21 CFR Part 11 LIMS Requirements Electronic signatures and records



Similar documents
21 CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES CFR Part 11 Compliance PLA 2.1

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries

The Impact of 21 CFR Part 11 on Product Development

Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures

Compliance Matrix for 21 CFR Part 11: Electronic Records

Full Compliance Contents

rsdm and 21 CFR Part 11

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements

Implementation of 21CFR11 Features in Micromeritics Software Software ID

Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.

21 CFR Part 11 Compliance Using STATISTICA

Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala

InfinityQS SPC Quality System & FDA s 21 CFR Part 11 Requirements

21 CFR Part 11 White Paper

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION

21 CFR Part 11 Implementation Spectrum ES

DeltaV Capabilities for Electronic Records Management

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM

21 CFR Part 11 Checklist

FILEHOLD DOCUMENT MANAGEMENT SYSTEM 21 CFR PART 11 COMPLIANCE WHITE PAPER

FDA 21 CFR Part 11 Electronic records and signatures solutions for the Life Sciences Industry

DeltaV Capabilities for Electronic Records Management

Oracle WebCenter Content

FDA Title 21 CFR Part 11:Electronic Records; Electronic Signatures; Final Rule (1997)

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Compliance in the BioPharma Industry. White Paper v1.0

Enabling SharePoint for 21 CFR Part 11 Compliance - Electronic Signature Use Case

21 CFR Part 11 Electronic Records & Signatures

Agilent MicroLab Software with Spectroscopy Configuration Manager and Spectroscopy Database Administrator (SCM/SDA)

Thermal Analysis. Subpart A General Provisions 11.1 Scope Implementation Definitions.

Manual 074 Electronic Records and Electronic Signatures 1. Purpose

Empower TM 2 Software

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

Software Manual Part IV: FDA 21 CFR part 11. Version 2.20

SolidWorks Enterprise PDM and FDA 21CFR Part 11

A ChemoMetec A/S White Paper September 2013

Nova Southeastern University Standard Operating Procedure for GCP. Title: Electronic Source Documents for Clinical Research Study Version # 1

AutoSave. Achieving Part 11 Compliance. A White Paper

Implementing CitectSCADA to meet the requirements of FDA 21 CFR Part 11

Eclipsys Sunrise Clinical Manager Enterprise Electronic Medical Record (SCM) and Title 21 Code of Federal Regulations Part 11 (21CFR11)

Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E.

Intland s Medical Template

Using the Thermo Scientific Dionex Chromeleon 7 Chromatography Data System (CDS) to Comply with 21 CFR Part 11. Compliance Guide

Data Management PACT Workshop: Design & Operation of GMP Cell Therapy Facilities April 10 th -11 th, 2007

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

ScreenMaster RVG200 Paperless recorder FDA-approved record keeping. Measurement made easy

Compliance Response SIMATIC SIMATIC PCS 7 V8.1. Electronic Records / Electronic Signatures (ERES) Edition 03/2015. Answers for industry.

For technical assistance, please contact: Thermo Nicolet Corporation 5225 Verona Road Madison WI

Using Chromeleon Chromatography Management Software to Comply with 21 CFR Part 11

REGULATIONS COMPLIANCE ASSESSMENT

Guidance for Industry Part 11, Electronic Records; Electronic Signatures Scope and Application

How To Control A Record System

Spectroscopy Configuration Manager (SCM) Software. 21 CFR Part 11 Compliance Booklet

TIBCO Spotfire and S+ Product Family

Electronic Records and Signatures: Compliance with Title 21 CFR Part 11 Requirements

Electronic Document and Record Compliance for the Life Sciences

21 CFR Part 11 Deployment Guide for Wonderware System Platform 3.1, InTouch 10.1 and Historian 9.0

Achieving 21 CFR Part 11 Compliance with Appian

Guidance for Industry Computerized Systems Used in Clinical Investigations

LabChip GX/GXII with LabChip GxP Software

CoSign for 21CFR Part 11 Compliance

Waters Empower Software Seamlessly Manages Regulated Data to Aid in 21 CFR Part 11 Compliance

Review and Approve Results in Empower Data, Meta Data and Audit Trails

Guidance for Industry. 21 CFR Part 11; Electronic Records; Electronic Signatures. Electronic Copies of Electronic Records

Guidance for Industry COMPUTERIZED SYSTEMS USED IN CLINICAL TRIALS

Waters Empower 2 Software Seamlessly Manages Regulated Data to Aid in 21 CFR Part 11 Compliance

Sponsor Site Questionnaire FAQs Regarding Maestro Care

Auditing Chromatographic Electronic Data. Jennifer Bravo, M.S. QA Manager Agilux Laboratories

epblue GxP oftware manual Software version

Guidance for Industry. 21 CFR Part 11; Electronic Records; Electronic Signatures. Maintenance of Electronic Records

Software. For the 21 CFR Part 11 Environment. The Science and Technology of Small Particles

Guidance for Industry. 21 CFR Part 11; Electronic. Records; Electronic Signatures. Time Stamps

MHRA GMP Data Integrity Definitions and Guidance for Industry January 2015

Alfresco CoSign. A White Paper from Zaizi Limited. March 2013

Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide

Supplement to the Guidance for Electronic Data Capture in Clinical Trials

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014

U.S. FDA Title 21 CFR Part 11 Compliance Assessment of SAP Records Management

SIMATIC SIMATIC PCS 7 V8.0. Electronic Records / Electronic Signatures. Compliance Response. Answers for industry.

Sympatec GmbH System-Partikel-Technik WINDOX 4. Electronic Records/ Electronic Signatures Compliance Assessment Worksheet for 21 CFR Part 11

Clinical database/ecrf validation: effective processes and procedures

M-FILES QUALITY MANAGEMENT SYSTEM SIGNING OPTIONS

User Bulletin Cellular Detection System Analysis Software v4.0. Introduction. 21 CFR Part 11 Software Console - Administrators Guide

OECD DRAFT ADVISORY DOCUMENT 16 1 THE APPLICATION OF GLP PRINCIPLES TO COMPUTERISED SYSTEMS FOREWARD

This interpretation of the revised Annex

THE ROLE OF WATERS NUGENESIS SDMS IN 21 CFR PART 11 COMPLIANCE

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT

M-Files QMS. Out-of-the-Box Solution for Daily Quality Management

testo Saveris 21CFR Part 11 Software Instruction manual

MHRA GMP Data Integrity Definitions and Guidance for Industry March 2015

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to

Life sciences solutions compliant with FDA 21 CFR Part 11

Guidance for Industry

Bika Open Source LIMS. Top level functional specification Inventory and Supply Chain Management

Guidance for Industry

AuthentiMax Software for GloMax -Multi+

A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or

OpenText Regulated Documents for the Life Sciences Industry:

REVENUE REGULATIONS NO issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Transcription:

21 CFR Part 11 LIMS Requirements Electronic signatures and records Compiled by Perry W. Burton. Version 1.4, 8 Sept 2014 Table of contents 1. Purpose of this document 1 1.1 Notes to version 1.4 1 1.2 About the author 1 2. Definitions 2 3. 21 CFR Part 11 Requirements 5 3.1 Electronic Signatures 5 3.2 Audit Trails 8 3.3 Control of Identification and Password 10 3.4 Data Retention 11 3.5 Security 12 3.6 Personnel Qualification 12 3.7 System Documentation Controls 13 3.8 Control of System Management and Configuration 13 1. Purpose of this document The purpose of this document is to guide LIMS developers and implementers through the FDA's 21 CFR Part 11 for lab systems. Unless otherwise indicated, texts were sourced from US Food an Drug Administration (FDA) 1 in the U.S. Department of Health & Human Services. 1.1 Notes to version 1.4 Updated by lemoene V 1.3 Updated by Jordi Puiggené after review in Bika context to signify: in green font where Bika complies; in blue, where it is partially compliant or requires customisation; orange indicates inconsistencies or 'not applicable' V 1.1 and 1.2 were internally circulated drafts V 1.0 Original text before public discussion by Perry W Burton. Feedback and comment to be added. 1.2 About the author Perry W. Burton, CISA, CRISC, is an experienced cgmp Business Analyst in regulated industry environments. He specialises in supplier, HIPAA and PDMA auditing, SSAE-16 due diligence preparation, LIMS development and implementation with LabWare, SampleManager, LabVantage6, STARLiMS and other legacy systems 1 http://www.fda.gov/regulatoryinformation/guidances/ucm125067.htm

2. Definitions 21 CFR Part 11 Wikipedia 2 United States Food and Drug Administration (FDA) guidelines on electronic records and electronic signatures. Part 11, as it is commonly called, defines the criteria under which electronic records and electronic signatures are considered to be trustworthy, reliable and equivalent to paper records. 21 CFR Part 11 The governing rules and guidance to persons who, in fulfilment of a requirement in a statute or another part of FDA's regulations to maintain records or submit information to FDA, have chosen to maintain the records or submit designated information electronically and, as a result, have become subject to part 11. Part 11 applies to records in electronic form that are created, modified, maintained, archived, retrieved, or transmitted under any records requirements set forth in Agency regulations. Part 11 also applies to electronic records submitted to the Agency under the Federal Food, Drug, and Cosmetic Act (the Act) and the Public Health Service Act (the PHS Act), even if such records are not specifically identified in Agency regulations ( 11.1). The underlying requirements set forth in the Act, PHS Act, and FDA regulations (other than part 11) are referred to in this guidance document as predicate rules. Electronic Records Electronic records are "any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system". Under a narrow interpretation, the FDA considers part 11 to be applicable to the following records or signatures in electronic format (part 11 records or signatures): Records that are required to be maintained under predicate rule requirements and that are maintained in electronic format in place of paper format. On the other hand, records (and any associated signatures) that are not required to be retained under predicate rules, but that are nonetheless maintained in electronic format, are not part 11 records. The agency recommends that a company determine based on the predicate rules; whether specific records are part 11 records and recommends that a company document such decisions. Records that are required to be maintained under predicate rules, that are maintained in electronic format in addition to paper format, and that are relied on to perform regulated activities. In some cases, actual business practices may dictate whether you are using electronic records instead of paper records under 11.2(a). For example, if a record is required to be maintained under a predicate rule and you use a computer to generate a paper printout of the electronic records, but you nonetheless rely on the electronic record to perform regulated activities, the Agency may consider you to be using the electronic record instead of the paper record. 2 http://en.wikipedia.org/wiki/title_21_cfr_part_11 Back to the Index... Page 2 of 14

That is, the Agency may take your business practices into account in determining whether part 11 applies. Accordingly, the agency recommends that, for each record required to be maintained under predicate rules, you determine in advance whether you plan to rely on the electronic record or paper record to perform regulated activities. We recommend that you document this decision (e.g., in a Standard Operating Procedure (SOP), or specification document). Records submitted to FDA, under predicate rules (even if such records are not specifically identified in Agency regulations) in electronic format (assuming the records have been identified in docket number 92S-0251 as the types of submissions the Agency accepts in electronic format). However, a record that is not itself submitted, but is used in generating a submission, is not a part 11 record unless it is otherwise required to be maintained under a predicate rule and it is maintained in electronic format. Electronic Signature Digital signature Biometrics Audit Trail Electronic signatures that are intended to be the equivalent of handwritten signatures, initials, and other general signings required by predicate rules. Part 11 signatures include electronic signatures that are used, for example, to document the fact that certain events or actions Occurred in accordance with the predicate rule (e.g. approved, reviewed, and verified). An electronic signature is "a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual's handwritten signature". A digital signature is "an electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified". Digital signatures are required for open systems and as such need higher security levels. Therefore, in addition to electronic signatures, cryptographic methods have to be applied for authentication of the user and integrity of the record. Biometrics is "a method of verifying an individual's identity based on measurement of the individual's physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable". Examples of biometrics include facial recognition, voice recognition and fingerprint scanners. Most of them need specific hardware and software. The biggest problem with such devices is validating that they work reliably for the specified user but not for anyone else. A record of events related to a transaction including the original information and any changes to the information used to reconstruct a series of related events that have occurred. It may be composed of manual or computerized records of events and information, or both. Back to the Index... Page 3 of 14

Closed System Open System Hybrid systems Meta data Predicate rule A closed system is defined as an environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system. An open system means an environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system. Practically all systems in analytical laboratories are closed systems. With an appropriate security system in place, the laboratory has full control on who will access the system. An open system in a laboratory would be one where the data is stored on a server that is under the control of a 3rd party. Other examples for open systems are websites where everyone has access. Hybrid systems are a combination of electronic records and paper records. They are common systems in analytical laboratories today. Raw data are recorded electronically to reconstruct the analysis but the final results are printed and signed on paper. The FDA does not prohibit hybrid systems but has expressed some concerns about their acceptability. Meta data is important for reconstructing a final report from raw data. In chromatography it includes integration parameters and calibration tables. Predicate rule as referred in 21 CFR Part 11 are the 21 CFR Food and Drugs regulations (besides 21 CFR Part 11). They are basically promulgated under the authority of the Food, Drug and Cosmetic Act or under the authority of the Public Health Service Act. Back to the Index... Page 4 of 14

3. 21 CFR Part 11 Requirements 3.1 Electronic Signatures UR-1 UR-2 UR-3 UR-4 UR-5 Electronic signatures must be unique to each individual. Each user must have a unique Full Name. Each user must have a unique user id. The system must verify that an individual has the authority to electronically sign a record before allowing them to do so. The system will not allow electronic signatures to be reused or reassigned to anyone other than the original owner. The meaning of the signature (author, reviewer, or approver) must be displayed a. at the point of signing; b. on the human readable copy of the associated record (screen or printed; c. on the electronic copy of the associated record. Maintain electronic records and linked signatures for the life of the electronic record. The system has the ability to prevent an inactivated (not deleted) user id from being reused. Only authorized users have system access Never delete a user ID Just Disable the account E-Sign Pop-up window displays all the required items as listed in the requirement at the time of signing. Bika displays the signature of lab department managers for the results contained on results report, with job title and contact details Reviewing and Approving is a one step operation in Bika, called Verification, and is carried out by users authorised as Verifier or labmanager. After verification, clients get to see results on-line but these results, and may also receive it per email etc. in a follow-up Publication step carried out by Publisher or Labmanager users. a. A results report preview is displayed before being published, or saved to the database, and includes the signature and its key. b. The results report pdf and the printed version contains the meaning of the signature/s. c. The PDF is stored as is, including signatures. The e-signature information is stored with the record and an associated entry is placed in the audit log with all relevant information at the time of the signature. If the signature is removed (i.e. record reset to a state prior to the signature, then an audit of this function is performed and all data that was removed from the record as a part of the state reset is also recorded to the audit trail.) The transition of an electronic record to a pre-verified/pre-publish state is not possible. The record must be retracted by the labmanager, after which a new fresh copy of that Analysis Request is generated. The 'retracted' Analysis Request is not removed from the system, as well as all the Back to the Index... Page 5 of 14

information associated to it. The retraction transition is recorded in the audit trail. UR-6 UR-7 UR-8 UR-9 Electronic signature shall be able to show the signer s full printed name, to show the time and date of execution. Electronic signature are non-removable, non-modifiable and an integral part of the electronic records. At a minimum, Electronic signatures employ two distinct components e.g. user ID & password. The system shall be able to require at least one electronic signature component to be re-applied during a series of signings in a single controlled session E-Sign Pop-up window displays all the required items as listed in the requirement at the time of signing. Signatory fullname and transition date always displayed. If the signature is removed (i.e. record reset to a state prior to the signature, then an audit of this function is performed and all data that was removed from the record as a part of the state reset is also recorded to the audit trail.) Refer to UR-4 and UR-5. Compliant Pop-up E-Signature window PRIOR to executing the Post Data function. Biometric devices may be used in place of an ID and password as long as any hardware or software combination can be validated as reliable. Username + password is needed for user authentication before being able to sign (publish) any result report. At the moment, any authorised as lab or site manager, is able to change the electronic signature (image) from any other user without approval/review from the latter. Proposal: Prevent users from being edited (name, title, signature, etc.) by other users. The user signed in, must only be allowed to change his/her own data. The changes done by any user to its own profile must be approved by the labmanager. Labmanager should still be allowed to deactivate/activate users, as well as other related organisational changes (department, etc.). Prompt for ID and Password on the first e-sign application during the session or Always Prompt for both at every signing For a specific results preview screen, more than one results report layout can be displayed. For each one, a different pdf will be generated. The signature of the current user will be embedded in all of them. Proposal: Always prompt for user credentials on report preview after the button publish being pressed. The reports will only be published / sent / recorded if the credentials are correct. UR-10 The system shall be able to require all electronic signature components to be re-applied when a series of signings are not in a single controlled session. Prompt for ID and Password on the first e-sign application during the session or always prompt for both at every signing Back to the Index... Page 6 of 14

Refer to UR-9 UR-11 The System shall maintain an Electronic Signature activity log in the audit trail. The log shall track the history of all Electronic Signatures activities applied to each record. This should also include the any previously entered data in the event a record is reset, data re-entered and a signature reapplied and will not obliterate the journal of previously entered data. Audit any and all changes to cgmp records, these include but are not limited to Calculations, Tests, Specifications, Samples. Right now, states transitions are already logged in the audit trail but for edits, will be include in BikaLogger, available soon. Configurable: ability to add e-signature to every table with the ability to Post (enter) data, verify data, and approve data. Changes to any electronic record don't affect records created previously - modifying a Calculation has no effect on historic Analysis Requests containing tests that use the calculation. All records are referenced via punctual historic versions numbers. Set-up items too are already version controlled but we need to make it easier accessible to authorised users. UR-12 Handwritten signatures executed to electronic records shall be linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means. Ability to add attachments. Proposal: Link the signature image to the user profile URL on Bika LIMS and show the original image there. Also show the URL below the signature image and name. The link must be accessible from both the printable version and electronic version (pdf). UR-13 The establishment of, and adherence to, written policies that hold individuals accountable and responsible for actions initiated under their electronic signatures, in order to deter record and signature falsification. Documented procedure that can be verified and validated. Not applicable, but the documentation can be maintained with version control in Bika's CMS. Back to the Index... Page 7 of 14

3.2 Audit Trails UR-14 11.10 (b) - The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review and copying by the agency. Be able to View, print, and export an actual record and the associated e-signature information. The audit trail of a given record is displayed on the screen by adding '/log' at the end of the record's unique URL. Add a 'Print' button in the audit trail log view above and generate a pdf report with the current user's basic information and signature. Regards to electronic signature, prompt the user for credentials (same criteria explained on UR-9) UR-15 11.10(e) - Use of secure, computer generated, time-stamped audit trails with a source IP address to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record the changes that will not obscure previously recorded information. The audit trail is to be retained (archived) for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying. The system administrator should not be able to switch off the audit trail function without higher authorisation. Recovery of the audit trail in human readable form from archived storage must also be possible. The system should be capable of detecting invalid electronic records prior to data access. The system must be capable of audit trailing all GMP data in such a way that the original value is not overwritten and the change is linked through time/date and user ID to the modifier. Audit Trail additional information from 21 CFR Part 11 guidance states: "The Agency intends to exercise enforcement discretion regarding specific Part 11 requirements related to computer-generated, time-stamped audit trails ( 11.10 (e), (k)(2) and any corresponding requirement in 11.30)". "Persons must still comply with all applicable predicate rule requirements related to documentation of, for example, date (e.g., 58.130(e)), time, or sequencing of events, as well as any requirements for ensuring that changes to records do not obscure previous entries". Implement or modify the audit trail to include the e-signature information related to a record. Electronic records cannot be deleted in Bika LIMS, and all state transitions affecting any record are logged in the audit trail. Editing records is not currently logged in the audit (no state transition applies). This will be arranged with BikaLogger, available soon. Proposals: a. Add the user's IP address in the audit trail. b. BikaLogger: don't allow users to disable audit trail function. Back to the Index... Page 8 of 14

"We recommend that you base your decision on whether to apply audit trails, or other appropriate measures, on the need to comply with predicate rule requirements, a justified and documented risk assessment, and a determination of the potential effect on product quality and safety and record integrity". "Audit trails can be particularly appropriate when users are expected to create, modify, or delete regulated records during normal operation". Audit trail is a requirement of some FDA predicate rules, for example 21 CFR Part 58 (GLP). Others don t specifically mention audit trail but require changes to data to be recorded, for example 21 CFR Part 211 (drug cgmp) states in Paragraph 194b: "Complete records shall be maintained of any modification of an established method employed in testing. Such records shall include the reason for the modification and data to verify that the modification produced results that are at least as accurate and reliable for the material being tested as the established method". If the audit trail is not generated by the computer it should be generated manually, as a minimum. A record s integrity is a basic requirement of regulations and users of computer systems must be able to demonstrate this, especially for critical records. #3 above mentions other appropriate measures. This means you can use other techniques to demonstrate record integrity, for example to demonstrate file integrity through hash values. #4 is important as it talks about manual interaction with the system. It is difficult to demonstrate record integrity if users sit in front of a computer and can change data on the screen if there is no electronic audit trail. This becomes really critical if a change of such data can have an impact on critical records, for example, accuracy of product test results. In this case the system should have a built-in electronic audit trail and the function should be validated. This is one example where discretion would not be exercised as explained in this guidance. Proposal: In some transitions, e.g. retractions, rejections, or edits, show a pop-up with compulsory field for the user to enter the reason for the transition and record it in the audit trail. In all cases, the system attaches a brief description of the event in the log (i.e. Modified field: description. Original value: My new Analysis Service. New value: My new Analysis Service 2 ). Need to the define to which specific-transitions/editing applies Back to the Index... Page 9 of 14

3.3 Control of Identification and Password UR-16 UR-17 UR-18 UR-19 UR-20 UR-21 UR-22 Password use must expire after a predetermined length of time. The system must require the password to contain a combination of at least 6 characters with at least one letter and one number. The system must prevent the reuse of the specified number of previous passwords The system must force users to immediately change their passwords after initial issuance or after their passwords have been reset. The system must allow the user to change their password if they feel it has been compromised. User passwords can only be reset by the System Administrator after account has been locked out or user has forgotten their password. User s account must be locked out if three consecutive failed logon attempts occur. Use Operating System functions, set to an industry standard such as 90 days Can also be set in Bika itself Use an Operating system function, set to complex passwords. Proposal: Use Plone add-on Password Strength as a Bika LIMS dependency https://plone.org/products/passwordstrength Use an Operating system function, set to Password History at a specified number to industry standard. Proposal: Add a field in Bika Setup to set the max number of previous password reuses allowed. Add a validator including the above rule in the user's edit form. Use Operating system function, set to Change Password at first Login Bika complies via inheritance from Plone Use Operating system function, Have ability for users to change their passwords at any time Standard Bika/Plone Use Operation system function such as a Windows policy. Authorised user may set this to the default policy Use Operation system function such as a Windows policy. Proposal: Use Plone add-on Login Lockout as a Bika LIMS dependency https://plone.org/products/loginlockout/ UR-23 If account is locked out the system must send an account locked out message to the System Administrator immediately. Use Operation system function such as a Windows policy. Could be achieved Login Lockout add-on UR-24 The system must use authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand. Verification of users, Administrators, Application managers, super users, etc. and their access to various functionalities of the program will be validated. The administrator of the system should have Use the Operating system security model such as LDAP for access and for E-signature verification prior to the application of an e-signature. Plone add-on: PloneLDAP https://plone.org/products/ploneldap Back to the Index... Page 10 of 14

the capability to add or delete access, or increase or decrease the level of functionality to the database for users. UR-25 Use of device (e.g. terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction. Record the source IP Address of the user at the time of the e-signature application. Included in BikaLogger. Refer to UR-15 3.4 Data Retention UR-26 UR-27 The system data must be able to be periodically backed up The system data must be able to be restored Documented procedure that can be verified and validated. collective.recipe.backup https://plone.org/products/collective.recipe.ba ckup Documented procedure that can be verified and validated. collective.recipe.backup https://plone.org/products/collective.recipe.ba ckup UR-28 The data files are protected against intentional or accidental modification or deletion. The protection of records to enable their accurate and ready retrieval throughout the records retention period. Restrict deletion of records to administrator access level. This deletion should be audit trailed and this should include backup. The system must be capable of secure backup & recovery to durable media. Access security and audit logs are implemented. Also, a purged or deleted sample log is implemented. Since a sample may be deleted all of the relevant data must be placed into a separate audit log to ensure that any total deletions can be accounted for. Records cannot be deleted, only de-activated or cancelled. Database access, its eventual/accidental deletion, backups and restore procedures depends on the security policies established by the systems dept. UR-29 UR-30 Electronic records will need to be able to be restored at any time during the designated retention of the record The data files are written to a highly secure database, directory or to an unalterable media Documented procedure that can be verified and validated. Apart from restoring incremental backups, individual records can be rolled back by authorised users, but not always be restored completely due to transition state and DB integrity constraints. With all transition and modification captured in BikaLogger, the trail includes the changes made, and the user will be able to reconstruct records. Use of a Database with security. Zope DB is a highly secure database. The security of the directory and media used depends on the security policies established by the systems dept. Back to the Index... Page 11 of 14

3.5 Security UR-31 UR-32 UR-33 Security procedures and controls shall be designed and implemented to include: 1. System access shall be limited to authorized individuals. - (Physical access) 2. Operational system checks shall enforce the proper sequencing of steps in a process (as appropriate). Authority checks shall ensure that only authorized individuals can: 1. Use the system. (Logical access) 2. Access the operation or computer system input or output device. 3. Alter a record. 4. Perform the specified operation. Limiting system access to authorized individuals. System access through multi-tiered user access levels. Restrict access to various functions of the system to authorize individuals who have been assigned the appropriate permissions. Device or terminal checks shall determine validity of the source of input or operation (as appropriate). Documented procedure that can be verified and validated. Depends on the security policies established by the systems dept. Documented procedure that can be verified and validated. Depends on the security policies established by the systems dept. Bika itself applies authorisation roles in-line with the corresponding user group's tasks data access requirements, e.g. clients, data clerks, samplers, analysts, verifiers, lab managers. Use of recording the IP address in the audit trail. Depends on the security policies established by the systems dept. Regards to Bika-LIMS security: Included in BikaLogger. Refer to UR-15 3.6 Personnel Qualification UR-34 Determination that the following persons have the education, training, and experience to perform their assigned tasks: 1. Developer(s) of the computerized system. 2. Maintainer(s) of the computerized system. 3. User(s) of the computerized system. A determination is documented that people who develop, maintain, or use electronic record/electronic signature systems have the education, training and experience to perform their assigned tasks. Training of users of the system will be documented in individual training records, as well as their level of access. Documented procedure that can be verified and validated. Depends on the security policies established by the systems dept. Bika can do with a basic HR module, verifying e.g. that analysts are actually qualified to use certain equipment. Back to the Index... Page 12 of 14

3.7 System Documentation Controls UR-35 UR-36 Establishment and use of appropriate controls over systems documentation including: 1. Adequate controls over the documentation for system operation and maintenance, to include: a. Distribution of documentation. b. Access to documentation. c. Use of documentation. Revision and change control procedures to maintain an audit trail that documents the time-sequenced development and modification of the systems documentation. Documented procedure that can be verified and validated. Depends on the security policies established by the systems dept. Bika offers full document management, version and granular access control inherited from Plone. Documented procedure that can be verified and validated. Depends on the security policies established by the systems dept. Bika offers full document management, version and granular access control inherited from Plone. 3.8 Control of System Management and Configuration UR-37 UR-38 The system must be validated to cgmp and 21CFR Part 11 requirements prior to being put into use in a Production environment. Validation of systems to ensure accuracy, reliability, consistent intended performance and the ability to discern invalid or altered records. The system should be capable of detecting invalid electronic records prior to data access. The system must be capable of audit trailing all GMP data in such a way that the original value is not overwritten and the change is linked through time/date and user ID to the modifier. Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate. The system will be constructed such that the next step in the workflow process will not be permitted until all the (minimum) required information is entered by the user. Similarly, if a follow-up has lapsed, the Documented procedure that can be verified and validated. Validation of 21 CFR Part 11 requirements on test/pre-production instances before the deployment to production. All Bika DB objects are versioned and modifications don't overwrite earlier versions, but are saved as new ones. In some cases, e.g. re-tested analysis results, old values are displayed to users online next to their replacements. This is the responsibility of the company using the software. Centralized testing scripts would be nice, but it is not a requirement of the software developer, it is a responsibility of the software user since the validation testing has to be completed in the actual environment that the software will be used. Documented procedure that can be verified and validated A transitions workflow with constraints, e.g. users authorisation, applies to all records. Moreover, every record has specific state-bound view/access/edit permissions of its own. Users are alerted to lapses such as late running tests, and next tasks. Back to the Index... Page 13 of 14

system administrator will be informed Data entry validators are also applied to compulsory field and specific-data-type fields. Back to the Index... Page 14 of 14