PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE. EIIP Volume VI
|
|
|
- Quentin Fields
- 10 years ago
- Views:
Transcription
1 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT APPENDIX E PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE
2 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank.
3 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT PERFORMANCE EVALUATION AUDIT CHECKLIST EXAMPLE The Computer Audit Checklist provides guidelines for evaluating the adequacy of a computer that could be used to calculate emissions, store inventory data, and generate tables of results for the final inventory report. The testing, calibrating, and evaluation of operating procedures of instruments are all important for assuring the quality of data; a computer is also an instrument and should be treated as such. Because of the dependence of the inventory staff on computers to complete the inventory, an assessment of the testing, operation, and use of the computer would be one of the most important audits conducted during the planning and development phases of the inventory. E-1
4 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank. E-2
5 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT AUDIT CHECKLIST COMPUTER DATA ACCURACY Procedure: Select a date with results passing and not passing quality acceptance criteria, if possible. Determine if reported results accurately reflect the raw data. Use an alternate method to verify the accuracy of computer manipulations to yield calculated results. 1. Identify data maintained only on the hard drive 2. Locate and identify data maintained on hard copies 3. Are quality control data referenced to sample results? (standards, blanks, calibrations, replicates, duplicates, spikes, instrument conditions, surrogates, internal standards, etc.) - LAB DATA a. Are the references to quality control data protected or can they be easily changed? E-3
6 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 b. Are the references sufficient to associate quality data with individual sample results? 4. Are data outside of acceptance criteria flagged? a. If yes, are actions taken described? 5. Are the detection limits for target analytes clearly defined or referenced in the raw data? (LAB) a. Are they accurately represented in the report? b. Were changes made to reflect dilutions? 6. Are the data reduction steps definined in a written procedure? a. Is the procedure sufficient to recalculate results? b. Are the data sufficient to verify results? c. Were errors found in the data verified? If Yes, explain and identify results: (use additional comment sheet if necessary) 7. Are the data accurately reported? a. Are the units accurate? b. Are the data accurately flagged to note bias or confidence in the results reported? 8. Can results be traced back to the original data associated with a specific test article or data set? If not, describe problem: E-4
7 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT AUDIT CHECKLIST COMPUTER PROGRAM DOCUMENTATION AND VALIDATION 1. Are the following documents present a. Software management plan b. Software development plan and results c. Software test and acceptance plan d. Software User s operations document e. Software maintenance document f. Assessment of hardware 2. Are the following documented: a. Program b. Table of definitions c. System size and timing requirements d. Definitions of subsystems e. Requirements for: -- Hardware -- Electricity -- Security f. Backup and disaster recovery procedures g. Quality requirements for: -- Reliability -- Maintainability -- Flexibility for expansion h. Testing procedures 3. Does software management include the following: a. Independent validation E-5
8 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 b. Definitions/identifications of interfaces c. Definition of software tools -- Identification of program language -- Identification of network software requirements d. Configuration control (Control, release, and storage of master copies) 4. Is there a flow chart or text showing functional flow? 5. Are input and output fields identified? 6. Are there written procedures for software revisions? a. Are revisions tested to determine how the entire program is affected? b. How are revisions implemented? c. Are revisions documented? 7. Does the User s Guide or software description include: a. Description of system (hardware) b. Identification of person to contact when problems occur c. How to access the system d. How to input data e. How to generate reports f. How to update data g. Description of error codes h. Procedures to follow if the system goes down E-6
9 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT 8. Do testing procedures include the following: a. Description of test procedures to perform b. Expected outcome c. Documentation of results d. Recommendation for handling problems 9. Has security be addressed (Statements or passwords to safeguard accuracy of computer program operation)? 10. Can someone knowledgeable of the program language understand from reading the program what it does to the data to yield the expected or desired results (if not, explain on separate page) E-7
10 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 AUDIT CHECKLIST COMPUTER PROGRAM OPERATION 1. Is a password required to access the system? 2. Operator Training a. Are operators adequately trained? b. Is training documented? 3. When testing the system, are there system delays that hamper the job? 4. Are error messages given if an entry error is made (ex. data out-ofrange)? 5. Does the system prevent entry of data whic are out-of-range? 6. Are there prompts if fields are missed that are required for data manipulations? 7. How are default parameters assigned by the system? 8. Does the system carry over data from one screen to the next in order to minimize entry errors? 9. Are data entered into the central database via a computer readable media? If yes, does the data include information concerning: a. The source of the data b. When the data were collected c. Conditions under which collected d. Pointers to link data to quality control data E-8
11 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT e. Quality control (QC) flags indicating the level of data acceptability 10. If the data are entered by prompting the system to access a previously existing data file, are the data validated by a. Comparison of #/size of files transferred b. A log which documents files transferred c. Documenting or creating a record of the data, date, and name of the person transferring the data d. Periodic audits of data transfer -- Are audits documented? 11. Are data entered into the central data system via a link from an instrument? If yes, is the following information given a. Data generated b. Date and time generated c. Identification of the instrument d. QC flags indicating the level of acceptability of the data e. Instrument conditions (operating) (Lab) 12. If data are entered by direct link from an instrument is the data validated by... a. Voltage or calibration checks b. Comparison of results c. Comparison of hardcopy output with database contents d. Are data reasonableness checks either built into the data capture system or instruments? 13. Data changes a. How are the data corrections made? b. Are corrections verified? E-9
12 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 c. Are corrections documented on a written log (who, when, authorization) d. Is there a computer generated record of the changed and unchanged data? e. If changes were made to data transferred from another source, was the original source corrected? f. If changes are made in flags from a central data base -- Who determines the need to make the change? -- Is authorization for revision documented? -- Is the change adequately documented? 14. Data Reduction, Analysis and Assessment a. If data quality flags are used, are they defined b. Are qualifying flags correct? c. Can new flags be created? If so, how are they created? d. Are the mathematical expressions used by the system available in a written format? e. Were the mathematical expressions reviewed for accuracy? f. Was the validation of mathematical expression documented? g. Did revisions affect the over-all performance of data manipulations? h. If mathematical expressions are modified, -- Is the reason for the modification documented? -- Are old data recalculated with new formulas? E-10
13 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT i. Are printouts of report modifications routinely checked for accuracy? -- By whom -- Documented -- Percent checked % 15. Data output a. Are there written procedures for generating data output (graphs, charts, reports) b. Are the data used to generate the output adequately identified c. After final output are generated, is the database "locked" so that no further changes can be made without managerial consent d. Are output generated in a timely fashion (unusual delays be database) e. Are final copies of output properly archived -- Secure -- Precaution against fire -- Limited access f. Are reports electronically generated? g. If reports are electronically generated, how is it done? -- Direct computer link -- Magnetic media -- Verified upon transmission 16. Backups a. Are system backups performed? b. If backups are performed, indicate frequency c. Are backups partial or total? E-11
14 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 d. Is there an individual responsible for backups? If so, who? e. On what media are backups stored -- Magnetic tape -- Disks -- Diskettes -- Other f. Are media storing backups properly labelled? g. Are backups documented? -- Written log -- Project identified -- Computer system identified -- Other h. How are data from backups stored short term i. How are backup data stored long term j. Are the backup data arranged for expedient retrieval from the storage area(s)? k. Are long-term backup data stored off site or in a location other than the original data? l. Is the data storage area adequate? -- Security assured -- Access limited -- Fire precautions -- Environmentally controlled E-12
15 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT 17. Hardware maintenance a. Are there procedures for conducting and documenting preventative maintenance? b. Is there a regularly scheduled preventative maintenance program? Frequency c. Is preventative maintenance documented (who, what, when)? d. Is non-routine maintenance performed by in-house staff? If yes, how is it documented? e. How is non-routine maintenance documented? f. What provisions, if any, are made for system downtime? E-13
16 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 g. Has downtime adversely afffected the project? If yes, explain h. If the system fails because of electrical glitches or power outage what happens to the system? -- Backup power source available -- Backup starts automatically or manually -- How are power failures indicated if the system is running? -- Does the system lose the data being processed? -- Does the system start where it left off? E-14
17 Final 7/96 APPENDIX E - PERFORMANCE EVALUATION AUDIT -- If data are lost, does the system indicate the loss? -- While the system is running, is there a backup procedure to minimize the data loss if the system goes down? -- If the system goes down is the time down and time restored easy to determine? E-15
18 APPENDIX E - PERFORMANCE EVALUATION AUDIT Final 7/96 This page is intentionally left blank. E-16
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS. Date(s) Completed. Workpaper Reference
FORM 20A.9 SAMPLE AUDIT PROGRAM FOR TESTING IT CONTROLS Workpaper Reference Date(s) Completed Organization and Staffing procedures used to define the organization of the IT Department. 2. Review the organization
U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management
U. S. Department of Energy Consolidated Audit Program Checklist 5 Laboratory Information Management Systems Electronic Data Management Revision 4.0 February 2014 Use of this DOECAP checklist is authorized
CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS
11-1 CHAPTER 11 COMPUTER SYSTEMS INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION The State Board of Accounts, in accordance with State statutes and the Statements on Auditing Standards Numbers 78
Information Systems and Technology
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT
OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT
4 Backing Up and Restoring System Software
4 Backing Up and Restoring System Software In this Chapter... Planning a Backup Strategy, 4-3 Preparing for Disaster Recovery, 4-4 Creating Boot Recovery Diskettes, 4-5 Making a Full Backup Tape, 4-8 Restoring
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
San Francisco Chapter. Information Systems Operations
Information Systems Operations Overview Operations as a part of General Computer Controls Key Areas of focus within Information Systems Operations Key operational risks Controls generally associated with
ACDM GUIDELINES TO FACILITATE PRODUCTION OF A DATA HANDLING PROTOCOL
ACDM GUIDELINES TO FACILITATE PRODUCTION OF A DATA HANDLING PROTOCOL BACKGROUND The need was identified by the Electronic Data Transfer Special Interest Group (SIG) for each company or organisation to
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Frequently Asked Questions About WebDrv Online (Remote) Backup
Frequently Asked Questions About WebDrv Online (Remote) Backup GENERAL INFORMATION Why backup? What is online backup? What if we already have a tape backup system? How secure are online backups? What tasks
SECTION 15 INFORMATION TECHNOLOGY
SECTION 15 INFORMATION TECHNOLOGY 15.1 Purpose 15.2 Authorization 15.3 Internal Controls 15.4 Computer Resources 15.5 Network/Systems Access 15.6 Disaster Recovery Plan (DRP) 15.1 PURPOSE The Navajo County
PART 10 COMPUTER SYSTEMS
PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board
Auditing in an Automated Environment: Appendix C: Computer Operations
Agency Prepared By Initials Date Reviewed By Audit Program - Computer Operations W/P Ref Page 1 of 1 Procedures Initials Date Reference/Comments OBJECTIVE - To document the review of the computer operations
IT Service Management
IT Service Management Service Continuity Methods (Disaster Recovery Planning) White Paper Prepared by: Rick Leopoldi May 25, 2002 Copyright 2001. All rights reserved. Duplication of this document or extraction
Accounts Payable User Manual
Accounts Payable User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
Nova Southeastern University Standard Operating Procedure for GCP. Title: Electronic Source Documents for Clinical Research Study Version # 1
Nova Southeastern University Standard Operating Procedure for GCP Title: Electronic Source Documents for Clinical Research Study Version # 1 SOP Number: OCR-RDM-006 Effective Date: August 2013 Page 1 of
OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT
GENERAL DISTRIBUTION OCDE/GD(95)115 OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT THE APPLICATION OF THE PRINCIPLES OF GLP TO COMPUTERISED
2.2 INFORMATION SERVICES Documentation of computer services, computer system management, and computer network management.
3 Audit Trail Files Data generated during the creation of a master file or database, used to validate a master file or database during a processing cycle. GS 14020 Retain for 3 backup cycles Computer Run
Accounts Receivable User Manual
Accounts Receivable User Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia Notice of Authorship
Guidance for Industry Computerized Systems Used in Clinical Investigations
Guidance for Industry Computerized Systems Used in Clinical Investigations U.S. Department of Health and Human Services Food and Drug Administration (FDA) Office of the Commissioner (OC) May 2007 Guidance
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the
REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.
Managing & Validating Research Data
Research Management Standard Operating Procedure ISOP-H02 VERSION / REVISION: 2.0 EFFECTIVE DATE: 01 03 12 REVIEW DATE: 01 03 14 AUTHOR(S): CONTROLLER(S): APPROVED BY: Information Officer; NBT Clinical
DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS
Appendix L DISASTER RECOVERY AND CONTINGENCY PLANNING CHECKLIST FOR ICT SYSTEMS I. GETTING READY A. Obtain written commitment from top management of support for contingency planning objectives. B. Assemble
Data Management Implementation Plan
Appendix 8.H Data Management Implementation Plan Prepared by Vikram Vyas CRESP-Amchitka Data Management Component 1. INTRODUCTION... 2 1.1. OBJECTIVES AND SCOPE... 2 2. DATA REPORTING CONVENTIONS... 2
BACKUP SECURITY GUIDELINE
Section: Information Security Revised: December 2004 Guideline: Description: Backup Security Guidelines: are recommended processes, models, or actions to assist with implementing procedures with respect
IT Sr. Systems Administrator
IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers
Sponsor Site Questionnaire FAQs Regarding Maestro Care
Sponsor Site Questionnaire FAQs Regarding Maestro Care Data Security and Validation 1. Are the electronic source documents or computer systems specific to the site and/or developed by the site? a. Developed
Accounts Receivable System Administration Manual
Accounts Receivable System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
15 Organisation/ICT/02/01/15 Back- up
15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional
Guidance for Industry COMPUTERIZED SYSTEMS USED IN CLINICAL TRIALS
Guidance for Industry COMPUTERIZED SYSTEMS USED IN CLINICAL TRIALS U.S. Department of Health and Human Services Food and Drug Administration Center for Biologic Evaluation and Research (CBER) Center for
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE
SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE Learning objective: explain the use of computer assisted audit techniques in the context of an audit discuss and provide relevant examples of the use of test
Systems Management Advanced job scheduler
System i Systems Management Advanced job scheduler Version 5 Release 4 System i Systems Management Advanced job scheduler Version 5 Release 4 Note Before using this information and the product it supports,
Document Management Plan Preparation Guidelines
Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations
Clinical Data Management (Process and practical guide) Nguyen Thi My Huong, MD. PhD WHO/RHR/SIS
Clinical Data Management (Process and practical guide) Nguyen Thi My Huong, MD. PhD WHO/RHR/SIS Training Course in Sexual and Reproductive Health Research Geneva 2013 OUTLINE Overview of Clinical Data
Information System Audit. Arkansas Administrative Statewide Information System (AASIS) General Controls
Information System Audit Arkansas Administrative Statewide Information System (AASIS) General Controls ARKANSAS DIVISION OF LEGISLATIVE AUDIT April 12, 2002 April 12, 2002 Members of the Legislative Joint
Information Technology General Controls Review (ITGC) Audit Program Prepared by:
Information Technology General Controls Review (ITGC) Audit Program Date Prepared: 2012 Internal Audit Work Plan Objective: IT General Controls (ITGC) address the overall operation and activities of the
Draft Copy. Change Management. Release Date: March 18, 2012. Prepared by: Thomas Bronack
Draft Copy Change Management Release Date: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 10. CHANGE MANAGEMENT... 5 10.1. INTRODUCTION TO CHANGE MANAGEMENT... 5 10.1.1. PURPOSE OF
The Weill Cornell Medical College and Graduate School of Medical Sciences. Responsible Department: Information Technologies and Services (ITS)
Information Technology Disaster Recovery Policy Policy Statement This policy defines acceptable methods for disaster recovery planning, preparedness, management and mitigation of IT systems and services
Idaho Records Center A Program of the Idaho State Archives
Idaho Records Center A Program of the Idaho State Archives Data Processing Records Retention Schedule of the Records Management Guide (This Schedule Revised April, 2008) C.L. BUTCH OTTER, GOVERNOR Idaho
(COMPANY LOGO) CGMP COMPUTERIZED SYSTEM VENDOR AUDIT QUESTIONNAIRE
1. GENERAL COMPANY INFORMATION (COMPANY LOGO) 1.1 Name Address Years in Business Number of Employees Services Performed or Products Manufactured Prior Experience with (Company Name) 1.2 Please provide
Union County. Electronic Records and Document Imaging Policy
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
DSK MANAGER. For IBM iseries and AS/400. Version 5.01. Last Updated September 2002. Kisco Information Systems 7 Church Street Saranac Lake, NY 12983
DSK MANAGER For IBM iseries and AS/400 Version 5.01 Last Updated September 2002 Kisco Information Systems 7 Church Street Saranac Lake, NY 12983 Phone: (518) 897-5002 FAX: (518) 897-5003 E-mail: [email protected]
Examples: collecting the right sample on the right patient; labeling the sample accurately;
Quality Assessment: Basics & EMR is called by several names: and are just two of them. Quality Assessment (QA) is an on-going program designed to monitor and evaluate the quality or accuracy of all laboratory
Accounts Payable System Administration Manual
Accounts Payable System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 5. 2. Security Standards - Organizational, Security Policies Standards & Procedures, - Administrative and Documentation Safeguards
General Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
CENTER FOR NUCLEAR WASTE REGULATORY ANALYSES
Page 1 of 5 ELECTRONIC FILE ARCHIVAL AND BACKUP PROCEDURES EFFECTIVITY AND APPROVAL Revision 1 of this procedure became effective on July 6, 2004. This procedure consists of the pages and changes listed
Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led
Upgrading Your SQL Server 2000 Database Administration (DBA) Skills to SQL Server 2008 DBA Skills Course 6317A: Three days; Instructor-Led About this Course This three-day instructor-led course provides
IT Assurance - Business Continuity and Disaster Recovery
Audit Summary Report October 2006 PAPER D IT Assurance - Business Continuity and Disaster Recovery Audit 2006/2007 Paper D - 1 External audit is an essential element in the process of accountability for
OPERATIONAL STANDARD
1 of 11 1. Introduction The International Safe Transit Association (ISTA), a non-profit association whose objective is to prevent product damage and excess packaging usage within the distribution environment.
White Paper: Financial Services Compliance
www. e g n y t e. c o m White Paper: Financial Services Compliance SEC Rule 17a for Broker-Dealers SEC Rule 31a-2 and 204-2 for Investment Advisors www.egnyte.com 2011 Egnyte Inc. All rights reserved.
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS
POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect
EMA Clinical Laboratory Guidance - Key points and Clarifications PAUL STEWART
EMA Clinical Laboratory Guidance - Key points and Clarifications PAUL STEWART Framework Labs generate data that are used to make decisions on the safety and efficacy of medicinal products; consequently,
Disaster Recovery Planning for Homesteaders 2004 Paul Edwards & Associates
Disaster Recovery Planning for Homesteaders 2004 Paul Edwards & Associates Introduction The term homesteading comes from the days of the pioneers that setled in the midwest and western United States. That
DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2. Data Management Requirements for Central Data Management Facilities
DAIDS Appendix 2 No.: DWD-POL-DM-01.00A2 Data Management Requirements for Central Data Management Facilities The following clinical trial data management requirements must be met in order to ensure the
SEMETS3-68 Performing engineering software configuration management
Performing engineering software configuration management Overview This unit identifies the competences you need to perform software configuration management activities, from initial product definition
Recovery Management. Release Data: March 18, 2012. Prepared by: Thomas Bronack
Recovery Management Release Data: March 18, 2012 Prepared by: Thomas Bronack Section Table of Contents 8. RECOVERY MANAGEMENT... 4 8.1. INTRODUCTION TO RECOVERY MANAGEMENT... 4 8.1.1. DEFINITION... 4 8.1.2.
Review and Approve Results in Empower Data, Meta Data and Audit Trails
Review and Approve Results in Empower Data, Meta Data and Audit Trails 2013 Waters Corporation 1 What is an audit trail? Systematic story of the data from creation, through interpretation and final assessment
ScreenMaster RVG200 Paperless recorder FDA-approved record keeping. Measurement made easy
Information INF13/147 EN ScreenMaster RVG200 Paperless recorder FDA-approved record keeping Measurement made easy Guidance on the use of the RVG200 paperless recorder for electronic record keeping in FDA-approved
IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results
Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE
ILLINOIS DEPARTMENT OF CENTRAL MANAGEMENT SERVICES CLASS SPECIFICATION DATA PROCESSING OPERATIONS SERIES CLASS TITLE POSITION CODE EFFECTIVE DATA PROCESSING OPERATOR 11425 4-16-89 DATA PROCESSING ASSISTANT
Quality Assurance/Quality Control Plan: Samples and Manual for Development
DRAFT Quality Assurance/Quality Control Plan: Samples and Manual for Development Report prepared by Dr. Natalya Parasyuk for project CAPACITY BUILDING FOR IMPROVING THE QUALITY OF GREENHOUSE GAS INVENTORIES
- 1 - StruxureWare TM Data Center Expert Periodic Maintenance. Software Integration Service. 1.0 Executive Summary. 2.0 Features & Benefits
Statement of Work - 1 - StruxureWare TM Data Center Expert Periodic Maintenance StruxureWare Data Center Expert Periodic Maintenance Software Integration Service Service 1.0 Executive Summary Table of
Disaster Recovery and Business Continuity Plan
Disaster Recovery and Business Continuity Plan Table of Contents 1. Introduction... 3 2. Objectives... 3 3. Risks... 3 4. Steps of Disaster Recovery Plan formulation... 3 5. Audit Procedure.... 5 Appendix
CITY UNIVERSITY OF HONG KONG. Information Classification and
CITY UNIVERSITY OF HONG KONG Handling Standard (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification
HIPAA Security. assistance with implementation of the. security standards. This series aims to
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
State Meat and Poultry Inspection (MPI) Program Laboratory Quality Management System Checklist
This checklist is intended to help laboratories improve the quality of their testing programs with regard to meat and poultry testing samples, in order to ensure those laboratories are at least equal to
REGULATIONS COMPLIANCE ASSESSMENT
ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS
HIPAA: In Plain English
HIPAA: In Plain English Material derived from a presentation by Kris K. Hughes, Esq. Posted with permission from the author. The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Pub.
Evaluating Laboratory Data. Tom Frick Environmental Assessment Section Bureau of Laboratories
Evaluating Laboratory Data Tom Frick Environmental Assessment Section Bureau of Laboratories Overview of Presentation Lab operations review QA requirements MDLs/ PQLs Why do we sample? Protect physical,
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT. Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL
Page 1 of 1 PORTLAND ORTHOPAEDICS PTY LTD MARGRON TOTAL HIP REPLACEMENT Unit 3, 44 McCauley Street MATRAVILLE NSW 2036 PROCEDURE DOCUMENT & RECORD CONTROL This revision supersedes all previous revisions.
Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements
/ WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009
STATE OF NEBRASKA STATE RECORDS ADMINISTRATOR DURABLE MEDIUM WRITTEN BEST PRACTICES & PROCEDURES (ELECTRONIC RECORDS GUIDELINES) OCTOBER 2009 Following is a voluntary guideline issued by the State Records
How To Use A Court Record Electronically In Idaho
Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents
Final Audit Report. Audit of Data Integrity MCCS Feeder System Interfacing with SAP
Final Audit Report Audit of Data Integrity MCCS Feeder System Interfacing with SAP April 2008 Table of Contents Executive Summary... ii Introduction...........1 Background... 1 Audit Objectives... 1 Scope
Business Continuity Planning and Disaster Recovery Planning. Ed Crowley IAM/IEM
Business Continuity Planning and Disaster Recovery Planning Ed Crowley IAM/IEM 1 Goals Compare and contrast aspects of business continuity Execute disaster recovery plans and procedures 2 Topics Business
DISASTER RECOVERY PLAN
DISASTER RECOVERY PLAN Section 1. Goals of a Disaster Recovery Plan The major goals of a disaster recovery plan are: To minimize interruptions to normal operations. To limit the extent of disruption and
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
1 Quality Assurance and Quality Control Project Plan
1 Quality Assurance and Quality Control Project Plan The purpose of this section is to describe the quality assurance/quality control program that will be used during the system specific field testing
Master Document Audit Program
Activity Code 11510 B-1 Planning Considerations Information Technology General System Controls Audit Specific Independence Determination Members of the audit team and internal specialists consulting on
COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL
PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card
Business Continuity Position Description
Position Description February 9, 2015 Position Description February 9, 2015 Page i Table of Contents General Characteristics... 2 Career Path... 3 Explanation of Proficiency Level Definitions... 8 Summary
APPLICATION FOR LOUISIANA STATE ARCHIVES IMAGING EXCEPTION TO LA. R.S. 44:39 SSARC 790
APPLICATION FOR LOUISIANA STATE ARCHIVES IMAGING EXCEPTION TO LA. R.S. 44:39 SSARC 790 Mailing: PO Box 94125, Baton Rouge, LA 70804-9125 Location: 3851 Essen Lane, Baton Rouge, LA 70809-2137 BEFORE completing
