Risk-Based Monitoring



Similar documents
through advances in risk-based

Why Monitoring Is More Than Just SDV

Adopting Site Quality Management to Optimize Risk-Based Monitoring

Relationele Databases 2002/2003

IT-waardeketen management op basis van eeuwenoude supply chain kennis

Lean in het digitale tijdperk. Hans Toebak, Arjen Markus, 13 november 2013

Risk based monitoring using integrated clinical development platform

The information in this report is confidential. So keep this report in a safe place!

GMP-Z Annex 15: Kwalificatie en validatie

CLINICAL DATA MONITORING PLAN (CDMoP) PROTOCOL # [0000] [TITLE]

Citrix Access Gateway: Implementing Enterprise Edition Feature 9.0

Wat te doen met het diabetes guidance document anno 2015 in de praktijk? : Samen Sterk & Samen SNEL.

Specification by Example (methoden, technieken en tools) Remco Snelders Product owner & Business analyst

How Industry Can Partner with FDA in Defining a Risk- Based Monitoring Program

Examen Software Engineering /09/2011

Risk Based Approach to on site monitoring Do we need to check everything? Roger Newbery, VP Clinical Management EMEA, PPD

Upside down you re turning me Tarte Tartin lean strategy. Marloes Hendriks, Henk Veraart Elisabeth TweeSteden Hospital, The Netherlands

Site monitoring Transformed forever?

Telematica in het weggoederenvervoer

OGH: : 11g in de praktijk

Assuring the Cloud. Hans Bootsma Deloitte Risk Services +31 (0)

Morningstar Advisor Work Station

Special Interest Group Oracle WebCenter

Research Report. Ingelien Poutsma Marnienke van der Maal Sabina Idler

ISO de internationale richtlijn voor risicomanagement

VIDEO CREATIVE IN A DIGITAL WORLD Digital analytics afternoon. Hugo.schurink@millwardbrown.com emmy.brand@millwardbrown.com

Big Data.. Big Business?

Barnett International and CHI's Inaugural Clinical Trial Oversight Summit June 4-7, 2012 Omni Parker House Boston, MA

APRIL 22, 2014 SLIDE 1 INTRODUCTION TO VSPHERE WITH VCENTER OPERATIONS MANAGER (VSOM)

RBM as Competitive Advantage for Mid-sized CROs

Martine de Bruijne, Cordula Wagner Safety 4 Patients

Inclusive Education : An international perspective

HOE WERKT CYBERCRIME EN WAT KAN JE ER TEGEN DOEN? Dave Maasland Managing Director ESET Nederland

IP-NBM. Copyright Capgemini All Rights Reserved

Making Leaders Successful Every Day

IC Rating NPSP Composieten BV. 9 juni 2010 Variopool

Oversight Management: een zinvolle aanvulling!

Platform voor Informatiebeveiliging IB Governance en management dashboards

How To Get A Ticket To The Brits Engels

The state of DIY. Mix Express DIY event Maarssen 14 mei 2014

A Model for Centralized Monitoring & Clinical Data Management Reducing costs while ensuring compliance, risk mitigation & quality

total dutch speak Dutch instantly no books no writing absolute confi dence

CO-BRANDING RICHTLIJNEN

CMMI version 1.3. How agile is CMMI?

Is het nodig risico s te beheersen op basis van een aanname..

U.S. Food and Drug Administration

Met wie moet je als erasmusstudent het eerst contact opnemen als je aankomt?

Managed Security Services Als je het doet moet je het goed doen.

Welcome to the training on the TransCelerate approach to Risk-Based Monitoring. This course will take you through five modules of information to

MAYORGAME (BURGEMEESTERGAME)

GMP-Z Hoofdstuk 4 Documentatie. Inleiding

Organisaties groot en klein, beginnen zich meer en meer te realiseren dat inzicht in (real-time) data helpt

Informatiebeveiliging volgens ISO/IEC 27001:2013

Pitches Datamanagement:

AANMELDING. International student - Berkeley College

Duurzaam Supply Management

OutSystems on Oracle

Version history Version number Version date Effective date 01 dd-mon-yyyy dd-mon-yyyy 02 dd-mon-yyyy dd-mon-yyyy 03 (current) dd-mon-yyyy dd-mon-yyyy

Proprietary Kroll Ontrack. Data recovery Data management Electronic Evidence

UvA college Governance and Portfolio Management

ISACA Roundtable. Cobit and 7 september 2015

From QMS to IMS. Name: Arie Boer Function Risk Manager Date: 19 december 2014

Logging en Monitoring - privacy, beveiliging en compliance Enkele praktijkvoorbeelden

Hot Topics Treasury Seminar

Hoofdstuk 2 Samenwerking en afstemming in de zorgketen

MIMOA. UID MIMOA Demo 0.8 Version: UID_v0.83.vsd. Versie: UID_v0.83.vsd. UID MIMOA Launch. Matthijs Collard 1. Elements 2. Elements 2 3.

Hoe kies je de juiste Microsoft Hosted Exchange Service Provider?

tablet technologie in het onderwijs

Maximizer Synergy. BE Houwaartstraat 200/1 BE 3270 Scherpenheuvel. Tel: Fax:

ABN AMRO Bank N.V. The Royal Bank of Scotland N.V. ABN AMRO Holding N.V. RBS Holdings N.V. ABN AMRO Bank N.V.

THE EMOTIONAL VALUE OF PAID FOR MAGAZINES. Intomart GfK 2013 Emotionele Waarde Betaald vs. Gratis Tijdschrift April

Data Driven Strategy. BlinkLane Consul.ng Amsterdam, 10 december Ralph Hofman Arent van t Spijker

Patient Centric Monitoring Methodology

CLINICAL DEVELOPMENT OPTIMIZATION

Avg cost of a complex trial $100mn. Avg cost per patient for a Phase III Study

Visie op Hosted Services: Cloud Computing. Michel N guettia Business Lead Server

Copyright 2015 VMdamentals.com. All rights reserved.

How To Write A Sentence In Germany

SharePoint. Microsoft Dynamics. SharePoint

Quality Monitoring Checklist

Linux Network Server: Firewalls

IAB Programmatic educatie dag

Duurzaam Supply Management

De tarieven van Proximus Niet meer gecommercialiseerde Bizz packs

Load Balancing Lync Jaap Wesselius

De rol van requirements bij global development

Hoe bestuurt u de cloud?

Transcription:

Risk-Based Monitoring Evolutions in monitoring approaches Voorkomen is beter dan genezen! Roelf Zondag 1

wat is Risk-Based Monitoring? en waarom doen we het? en doen we het al? en wat is lastig hieraan? 2

Waarom Risk-Based monitoring? Bijv. FDA guidance document Trial complexity Investigator experience variability Site infrastructure complexity Regulatory scrutiny Development cost Competition for subjects Post approval commitments The primary focus should be on the processes that are critical to protecting human subjects, maintaining integrity of study data and compliance with applicable regulations I N C R E A S I N G Observations / findings should be used to correct investigator and site practices 3

Waarom Risk-Based monitoring? Omdat we niet alles kunnen checken We hebben geen ongelimiteerde resources budget planning Omdat we complexe processen hebben Quality scope Conclusie: We moeten slim zijn en dat doen wat er toe doet, dus inzicht in de processen hebben en zien waar de risico s zitten 4

5

Wat is een proces? Meet gegevens Input Output Patient dient zich aan Patient heeft consent gegeven en doet mee met de studie. Beinvloed het proces zoek de route cause Helaas is de verkeerde versie van het ICF gebruikt en ontbreekt de datum 6

Risk-Based monitoring Data-driven Trial Execution begins with an in-depth risk assessment where a team of experts evaluates the scientific and operational risk of each protocol. Data / Systems Data surveillance allows the optimization and the adaptation of monitoring throughout the trial, re-assessing risk and applying the right action at the right time. We use the right type of monitoring at the right time (on-site, remote, centralized), monitoring sites, data, patients and events that require more attention and focus. 7

Triggered monitoring Enrollment In current practice many clinical monitoring plans require site visits to take place every 4, 6, or 8 weeks Triggers may be work volume based or risk management based Patient safety Defined patient visit number Models have become more sophisticated over time with site visits being pooled for use across studies/programs and scheduled based on work volume triggers Triggers are defined based on specific protocol features and requirements Data review risk indicators Site Visit Triggers Data quality indicators Page volume This model allows for a more dynamic management of monitoring resources by scheduling visits based upon an algorithm of pre determined triggers that initiate a monitoring visit only when there is a need 8

Risk Management 9

Wie houdt er een risk log voor zijn studie / sites bij? 10

Risk Management > Systematic process of planning for, identifying, analyzing, responding to, and monitoring project risk > Involves processes, tools & techniques helping the manager minimizing the probability and consequences > RM is most effective when performed early in the life of project or program and is a continuing responsibility during the program or project > Managers should plan time to identify and manage risk and issues and maintain a risk register /risk log 11

What is a Risk? Event / condition that did not happen yet Effect on achieving an objective A risk has a cause Risk is uncertain (has a probability) A risk has a consequence (impact) Prevention 12

What is an Issue? Event / condition is happening Effect on achieving an objective An issue has a cause An issue has a consequence (impact) Solving 13

Benefits of Risk Management Hard Benefits Soft Benefits Enables better plans, schedules and budgets Better contingencies view Discourages unsound financial projects Better management of future projects More objective view of alternatives Provides cost/benefit analysis Gives information for management decisions It avoids crisis management Improves communications Improved team spirit Helps staff to assess risks Can focus on real/vital issues Enables greater risk taking Looks good from a customer/partner viewpoint 14

Risk Management Process Risk assessment > Risk Management Planning > Identify possible risks and their description Risk analysis (qualitative / quantitative) > Assess risk probability > Asses risk impact Risk management > Risk response planning (proactive & reactive measures) > Risk monitoring and control (risk watch list / risk log) 15

Define events / conditions use risk categories approach 2. Risk Identification 3. Qualitative Risk Analysis probability & impact 1. Risk Management Planning Risk Management Processes 4. Quantitative Risk Analysis 6. Risk Monitoring & Control 5. Risk Response Planning metrics & triggers avoidance transference mitigation acceptance contingencies 16

Risk log content Risk Title Risk Description Probability Impact Exposure Trigger Effect Mitigation Contingency Cost of mitigation / contingency (short text, SMART - principles) (description, SMART-principles) (high, medium, low) (high, medium, low) (probability*impact) (metrics) (description of the impact) (preventive action) (corrective action) 17

Exposure Impact / Probability Low (1) Medium (2) High (3) High (3) Medium High Unacceptable Medium (2) Low Medium High Low (1) Low Low Medium Exposure = Probability x Impact 18

Risk, Site A Title > There is a probability that the contract of site A will not be signed before date xxx Description > There is a probability that the site contract of site x will not be signed before date xxx due to the communication loops between. legal and the legal department of the site. This will impact patient recruitment. Probability = medium, Impact =high Trigger > If contract is not signed one week before official planned SIV Effect > As this is a key enrolling site and is on the critical path, patient recruitment will be delayed by 4 weeks meaning the current planned enrolment will not be met and enrolment period must be extended. It is estimated that 10 patients will be missed if the enrolment period stays unchanged. 19

Risk, Site A Mitigation > Facilitate the contract negotiation process by setting up a TC between legal of the hospital and legal of.. avoiding email communication and promote direct contact. > When a new version of the contract is available actively follow up the site to check the review status of the contract. Contingency > to activate backup site B to provide an additional 10 patients so the enrolment period does not have to be extended. > Extend the enrolment period for Site A Costs > Mitigation costs are estimated at 0 Euro. Backup site scenario will cost 100000 Euro. > Change enrolment period will cost 0 Euro when looking at global timelines 20

Conclusie Risk management Professionaliseer Gebruik systemen en de informatie uit systemen (metrics) Proces georienteerd Root cause analysis Gebruik systemen en de informatie uit systemen (metrics) Project Triangle Site manager Pro-actief Trends 21

Quiz In this new paradigm: in order to verify protocol & GCP compliance, is it better 1. to do Source Data Verification (SDV)? 2. to do Site Process Verification (SPV)? 3. to do a mix of SDV and SPV? 22

Consequenties Meer electronische integratie ecrf, CTMS, EPD, Data Warehouse Gereduceerde SDV en meer Site Process Verificatie Verschuiving naar central monitoring vs onsite monitoring meer telefonische opvolging Data management functie merged met CRA functie Operationeel, medisch, over sites en landen heen kijken Dashboards met data & signals Data gedreven besluitvorming Triggered monitoring Eindpunten, Missing data, Safety, outlayers.. 23

24