Services Providers. Ivan Soto



Similar documents
Validating Enterprise Systems: A Practical Guide

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

CONTENTS. List of Tables List of Figures

Pharma CloudAdoption. and Qualification Trends

Domain 1 The Process of Auditing Information Systems

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Clinical Trials in the Cloud: A New Paradigm?

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).

Validating Cloud. June 2012 Merry Danley

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

3 rd Party Vendor Risk Management

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Information Security Policies. Version 6.1

San Francisco Chapter. Information Systems Operations

Cloud Computing: Legal Risks and Best Practices

Securing the Service Desk in the Cloud

Service Availability Metrics

Intel Enhanced Data Security Assessment Form

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Testing Automated Manufacturing Processes

Cloud Vendor Evaluation

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Managing Cloud Computing Risk

Qualification Guideline

1 Why should monitoring and measuring be used when trying to improve services?

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

How To Run A Cloud Based Data Centre

Information Security: Cloud Computing

This interpretation of the revised Annex

GAMP 4 to GAMP 5 Summary

State of Oregon. State of Oregon 1

Ubertas Cloud Services: Service Definition

Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus

Overview of how to test a. Business Continuity Plan

Third Party Risk Management 12 April 2012

Information Shield Solution Matrix for CIP Security Standards

Auditing Cloud Computing and Outsourced Operations

Retention & Disposition in the Cloud Do you really have control?

BUSINESS MANAGEMENT SUPPORT

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Cloud Computing and Records Management

pavcloud PaaS IaaS VaaS DCaaS For orders and information call or FEATURES: BENEFITS: DCaaS VaaS IaaS PaaS

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

Key Considerations of Regulatory Compliance in the Public Cloud

Security from a customer s perspective. Halogen s approach to security

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Guardian365. Managed IT Support Services Suite

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

Team A SaaS Strategy

Draft Information Technology Policy

ADOPTING CLOUD COMPUTING AS AN ICT DEPLOYMENT STRATEGY FOR DELIVERING SERVICES IN THE GOVERNMENT

Managed Services. Business Intelligence Solutions

Vendor Management. Outsourcing Technology Services

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

An ITIL Perspective for Storage Resource Management

BMC s Security Strategy for ITSM in the SaaS Environment

Click to edit Master title style

a Disaster Recovery Plan

John Essner, CISO Office of Information Technology State of New Jersey

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Hosting JDE EnterpriseOne in the Cloud Hear how one company went to the cloud

LEGAL ISSUES IN CLOUD COMPUTING

Program Overview. CDP is a registered certification designed and administered by Identity Management Institute (IMI).

<Project Name> Configuration Management Plan

How To Manage Security On A Networked Computer System

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

Cloud Computing in GxP Environment

Service Children s Education

Newcastle University Information Security Procedures Version 3

Office of Inspector General

KMS Implementation Roadmap

Virtual Infrastructure Security

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

Using the Cloud to fill the void between the business and the IT Department

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Confidence in the Cloud Five Ways to Capitalize with Symantec

Transcription:

SOP s for Managing Application Services Providers Ivan Soto

Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed Service providers Roles and Responsibilities Governance, monitoring i and oversight Service Level considerations Inspection Readiness Case Study: Promotional Materials System Implementation 2

Types of Managed Services Our Way Is the Way Keep process ownership, execute with supplier s people May be onsite or supplier s site (InSourcing, Offshoring) Go Away Hand everything to supplier to manage on your behalf Supplier owns processes over time (Outsourcing) Do It Their Way Move to supplier s standard processes and environment Processes common across multiple companies (SaaS) 3

Outsourcing Process Phase 1: Business Case Benefit & Risk Analysis Phase 2: Specification and Selection Baseline Specification Selection Contract Phase 3: Implementation Planning Implementation Transition Phase 4: Monitor Service Level and Contract Management Phase 5: Change Change Management Exit Management 4

Business Case Benefits Analysis Focus should be on core, value adding business activities Cost optimization Improved service portfolio and performance management Simplified organization Improved quality standards 5

Business Case Risk Analysis Misalignment of business objectives quality vs cost vs volume Cost optimization Loss of control and visibility of regulated services Loss of intellectual property control Improved quality standards 6

Specification and Selection Baseline Assessment Regulatory impact of application and assets and services to be outsourced Current quality status Current documentation and records management practices Process map for outsourced activities with associated roles and responsibilities Can be used for SLA Identify support gaps Aids identifying hidden cost 7

Specification and Selection Supplier Selection Considerations Cost, technical response, responsiveness, quality approach Experiences of other organizations with the supplier Supplier audit 8

Implementation Transition to outsource company When services, assets and applications will be migrated When resources will transition to the outsource organization When processes and procedures will transition Service disruption management Knowledge transfer 9

Governance Business management Contract management Service and Quality management Customer and supplier relationship management 10

Monitor Audits Compliance with processed and standards Performance Reporting Cost, quality and service volume metrics 11

Contract Change & Exit Management Evaluating needs for additional or reduction of services Service Level Agreements 12

Quality Expectations for Service Providers Documented processes and controls in place Training of the processes and controls to those that are expected to implement them Qualification of the individuals that are implementing the processes and controls Documented evidence of successful execution of the processes and controls Metrics, monitoring i and evaluation of the execution of the processes and controls 13

Quality Expectations for Service Providers (cont.) Quality Management Systems Service Delivery Application i Support Design Procurement H/W & S/W Deployment Validation/Qualification Backup, Restore Archive Security Asset Management Configuration Management Platform Maintenance Internet/Intranet Services 14

Quality Expectations for Service Providers (cont.) Quality Management Systems Service Management Help Desk Demand Management Service Specification Prioritization and Planning 15

SOP s for Service Providers SOP s will vary depending on the type of managed services SOP s should address the following: System impact assessments on patient safety, product quality, and data integrity Roles and Responsibilities Life cycle approach Risk management System Specifications Validation and Qualification System Operation and Maintenance Record and Data Management Security Management 16

SOP s for Service Providers SOP s will vary depending on the type of managed services SOP s should address the following: System impact assessments on patient safety, product quality, and data integrity Roles and Responsibilities Life cycle approach Risk management System Specifications Validation and Qualification System Operation and Maintenance Record and Data Management Security Management Change and Configuration Management 17

SOP s for Service Providers 18

Roles and Responsibilities The responsibility for data integrity ultimately remains with the regulated company Roles and responsibilities must be defined and clear to both parties The regulated company may leverage supplier knowledge, services and artifacts The supplier is accountable for the quality delivery of its services The regulated company is accountable for determining the ongoing suitability of services that are leveraged 19

Governance, Monitoring, and Oversight Identification of sensitive or critical business data Audits (frequency, focus) Access provisioning and roster reviews Privileged Access Audit trails Business Continuity / Disaster Recovery Service Level measurements 20

Service Level Considerations Availability and performance Change management Quality of service Security Business continuity it / Backup and Recovery Personnel Qualification 21

Inspection Readiness Document Management Record Retention Record Retrieval Clear response time expectations 22

Case Study: Promotional Material System Ivan Soto

Background Hosted application implemented and managed by the vendor Application allows users to plan, discuss, agree concepts and track promotional materials Vendor works with more than 100 companies and over 25,000 users across the life sciences industry 24

Implementation Approach Following our internal procedures we performed the following activities: Initial Regulatory Assessment Part 11 Assessment Risk Assessment Supplier Assessment 25

Implementation Approach (cont.) Initial Regulatory Assessment: Based on GxP requirements Identifies GxP applicability Identifies applicable regulatory requirements Identifies systems that require validation Identifies the need to implement procedure controls (SOP ) 26

Implementation Approach (cont.) Part 11Assessment: Identifies applicable Part 11 requirements Close or Open System E-signatures requirements Electronic records requirements Hybrid or fully electronic system 27

Implementation Approach (cont.) Risk Assessment: Identifies whether the application is High, Medium or low risk Validation effort is based on the risk level Procedure controls are based on risk level 28

Implementation Approach (cont.) Supplier Assessment: Suppliers QMS System Development Life Cycle Design Controls Security & Data Integrity (Cloud Environments) 29

Implementation Approach Assessment Results: GxP impact Low risk Vendor met supplier assessment criteria 30

Implementation Approach Leverage vendor created validation documents Perform User Acceptance Testing No on-site vendor audit Leverage vendor SOP s Create SOP s for user access, software administration and business process 31

Implementation Approach Vendors SOP s: Business Continuity Client charter Code of Conduct Complaints Procedure Contract t- Software Licensing i Agreement Employee Confidentiality Agreement Employee Training Records Risk Management SOP Approval Process Training SOP Network / Server access Procedure IT Security Policy Internal System Inventory Hardware asset records Security Incident Management Data Backup Plan Intrusion Detection Policy User Registration and Privilege Policy Development SDLC policy Development SDLC template documents Development tchange Control policy Security / Vulnerability Identification Procedure CFR Part 11 Compliance 32

Summary Cloud Technical Overview Security & Data Integrity Change Management Risk Based Validation Approach Periodic Review and Assessment 33

Summary During this session, we covered the following concepts: Types of Managed Services Outsourcing process Quality expectations for Managed Service providers Roles and Responsibilities Governance, monitoring and oversight Service Level considerations Inspection Readiness Case Study: Promotional Materials System Implementation 34

Questions? 35