 | (1) |
|
Differences between Guidance Documents |
|
|
52 | (2) |
|
Consistencies between Guidance Documents |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
7 Maxims of E-records Integrity |
|
|
57 | (6) |
|
|
57 | (1) |
|
|
57 | (2) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (2) |
|
8 Vulnerabilities of E-records |
|
|
63 | (14) |
|
What Is Record Vulnerability? |
|
|
63 | (1) |
|
Protection and Security of Electronic Records |
|
|
63 | (2) |
|
Threats that Can Impact E-records |
|
|
65 | (3) |
|
|
65 | (1) |
|
Malware and Phishing Attempts |
|
|
65 | (1) |
|
|
65 | (1) |
|
Unrestricted Access to Computers |
|
|
66 | (1) |
|
Inadequate Disposal of Old Hardware |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
Assessment of E-record Vulnerability, Risks, and Implementation of Control Measures |
|
|
68 | (1) |
|
|
69 | (4) |
|
Regulatory Agencies Expectations |
|
|
73 | (1) |
|
|
73 | (1) |
|
|
74 | (3) |
|
9 CGMP E-records Risk Management |
|
|
77 | (6) |
|
|
77 | (2) |
|
|
79 | (2) |
|
Regulatory Agencies Expectations |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
10 CGMP E-records Risk Assessments |
|
|
83 | (6) |
|
|
83 | (1) |
|
How Can E-records Risk Be Assessed? |
|
|
84 | (1) |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (2) |
|
|
89 | (6) |
|
|
89 | (1) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
91 | (2) |
|
Regulatory Agencies' Expectations |
|
|
93 | (1) |
|
|
93 | (2) |
|
12 Defining and Managing Manufacturing Data |
|
|
95 | (14) |
|
|
95 | (1) |
|
|
96 | (1) |
|
Medicine Manufacturing Operations |
|
|
96 | (1) |
|
Identification of CGMP Record |
|
|
97 | (1) |
|
|
97 | (2) |
|
|
99 | (1) |
|
Protection of Data and E-records |
|
|
100 | (2) |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (4) |
|
13 Controls on Transient Data |
|
|
109 | (6) |
|
|
109 | (1) |
|
Protection of Transient Data |
|
|
110 | (2) |
|
Regulatory Agencies' Expectations |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (2) |
|
14 Digital Date and Timestamps |
|
|
115 | (6) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Computer Clock Reliability |
|
|
116 | (1) |
|
Digital Time-Stamping Service |
|
|
117 | (1) |
|
|
118 | (1) |
|
Computer Systems Not Networked |
|
|
118 | (1) |
|
|
118 | (1) |
|
Regulatory Agencies' Expectations |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
119 | (2) |
|
15 E-records Migration and Its Integrity |
|
|
121 | (4) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Checklist for Data Migration |
|
|
123 | (1) |
|
Regulatory Agencies' Expectations |
|
|
124 | (1) |
|
|
124 | (1) |
|
16 Ensuring E-records Integrity of Cloud Service Providers |
|
|
125 | (12) |
|
|
125 | (1) |
|
Cloud Service Requirements |
|
|
126 | (4) |
|
Selection of the Cloud Service Provider |
|
|
130 | (1) |
|
|
131 | (2) |
|
|
133 | (1) |
|
|
133 | (1) |
|
|
133 | (1) |
|
Regulatory Agencies' Expectation |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (2) |
|
17 E-records Integrity in Hybrid Systems |
|
|
137 | (4) |
|
|
137 | (1) |
|
E-records Signed with Handwritten Signatures |
|
|
137 | (2) |
|
Regulatory Agencies' Expectations |
|
|
139 | (1) |
|
|
139 | (2) |
|
18 Technologies Supporting E-records Integrity |
|
|
141 | (22) |
|
|
141 | (6) |
|
Cryptographic Technologies |
|
|
143 | (4) |
|
|
147 | (3) |
|
Cryptographic Technologies Apply to E-records Integrity |
|
|
149 | (1) |
|
|
150 | (7) |
|
Access Controls and Authority Checks to Computer Resources |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (2) |
|
Security of the Electronic Signatures |
|
|
154 | (1) |
|
Signature E-records Linkage |
|
|
155 | (1) |
|
|
156 | (1) |
|
The Uniqueness of the Electronic Signatures |
|
|
157 | (1) |
|
|
157 | (2) |
|
The Integrity of E-records in Transit |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
|
161 | (2) |
|
19 Integration Between Computer Systems and E-records Lifecycles |
|
|
163 | (12) |
|
|
163 | (2) |
|
|
165 | (1) |
|
Project Period -- Risk Assessment |
|
|
165 | (2) |
|
Project Period -- Requirements |
|
|
167 | (2) |
|
Project Period -- Building, Testing, Documenting, and Installing |
|
|
169 | (1) |
|
Project Period -- E-records Migration and Computer Systems Release to Operations |
|
|
170 | (1) |
|
|
170 | (1) |
|
Computer System Retirement -- E-records Migration |
|
|
171 | (1) |
|
|
172 | (2) |
|
E-records Final Disposition |
|
|
174 | (1) |
|
|
174 | (1) |
|
20 Miscellaneous E-records Integrity Issues |
|
|
175 | (16) |
|
|
175 | (1) |
|
|
175 | (1) |
|
|
176 | (4) |
|
|
176 | (2) |
|
Categories of Manufacturing-Related Audit Trails |
|
|
178 | (1) |
|
Product- or Batch-Specific Data |
|
|
178 | (1) |
|
|
179 | (1) |
|
|
179 | (1) |
|
What Are We Looking for in an Audit Review? |
|
|
179 | (1) |
|
Review of Audit Trail Entries |
|
|
179 | (1) |
|
Guidance for "Regular Review" of Audit Trails |
|
|
179 | (1) |
|
What Are We Looking for in an Audit Review? |
|
|
180 | (1) |
|
Suspected Data Integrity Violation - What Do We Need to Do? |
|
|
180 | (1) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Retention of E-records -- Verification |
|
|
182 | (3) |
|
|
182 | (1) |
|
|
183 | (1) |
|
Testing Required Concerning the Retention of E-records |
|
|
184 | (1) |
|
E-records Integrity in Wireless Environments |
|
|
185 | (4) |
|
Introduction to Wireless Environment |
|
|
185 | (2) |
|
Data Integrity in Wireless Environments |
|
|
187 | (2) |
|
|
189 | (2) |
|
21 E-records Remediation Project Revisited - Medicine Manufacturing |
|
|
191 | (10) |
|
|
191 | (1) |
|
Remediation Project Fundamentals |
|
|
192 | (1) |
|
Evaluate E-records Controls |
|
|
193 | (2) |
|
Sample Project and the Evaluation of E-records Controls |
|
|
195 | (1) |
|
Corrective Actions Planning |
|
|
195 | (2) |
|
Sample Project and the Corrective Actions Planning |
|
|
196 | (1) |
|
|
197 | (2) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
New Applications and Application Upgrade Assessments |
|
|
198 | (1) |
|
Suppliers Qualification Program |
|
|
198 | (1) |
|
Sample Project and Remediation |
|
|
199 | (1) |
|
Remediation Project Report |
|
|
199 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
22 Designing E-records Integrity into your Practices |
|
|
201 | (18) |
|
|
201 | (1) |
|
EU Annex 11 as a Computer Data Integrity Compliance Model |
|
|
202 | (2) |
|
Supporting Processes Applicable to the Data Integrity Controls |
|
|
204 | (4) |
|
Categories of Data Integrity Controls |
|
|
208 | (8) |
|
|
216 | (1) |
|
|
216 | (3) |
|
23 Introduction to Data Quality |
|
|
219 | (10) |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (1) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (1) |
|
|
229 | (2) |
|
|
230 | (1) |
Appendix I Glossary of Terms |
|
231 | (38) |
Appendix II Abbreviations and/or Acronyms |
|
269 | (6) |
Appendix III References |
|
275 | (12) |
Appendix IV Things That Can Go Wrong when Validating Big Data Environments |
|
287 | (6) |
Appendix V Data Integrity for Analytical Instruments connected to a LIMS |
|
293 | (8) |
Appendix VI Data Integrity -- EU Deviations |
|
301 | (14) |
Index |
|
315 | |