j5 International www.j5int.com sales@j5int.com



Similar documents
FDA 21 CFR Part 11 Electronic records and signatures solutions for the Life Sciences Industry

MHRA GMP Data Integrity Definitions and Guidance for Industry March 2015

July 12, 2013 Page 1 of 5 BellHawk Systems Corporation

Introduction. Connection security

MHRA GMP Data Integrity Definitions and Guidance for Industry January 2015

IBM asset management solutions White paper. Using IBM Maximo Asset Management to manage all assets for hospitals and healthcare organizations.

Discussion Paper on the Validation of Pharmacovigilance Software provided via SaaS

The Impact of 21 CFR Part 11 on Product Development

THE DELTON GROUP MANPOWER TRAINING CONSULTANCY SHORT COURSE PROGRAMME TOPICS LISTING

Abstract. SEC 17a-4(f) Compliance Assessment. Technical Report. Prepared by Cohasset Associates, Inc.

Integrating LANGuardian with Active Directory

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Oracle WebCenter Content

Empower TM 2 Software

Active Directory Manager Pro New Features

M-Files QMS. Out-of-the-Box Solution for Daily Quality Management

Laboratory Information Management System

IBM Maximo Asset Management solutions for the oil and gas industry

Full Compliance Contents

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION

Federal Trade Commission Privacy Impact Assessment. Conference Room Scheduling PIA

Manual 074 Electronic Records and Electronic Signatures 1. Purpose

NOTICE OF AMENDMENT CERTIFIED MAIL - RETURN RECEIPT REQUESTED. November 28, 2012

This interpretation of the revised Annex

RTP s NUCLEAR QUALITY ASSURANCE PROGRAM

orldox GX3 Cloud for Financial Services Worldox GX3 Cloud Compliance Outline The Best of both Worlds. / Whenever. Wherever.

Prospect module. Quick reference guide. Opmetrix app version 4.10 onwards

Management of Change: Addressing Today s Challenge on Documenting the Changes

Document Change Control

Using Digital Signatures in SAP QM to Meet Regulatory Requirements

ProficyTM. HMI/SCADA - ifix I MPLEMENTING S ECURITY

Electronic Document and Record Compliance for the Life Sciences

FDA 21 CFR Part 11 Features

Find the Who, What, Where and When of Your Active Directory

21 CFR Part 11 Electronic Records & Signatures

Data Protection. Administrator Guide

Protecting Business Information With A SharePoint Data Governance Model. TITUS White Paper

Achieving 21 CFR Part 11 Compliance with Appian

ChromQuest 5.0 Chromatography Data System

AutoSave. Achieving Part 11 Compliance. A White Paper

Delivering operations integrity through better plant safety, availability and compliance across your entire enterprise

White paper December IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview

Effective Asset Management for Life Sciences

Risk-Based Approach to 21 CFR Part 11

rsdm and 21 CFR Part 11

Ecom Infotech. Page 1 of 6

SAFETY AND HEALTH PROGRAM

User Manual for Web. Help Desk Authority 9.0

Mobile App Quick Start

Managing User Security: Roles and Scopes

TurboTag User Manager Software Version Setup and Operating Instructions. Table of Contents

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

SharePoint Configuration Guidance for 21 CFR Part 11 Compliance

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

Audit TM. The Security Auditing Component of. Out-of-the-Box

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

CAISO Information Security Requirements for the Energy Communication Network (ECN)

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

Access Control and Audit Trail Software

DeltaV Logbooks. Benefits. Introduction. Minimize shift handover risk. Electronically document events, observations, and notes.

Installation Steps for PAN User-ID Agent

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

Electronic Logbook. Hedgehog-2. version 2.7. Quick Start. Revision 1.3 of 10/31/2012

Spectroscopy Configuration Manager (SCM) Software. 21 CFR Part 11 Compliance Booklet

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Strategic Asset Tracking System User Guide

The Institute of Internal Auditors Detroit Chapter Presents

Creating a generic user-password application profile

PCI Compliance for Cloud Applications

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

Content Management System

Integrating SharePoint Sites within WebSphere Portal

Monitoring Windows Event Logs

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

esoms Ensure safe, efficient, and reliable operation and maintenance of facility assets

For technical assistance, please contact: Thermo Nicolet Corporation 5225 Verona Road Madison WI

Global Headquarters: 5 Speen Street Framingham, MA USA P F

ComplianceSP TM on SharePoint. Complete Document & Process Management for Life Sciences on SharePoint 2010 & 2013

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)

4Sight Calibration Management Software

INGEN PLANT MANAGEMENT

Progress zenon projects to FDA 21 CFR Part 11 compliance

Administration Guide Novell Filr May 2014

Avaya Mailbox Manager and Unimax 2nd Nature A Comparison

ATTACHMENT III Tender No HD Laboratory Information Management System (LIMS)

USER MANUAL (PRO-CURO LITE, PRO & ENT) [SUPPLIED FOR VERSION 3]

Wonderware InBatch. Flexible batch management

GFI White Paper PCI-DSS compliance and GFI Software products

LogInspect 5 Product Features Robust. Dynamic. Unparalleled.

Process Solutions. DynAMo Alarm & Operations Management. Solution Note

OPC & Security Agenda

Achieving PCI-Compliance through Cyberoam

The Advantages of Enterprise Historians vs. Relational Databases

HOBCOM and HOBLink J-Term

Dream Report vs MS SQL Reporting. 10 Key Advantages for Dream Report

elearning Course Catalog

HP StorageWorks Reference Information Storage System Designed to Assist Financial Services Organizations Comply with Retention Requirements

Meditech 6 How to Login & Find a Patient in EMR

LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.

PKI Adoption Case Study (for the OASIS PKIA TC) ClinPhone Complies with FDA Regulations Using PKIbased Digital Signatures

Transcription:

j5 OMS LOGBOOKS AND REGULATORY COMPLIANCE IN THE LNG INDUSTRY WHITE PAPER Authors: Dr. Don Glass and Dr. Nicholas Hurley (j5 International) Compliance within the LNG industry is primarily about safety (staff, neighbours, plant, and infrastructure), the environment and security (of facilities and data). J5 International aims to ensure the design, configuration and implementation of its software and associated applications enhances the safety, positive environmental impact and security of LNG Operations by complying with all regulatory requirements. j5 also check that nothing in the design and configuration negates any controls and checks that have been put in place. j5 International www.j5int.com sales@j5int.com

Executive Summary Compliance within the LNG industry is primarily about safety (staff, neighbors, plant, and infrastructure), the environment and security (of facilities and data). St James Software aims to ensure the design, configuration and implementation of its software and associated applications enhances the safety, positive environmental impact and security of LNG Operations by complying with all regulatory requirements. {We also check that nothing in the design and configuration negates any controls and checks that have been put in place}. j5 International achieves this objective in a two-step process during the configuration of any application for the LNG Industry: i) Evaluate the process steps from an Operator-centric view during the design and configuration stages, ii) Ensure that the key requirements common to all regulatory standards are complied with. The j5 OMS and associated a p p l i c a t i o n s is operator centric software. This means that we have designed and configured the software to see the plant (and process) from the Operator s point of view. The Operator and Operations Manager holds ultimate fiduciary responsibility for ensuring that the entire operation complies at all times with safety, environmental and security standards. We attempt to support the Operator (operations department) in meeting all standards and even in assisting the Operator to identify potential situations that could be considered unsafe, potentially hazardous or insecure. 2

The consulting and engineering staff at j5 International has experience in the LNG, Refinery, Petrochemical, Pipeline and Power industries and have deployed Operations Logbook, Shift Handover Logbooks and Compliance Monitoring logbooks in these industries in many different countries. During the business analysis and design phases of the project we constantly refer to previous examples, best practice documents and regulatory requirements, thus ensuring that we consider all aspects of regulatory compliance from the outset. We have identified 9 key characteristics (regulatory requirements) that are common to all regulations used in these industries. We believe that compliance with all 9 will result in a clientspecific application meeting the local (regional and/or international) regulatory requirement as well. This is discussed in sections 3 and 4 below. The configuration of the Logbook applications consists of two major phases, namely: 1) define & structure all the fields and 2) format the layout. In defining the fields to be used, the configuration engineer, business analyst and client ensure that all compliance matters are addressed and secured. The formatting (or layout) stage is to provide an ergonomically acceptable logbook and reports for different users. The layout stage has no impact on the ability of the application to remain compliant to safety, environmental or security regulations. The j5 OMS system is designed to be compliant to data and data-security regulations at its core. This means that presentation configuration and layout changes can be offered without fear of compromising compliance. j5 International - j5 OMS - Compliance Methodology j5 International has developed the j5 OMS framework in such a manner so that compliance is easily achieved and supported. The configuration process comprises of two main steps, namely: i) Define all required fields ii) Format the Layout DEFINE THE FIELDS: During this stage, a comprehensive list of every field is created. This list can be extended and added to at a later date, so that future enhancements can be made quite easily. The list is created after discussion with the client (operations department) and based on recommendations arising from best practice suggestions, other projects and industries. Once the fields have been listed, the following information is captured for each field: 3

a) Source of the field content (manual entry; transfer from DCS, Historian; external system) b) Nature of the content (text, data, scientific, pulldown, conditional, etc.) c) Format of the content including conditional formatting d) Impact of this field on any other fields (and impact ON this field from elsewhere) e) Any rules that apply to this field (E.g. an approval field cannot be set approved before a previous signature) f) Any conditions that apply to this field or arising from the content of this field g) Any conditions that this field causes, or that must be applied to this field h) Any workflow steps that must be applied to this field i) Any workflow processes that this field triggers j) Any specific actions that start, stop or change because of the content of this field. When compiling this table, the client and business analyst can ensure that all compliance requirements are catered for. Format the Logbook(s) Layout: The layout of each logbook is an independent stage. The look and feel or format of each logbook can be adjusted to suit each specific user or supervisor or manager or department. During the layout (formatting) stage, the fields defined as per the section above are simply given a position on the page (like putting bricks on a wall). This layout process does not change any of the rules which affect regulatory compliance. 4

LNG Process By nature of the product and the industry, LNG processing plants are considered to be potentially hazardous and represent a potential environmental risk. For this reason, all LNG facilities are controlled under local, regional and international regulatory authorities and in many cases fall under the jurisdiction of many different authorities. In order to ensure that the j5 OMS platform and range of applications is as widely compliant as possible, j5 International has evaluated the use of j5 OMS at every stage in the LNG process including Ship loading and Ship unloading as per Fig 1. j5 Applications are currently used by Operations Departments in various facilities around the world and (collectively) cover every stage in the overall LNG process. Together with the evaluation of the use at each stage in the LNG process, j5 International has examined the various industrial and regulatory standards applicable to the LNG industry and has extracted nine key requirements that we believe form the basis of all regulations. We have ensured that the j5 OMS software is fully compliant against each of these generic requirements and consequently we are confident to submit our software to any specific (local, regional or international) authority for specific certification as and when required. Fig1. LNG Process stages http://en.wikipedia.org/wiki/lng Key Regulatory Requirements j5 International staff have examined a number of LNG industry standards, in particular the US Federal Energy Regulation Commission s document 18 CFR and related references. Comparing this document with those in other industries such as Nuclear, Refinery, Pipelines, Food, Pharmaceutical and Water we have identified nine key requirements that form the basis of all regulatory standards linked to electronic logging, data storage, notes, retention of data, source of data and reporting. We address the j5 International compliance against each of these requirements below. Comprehensive: During the design stage (URS User Requirement Specification) we undertake a business analysis with the Operations manager (Operations team) and we also provide suggestions and examples from other applications and other industries best practice suggestions. This URS is then tested against the Regulatory standards and compliance rules applicable to the specific project in that location (e.g. specific to LNG processing in Peru). Together with the responsible end-user (usually the Operations Manager) we make sure that every piece of required information is captured, or imported from another system (such as DCS, SCADA, Historian, etc.) and is available within the j5 OMS application. 5

We can configure the application so that all compulsory information has to be collected and saved before the Operator can close a log entry or end his shift. Audit-logs: Every entry, every change, every edit and every erasure (if erasing is allowed) creates an audit entry. The audit-log can never be changed or erased. It is possible to print a report containing each and every change made. It is also possible to schedule a special report daily, weekly, etc. for the regulatory officer within the company, so that the officer can check that any changes are justified. Controlled Changes (Identification): The j5 Operations Logbook is highly configurable. Each field, each logbook view and all reports can be configured so that each user can have clear (and strictly managed) set of permissions on what they can add, change, edit or delete. The system ensures nobody without correct authorization can make or change any log entry, and it also ensures that every change has a clear indication of whom and when that change was made. The logged-in user s identity is logged against each entry. Non-erasable: It is possible to configure the application so that nothing may be erased. This means that once an entry has been saved, it may never be erased. This rule is however not always required, because of the Audit- Log protection (see entry above) and some clients have requested the following alternatives: 6

Only the person who made the entry can modify or erase that entry Only that person s supervisor (or a manager) can erase an entry, once saved. The delete command puts a line-through the existing entry to show that it is to be deleted, but the words remain visible Time-date Stamps: Every log has at least two time & date fields associated with the entry. (The name of the logged-in user is also stored, see controlled changes above): Time, date, user of the actual log entry (this entry cannot be edited) Time and date of when the event occurred, it is possible that the Operator is reporting on an event that occurred at some earlier time, the default entry is the time the log entry is made, but the Date-Time can be edited (once saved, this field cannot be changed) A third date, time, user entry is stored against a log entry whenever a CHANGE is made (last modified) Security: Only securely logged-on users may make log entries and make changes. We support various logging-in options, including: LDAP integration with Active Directory 2 nd level sign-on if required. (i.e. LDAP ++ ) Biometric logon RFID and other smart card login support The relevant fields and audit logs maintain a clear record of which person has made which change and when. 7

Ease of Access of Information: It is possible for a suitably authorized person to search all log entries, all changes and all audit logs. Reports can be generated, requested and scheduled. Clear Identification: Every log entry is clearly and permanently linked to suitable identification including: Name and position of user Name and position of person who edited Plant or process being referred to Equipment (or tag) to which the log entry refers Reports and Information: The j5 OMS framework has been designed to enable Operations Departments to search for, find and report on specific information very quickly. This is achieved through various means, the most regular being: Filters, we deploy (user configurable) filter buttons that can be personalized for different users Report generator Logbook Examples This section includes some examples of different logbook layouts (formats). It must be stressed that because the Logbook is highly configurable, each project (and each user within each project) can have a different format. The following screencasts are examples of some Operational Logbooks used within LNG, Refinery, Petrochemical and Pipeline facilities in different countries. They are not fixed format and can be changed in language, layout, content, format or order. 8

General Logbook Example: Shift Handover Logbook Example: 9

Work Order Logbook Example: Multi-lingual Example: 10

Reporting Logbook Example: Hazard Management Example: 11

Shutdown Management Example: Inspection Rounds Example: 12

Incident Management Example: j5 OMS Configurable Structure: 13

Meter Calibration Example: Visit www.j5int.com for more information