<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.limswiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jleecbd</id>
	<title>LIMSWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.limswiki.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jleecbd"/>
	<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php/Special:Contributions/Jleecbd"/>
	<updated>2026-04-05T21:35:52Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13462</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13462"/>
		<updated>2013-12-19T06:44:24Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/LIMSforge/LiMSpec/wiki/Product-Roadmap product roadmap] for the product to understand the long term goals for the application.  The source code can be found at [https://github.com/LIMSforge/LiMSpec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requirements Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
=Suggesting New Requirements and Questions=&lt;br /&gt;
&lt;br /&gt;
Users with the correct permissions will be able to create new requirements and questions for inclusion in the general collection.  These submissions will be reviewed first by an administrator.&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13461</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13461"/>
		<updated>2013-12-17T02:32:01Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap product roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requirements Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
=Suggesting New Requirements and Questions=&lt;br /&gt;
&lt;br /&gt;
Users with the correct permissions will be able to create new requirements and questions for inclusion in the general collection.  These submissions will be reviewed first by an administrator.&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13460</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13460"/>
		<updated>2013-12-17T02:28:22Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requirements Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
=Suggesting New Requirements and Questions=&lt;br /&gt;
&lt;br /&gt;
Users with the correct permissions will be able to create new requirements and questions for inclusion in the general collection.  These submissions will be reviewed first by an administrator.&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13459</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13459"/>
		<updated>2013-12-14T04:57:05Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
=Suggesting New Requirements and Questions=&lt;br /&gt;
&lt;br /&gt;
Users with the correct permissions will be able to create new requirements and questions for inclusion in the general collection.  These submissions will be reviewed first by an administrator.&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13458</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13458"/>
		<updated>2013-12-14T04:25:35Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Exporting Requirements and Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Export&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13457</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13457"/>
		<updated>2013-12-14T04:20:40Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Personal Copies of Requirements and Questions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
&lt;br /&gt;
==Adjusting the Sort Order==&lt;br /&gt;
&lt;br /&gt;
Personal copies of requirements and questions can be manually re-ordered.  Simply drag the and drop them into a new position.  Personal requirements can only be reordered within a category.  To permanently save the new order, click on the update sort order button at the bottom of the page.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13456</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13456"/>
		<updated>2013-12-14T04:17:13Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Personal Copies of Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Requirements and questions which have been selected for inclusion in your personal collection can be accessed under the requirements or question menu.[[File:Limspec_MyRequirements.png|thumb|My Requirements Page]]  Within your personal collection, you have the ability to edit requirements and questions at will.  If you decide you want to undo your changes, a revert link will be available for any modified requirements or questions.&lt;br /&gt;
&lt;br /&gt;
If you no longer wish to have a copy of a given requirement in your collection, simply delete it.&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13455</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13455"/>
		<updated>2013-12-14T03:48:14Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Navigating Requirements */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Limspec_requirements.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection.  The user can choose to only display requirements that are associated with their industries. This can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13454</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13454"/>
		<updated>2013-12-14T03:30:46Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [http://gitlab.lablynx.com/jleecbd/limspec/wikis/product_roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13453</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13453"/>
		<updated>2013-12-13T07:14:03Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec.git here].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13452</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13452"/>
		<updated>2013-12-13T07:11:00Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* About */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [http://gitlab.lablynx.com/jleecbd/limspec.git].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13451</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13451"/>
		<updated>2013-12-13T06:50:49Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg|300px]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [https://github.com/sciCloud/LiMSpec Github].  Metrics regarding code quality are provided at [[Image:Codeclimatebadge.png|Code Climate|link=https://codeclimate.com/github/sciCloud/LiMSpec]].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13450</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13450"/>
		<updated>2013-12-13T06:46:11Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.jpg]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [https://github.com/sciCloud/LiMSpec Github].  Metrics regarding code quality are provided at [[Image:Codeclimatebadge.png|Code Climate|link=https://codeclimate.com/github/sciCloud/LiMSpec]].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13449</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13449"/>
		<updated>2013-12-13T06:45:30Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec new logo.png]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [https://github.com/sciCloud/LiMSpec Github].  Metrics regarding code quality are provided at [[Image:Codeclimatebadge.png|Code Climate|link=https://codeclimate.com/github/sciCloud/LiMSpec]].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=Limspec&amp;diff=13448</id>
		<title>Limspec</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=Limspec&amp;diff=13448"/>
		<updated>2013-12-13T06:45:14Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Limspec_new_logo.png]]&lt;br /&gt;
= About =&lt;br /&gt;
&lt;br /&gt;
[http://login.limspec.com LiMSpec] is intended to ultimately serve as a complete tool for managing the evaluation process for LIMS/LIS selection. Initially, it is focused on cataloguing requirements and vendor questions, and allowing for the categorization and assignment to specific industries. Users can create their own private collection of requirements and questions, and export in a variety of formats - including Open Office Document format.&lt;br /&gt;
&lt;br /&gt;
You can review the [https://github.com/sciCloud/LiMSpec/wiki/Product-Roadmap roadmap] for the product to understand the long term goals for the application.  The source code can be found at [https://github.com/sciCloud/LiMSpec Github].  Metrics regarding code quality are provided at [[Image:Codeclimatebadge.png|Code Climate|link=https://codeclimate.com/github/sciCloud/LiMSpec]].&lt;br /&gt;
&lt;br /&gt;
Following are a brief set of directions for use.&lt;br /&gt;
&lt;br /&gt;
= Creating an Account =&lt;br /&gt;
&lt;br /&gt;
You have several choices to create an account in the LiMSpec tool. You can create a unique account by entering your e-mail address and a password, or you can use your LinkedIn, Google, or Twitter account. When your account has been created, you will have basic access. If you would like to contribute to the public collection of requirements and questions, you will need to [[#Contacting the System Administrators|request]] an account upgrade from the administrator.&lt;br /&gt;
&lt;br /&gt;
= Navigating Requirements =&lt;br /&gt;
&lt;br /&gt;
Because of the sheer number of requirements, several functions exist to help the user isolate specific requirements of interest. First, each requirement can be assigned an optional category, and the list of requirements [[File:Full_Admin_Requirements_Page.png|thumb|Requirements Page]] being displayed can be filtered based on these categories. Next, the user can identify specific requirements to be included in their personal collection. The user can opt to only have those specific requirements displayed. This option can be selected while within the tool, or from the application settings screen (in which case this value is true by default when you log in). In addition, the user can choose to only display requirements that are associated with their industries. This, too, can be set permanently by using the application settings screen.&lt;br /&gt;
&lt;br /&gt;
In order to add requirements to a personal collection, simply check the desired requirements and click on the &amp;amp;quot;Select for Personal Collection&amp;amp;quot; button. Similarly, you can remove requirements by clicking on the &amp;amp;quot;Remove from Personal Collection&amp;amp;quot; button.&lt;br /&gt;
&lt;br /&gt;
== Making Private Copies ==&lt;br /&gt;
&lt;br /&gt;
Another option the user has, is to make their own private copies of requirements. These copies are fully editable by the user. In order to make a copy of a requirement, simply click on the copy link at the end of the requirement row. Once a requirement has been &amp;amp;quot;privatized&amp;amp;quot; in this way, they will remain this way permanently. Also, note that the requirement number will differ when you make a private copy of a requirement.&lt;br /&gt;
&lt;br /&gt;
== Full Text Searching ==&lt;br /&gt;
&lt;br /&gt;
Requirements have a full text search field, which will look across both titles and requirement text for a match. This tool utilizes the [http://lucene.apache.org/solr/ Solr] search engine.&lt;br /&gt;
&lt;br /&gt;
= Navigating Questions =&lt;br /&gt;
&lt;br /&gt;
Navigating questions is generally the same as navigating requirements except for the absence of full text searching and categories. These were left out as the number of questions is relatively small, and so there is not much value to these options.&lt;br /&gt;
&lt;br /&gt;
= Exporting Requirements and Questions =&lt;br /&gt;
&lt;br /&gt;
Two primary mechanisms exist for exporting requirements and questions. This is an xml output and a csv output. Selecting either of these two links will generate and export of all requirements or questions selected for display based on the current mix of display options (such as selected categories, search parameters, and application settings).&lt;br /&gt;
&lt;br /&gt;
= Generating an RFP Document =&lt;br /&gt;
&lt;br /&gt;
 [[File: RFP_Requirements_Section.png|thumb|Requiremens Section of the RFP]] Clicking on the Generate RFP tab will cause the download of an ODT document that contains requirements and questions formatted into some basic tables. The intent is to provide a document that can be customized by the individual user for submission as an RFI/RFP document.&lt;br /&gt;
&lt;br /&gt;
= Administrative Activities =&lt;br /&gt;
&lt;br /&gt;
Users with the administrator role will have an Administration tab available at the top of each page. It is through this tab that the following administrative activities are available.&lt;br /&gt;
&lt;br /&gt;
== Reviewing Submitted Requirements/Questions ==&lt;br /&gt;
&lt;br /&gt;
If you have the administrator role, a link will be displayed at the top of both the requirements and questions list pages to review submitted requirements or questions. Clicking this link will present a list of requirements or questions that have a status of submitted. The administrator can open each item for review and then set the new status accordingly. A Public status adds the item to the public pool, while a Private status makes the item only a member of the author's private collection.&lt;br /&gt;
&lt;br /&gt;
== Modifying Users ==&lt;br /&gt;
&lt;br /&gt;
Administrators also have the ability to modify individual user accounts. This includes setting the roles and industries, as well as changing the name and e-mail. Caution should be exercised with e-mail changes, as this is the basis for authentication with the LiMSpec account. The manage users link is available from the Administration page.&lt;br /&gt;
&lt;br /&gt;
== Sending System Alerts ==&lt;br /&gt;
&lt;br /&gt;
The Administration page also presents the option of sending out a message to all users of the system. Typically, this will be used for system maintenance and similar announcements.&lt;br /&gt;
&lt;br /&gt;
= Contacting the System Administrators =&lt;br /&gt;
&lt;br /&gt;
If a user runs into technical difficulties, or needs their account upgraded, they can contact the administrator team by clicking on the contact link, and preparing a message.&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_new_logo.jpg&amp;diff=13447</id>
		<title>File:Limspec new logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_new_logo.jpg&amp;diff=13447"/>
		<updated>2013-12-13T06:42:37Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_requirements.png&amp;diff=13446</id>
		<title>File:Limspec requirements.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_requirements.png&amp;diff=13446"/>
		<updated>2013-12-13T06:41:31Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_questions.png&amp;diff=13445</id>
		<title>File:Limspec questions.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_questions.png&amp;diff=13445"/>
		<updated>2013-12-13T06:39:56Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_MyRequirements.png&amp;diff=13444</id>
		<title>File:Limspec MyRequirements.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_MyRequirements.png&amp;diff=13444"/>
		<updated>2013-12-13T06:37:01Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_my_requirements_sorting.png&amp;diff=13443</id>
		<title>File:Limspec my requirements sorting.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_my_requirements_sorting.png&amp;diff=13443"/>
		<updated>2013-12-13T06:36:16Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_Login.png&amp;diff=13442</id>
		<title>File:Limspec Login.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_Login.png&amp;diff=13442"/>
		<updated>2013-12-13T06:35:05Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_generation_menu.png&amp;diff=13441</id>
		<title>File:Limspec generation menu.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_generation_menu.png&amp;diff=13441"/>
		<updated>2013-12-13T06:34:00Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_industry_page.png&amp;diff=13440</id>
		<title>File:Limspec industry page.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_industry_page.png&amp;diff=13440"/>
		<updated>2013-12-13T06:30:25Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=File:Limspec_admin_page.png&amp;diff=13439</id>
		<title>File:Limspec admin page.png</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=File:Limspec_admin_page.png&amp;diff=13439"/>
		<updated>2013-12-13T06:27:56Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10947</id>
		<title>LII:Health Insurance Portability and Accountability Act audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10947"/>
		<updated>2013-05-22T03:08:41Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: Remove group health plan component&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with the [[Health Insurance Portability and Accountability Act]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
The following checklist is focused largely on computerized systems that house Protected Health Information (PHI) under the HIPAA regulations.  However, since the computerized system exists as part of a complete operation, even when it is hosted by a Cloud provider, the checklist covers the majority of the regulation.  This notion of the requirements of the entire regulation applying even to Cloud companies is particularly underscored with the HITECH modifications to the HIPAA regulations where Business Associates are now entirely responsible with adherence to the HIPAA privacy regulations and not merely on a contractual basis.&lt;br /&gt;
&lt;br /&gt;
==Administrative safeguards==&lt;br /&gt;
&lt;br /&gt;
====Security Management Process====&lt;br /&gt;
&lt;br /&gt;
*Does a detailed risk assessment exist regarding potential vulnerabilities to the confidentiality, integrity, and availability of PHI?&lt;br /&gt;
*Does the assessment identify actions to mitigate certain risks?  Have these actions been taken, or have plans been generated to take these actions? &lt;br /&gt;
*Does a policy exist specifying sanctions to be taken against employees who fail to comply with security policies and procedures?&lt;br /&gt;
*Is there a system in place for regular review of system activity, including things such as audit logs and incident reports?&lt;br /&gt;
&lt;br /&gt;
====Assigned security responsibility====&lt;br /&gt;
&lt;br /&gt;
*Is there a formally identified individual who is responsible for developing and implementing security policies?&lt;br /&gt;
*Has this individual, or the individual's direct reports, developed and implemented security policies?&lt;br /&gt;
*Collect evidence of security policies being implemented (group policy reports for the AD server, for instance)&lt;br /&gt;
&lt;br /&gt;
====Workforce security and Information Access Management====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist governing access to PHI by employees?&lt;br /&gt;
*Are employees who should not have access to PHI prevented from accessing it?&lt;br /&gt;
*If employees are permitted to access systems that contain PHI, but are not permitted to access PHI, does the system have suitable controls to prevent that access?&lt;br /&gt;
*View system accesses by both individuals who have access to PHI and those who don't, and evaluate potential areas of weakness in the security measures.&lt;br /&gt;
*Do processes exist for authorizing access to PHI?  Do these processes seem reasonable.  &lt;br /&gt;
*Are employees who have access to PHI supervised appropriately?  Do their supervisors have adequate training and understanding regarding the treatment of PHI?&lt;br /&gt;
*Are adequate procedures in place governing the termination of employees with access to PHI?&lt;br /&gt;
*Do these procedures include appropriately times termination of accounts (i.e., in the case of involuntary termination, is the account terminated before the employee might have the opportunity to cause harm?).&lt;br /&gt;
*For voluntary terminations, are procedures in place that require the supervisor to evaluate the need for continued access to PHI prior to the departure of the employee in question?&lt;br /&gt;
*Is there a clear requirement for communication with system administrators and IT staff regarding affected accounts?&lt;br /&gt;
*If a health clearinghouse is part of a larger organization, confirm that adequate controls exist that prevent the larger organization from accessing PHI.&lt;br /&gt;
*Do the PHI access procedures apply to the IT/IS organization?  That is, is access to PHI only allowed for IT/IS employees with a legitimate business reason to access that data?  Are IT/IS employees adequately trained in the HIPAA regulations, internal policies and procedures regarding PHI?&lt;br /&gt;
&lt;br /&gt;
====Security Awareness and Training====&lt;br /&gt;
*Is there a formal and documented training program for employees who deal with PHI?&lt;br /&gt;
*Are employees provided training on principles of security?&lt;br /&gt;
*Are there procedures in place for addressing malicious software, including it's detection and reporting?  Are employees prevented from accessing remote sites that are at high risk for containing malicious software?&lt;br /&gt;
*Is there a system for ensuring that security protection software (in particular anti-virus programs, and firewalls) are updated periodically?&lt;br /&gt;
*For outward facing applications, is there a process by which security flaws in components (such as Java) are identified and fixed.&lt;br /&gt;
*For systems that provide access to PHI, do they track log-ins, and in particular failed logins?  &lt;br /&gt;
*Does the system lock out users after a specified number of failed logins? &lt;br /&gt;
*Are system administrators notified if such an event occurs?&lt;br /&gt;
*Is there evidence that administrators respond to such events in an appropriate manner?  &lt;br /&gt;
*Are there policies governing password complexity, change and reuse frequency?  Are the policies consistent with current &amp;quot;standards&amp;quot; within the industry?&lt;br /&gt;
*Are employees trained to maintain strict secrecy regarding their passwords?&lt;br /&gt;
*Are there procedures mandating that IT may not request passwords from users?&lt;br /&gt;
&lt;br /&gt;
====Security Incident Procedures====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place for responding to security incidents?&lt;br /&gt;
*Is there evidence that these procedures are being followed (review any logs/files regarding actions taken in response to security incidents).&lt;br /&gt;
&lt;br /&gt;
====Contingency Plan====&lt;br /&gt;
&lt;br /&gt;
*Does the organization have a comprehensive disaster preparedness/business continuity plan?&lt;br /&gt;
*Does the plan included a backup and recovery procedure for all system data?&lt;br /&gt;
*Does the plan adequately address how operations can be continued under various scenarios?&lt;br /&gt;
*Does the plan include procedures for testing the various elements of the plan to ensure they are still valid?&lt;br /&gt;
*Does the plan address the criticality of the various systems in its design?&lt;br /&gt;
&lt;br /&gt;
====Evaluation====&lt;br /&gt;
&lt;br /&gt;
*Is a periodic re-evaluation of security standards undertaken?&lt;br /&gt;
*Does the re-evaluation take into account changes in the current state of IT security and the environment of threats facing secured systems, as well as the current state of the regulations?&lt;br /&gt;
&lt;br /&gt;
====Business Associate Agreements====&lt;br /&gt;
&lt;br /&gt;
*If components of the system are held outside the direct control of the company, such that PHI will be outside of the direct control of the company, do sufficient agreements exist to guarantee that the party responsible for handling the PHI will adhere to the requirements of the regulation?&lt;br /&gt;
*Are these agreements in such a form that they qualify as a contract or equivalent?&lt;br /&gt;
&lt;br /&gt;
==Physical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Facility Access Controls====&lt;br /&gt;
*Is the facility containing the system (this includes electronic access points that connect to the system in a &amp;quot;non-secure&amp;quot; manner) sufficiently protected from unauthorized access?&lt;br /&gt;
*Is access to application and database servers further restricted to only those personnel who are authorized to directly interact with those elements of the system (i.e., system administrators).&lt;br /&gt;
*Is there a system that limits access to facilities and areas within facilities to authorized personnel?  Does this system implement a mechanism for confirming the identify of individuals accessing the facility (e.g., through a electronic key access system)&lt;br /&gt;
*Does this system apply to visitors as well?&lt;br /&gt;
*Is access to systems used for testing and revision of software similarly restricted? Evaluate the access restrictions to tools that could be used to modify and deploy the software.  Ensure that these access restrictions are addressed via SOP.&lt;br /&gt;
&lt;br /&gt;
====Workstation Use====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist which govern the class of workstation that can be used to access PHI?&lt;br /&gt;
&lt;br /&gt;
====Workstation Security====&lt;br /&gt;
&lt;br /&gt;
*Are workstations that are used to access PHI appropriately restricted?&lt;br /&gt;
*If workstations can directly interact with PHI without additional controls, are the workstations secured in appropriately restricted areas?&lt;br /&gt;
&lt;br /&gt;
====Device and Media Controls====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place governing the use and removal of hardware and storage media used to house PHI?&lt;br /&gt;
*Do the procedures seem reasonable?&lt;br /&gt;
*Do procedures exist regarding the disposal of media and devices used to store PHI?&lt;br /&gt;
*Are records maintained that account for the movement of such media, and who moved it?&lt;br /&gt;
&lt;br /&gt;
==Technical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Access Control====&lt;br /&gt;
&lt;br /&gt;
*Do systems with access to PHI have a robust authentication process for gaining access?&lt;br /&gt;
*Do these system require that all users have a unique id?&lt;br /&gt;
*Are password assignment, change, recovery, and related processes designed in such a way so as to ensure that the user gaining access to PHI is who they say they are?&lt;br /&gt;
*Is there a mechanism for gaining access to necessary PHI in the event of an emergency?  Is this mechanism designed such that it's invocation during non-emergencies would not be achievable in a non-obvious way?&lt;br /&gt;
*Does this system automatically log off users after a defined period of inactivity?&lt;br /&gt;
*Does the system maintain PHI in an encrypted state?&lt;br /&gt;
&lt;br /&gt;
====Audit Controls====&lt;br /&gt;
&lt;br /&gt;
*Do systems used for PHI maintain audit trails which record, in a secure manner, all activities within the system.  Are the audit trails reviewed periodically?&lt;br /&gt;
&lt;br /&gt;
====Integrity====&lt;br /&gt;
&lt;br /&gt;
*Are policies and procedures in place to ensure that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
*Are electronic mechanisms employed to corroborate that PHI has not been altered or destroyed in an unauthorized manner?*&lt;br /&gt;
*If PHI is transmitted outside of the responsible entity (i.e., via the internet), is the data transmitted in such a way so as to prevent unauthorized access (via ssl or similar protocols?)&lt;br /&gt;
*Are security certificates on servers involved in managing PHI current, and authenticated by a recognized third party certifying organization?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organizational requirements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Business associate contracts====&lt;br /&gt;
&lt;br /&gt;
*Are business associates required contractually to adhere to the regulations with regard to PHI they maintain?&lt;br /&gt;
*Do business associate agreements exist with third party data/application hosting services?&lt;br /&gt;
*Do business associate agreements extend, contractually, to agents/subcontractors?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the business associate must immediately report any breaches or incidents?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the relationship can be terminated if the associate fails to comply with the requirements of the regulations?&lt;br /&gt;
*Do records exist of audits and other reviews of business associates?  If breeches or violations of the regulation have occurred, have appropriate actions been taken, up to and including termination of the agreement?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Documentation requirements==&lt;br /&gt;
&lt;br /&gt;
====Documentation====&lt;br /&gt;
&lt;br /&gt;
*Are the procedures required by the regulations maintained in written (or alternatively electronic, but signed) form?&lt;br /&gt;
*Are actions and activities which are required to be documented maintained in written form (or electronic alternatives)?&lt;br /&gt;
*Is there a retention policy regarding the policies and procedures?  Does the policy require that such documents be maintained for at least 6 years after either the date of its creation or of its effective date (whichever is later)?&lt;br /&gt;
*Does a review system exist for these policies and procedures to ensure that they are current?&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10946</id>
		<title>LII:Health Insurance Portability and Accountability Act audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10946"/>
		<updated>2013-05-22T03:03:13Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Security Awareness and Training */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with the [[Health Insurance Portability and Accountability Act]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
The following checklist is focused largely on computerized systems that house Protected Health Information (PHI) under the HIPAA regulations.  However, since the computerized system exists as part of a complete operation, even when it is hosted by a Cloud provider, the checklist covers the majority of the regulation.  This notion of the requirements of the entire regulation applying even to Cloud companies is particularly underscored with the HITECH modifications to the HIPAA regulations where Business Associates are now entirely responsible with adherence to the HIPAA privacy regulations and not merely on a contractual basis.&lt;br /&gt;
&lt;br /&gt;
==Administrative safeguards==&lt;br /&gt;
&lt;br /&gt;
====Security Management Process====&lt;br /&gt;
&lt;br /&gt;
*Does a detailed risk assessment exist regarding potential vulnerabilities to the confidentiality, integrity, and availability of PHI?&lt;br /&gt;
*Does the assessment identify actions to mitigate certain risks?  Have these actions been taken, or have plans been generated to take these actions? &lt;br /&gt;
*Does a policy exist specifying sanctions to be taken against employees who fail to comply with security policies and procedures?&lt;br /&gt;
*Is there a system in place for regular review of system activity, including things such as audit logs and incident reports?&lt;br /&gt;
&lt;br /&gt;
====Assigned security responsibility====&lt;br /&gt;
&lt;br /&gt;
*Is there a formally identified individual who is responsible for developing and implementing security policies?&lt;br /&gt;
*Has this individual, or the individual's direct reports, developed and implemented security policies?&lt;br /&gt;
*Collect evidence of security policies being implemented (group policy reports for the AD server, for instance)&lt;br /&gt;
&lt;br /&gt;
====Workforce security and Information Access Management====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist governing access to PHI by employees?&lt;br /&gt;
*Are employees who should not have access to PHI prevented from accessing it?&lt;br /&gt;
*If employees are permitted to access systems that contain PHI, but are not permitted to access PHI, does the system have suitable controls to prevent that access?&lt;br /&gt;
*View system accesses by both individuals who have access to PHI and those who don't, and evaluate potential areas of weakness in the security measures.&lt;br /&gt;
*Do processes exist for authorizing access to PHI?  Do these processes seem reasonable.  &lt;br /&gt;
*Are employees who have access to PHI supervised appropriately?  Do their supervisors have adequate training and understanding regarding the treatment of PHI?&lt;br /&gt;
*Are adequate procedures in place governing the termination of employees with access to PHI?&lt;br /&gt;
*Do these procedures include appropriately times termination of accounts (i.e., in the case of involuntary termination, is the account terminated before the employee might have the opportunity to cause harm?).&lt;br /&gt;
*For voluntary terminations, are procedures in place that require the supervisor to evaluate the need for continued access to PHI prior to the departure of the employee in question?&lt;br /&gt;
*Is there a clear requirement for communication with system administrators and IT staff regarding affected accounts?&lt;br /&gt;
*If a health clearinghouse is part of a larger organization, confirm that adequate controls exist that prevent the larger organization from accessing PHI.&lt;br /&gt;
*Do the PHI access procedures apply to the IT/IS organization?  That is, is access to PHI only allowed for IT/IS employees with a legitimate business reason to access that data?  Are IT/IS employees adequately trained in the HIPAA regulations, internal policies and procedures regarding PHI?&lt;br /&gt;
&lt;br /&gt;
====Security Awareness and Training====&lt;br /&gt;
*Is there a formal and documented training program for employees who deal with PHI?&lt;br /&gt;
*Are employees provided training on principles of security?&lt;br /&gt;
*Are there procedures in place for addressing malicious software, including it's detection and reporting?  Are employees prevented from accessing remote sites that are at high risk for containing malicious software?&lt;br /&gt;
*Is there a system for ensuring that security protection software (in particular anti-virus programs, and firewalls) are updated periodically?&lt;br /&gt;
*For outward facing applications, is there a process by which security flaws in components (such as Java) are identified and fixed.&lt;br /&gt;
*For systems that provide access to PHI, do they track log-ins, and in particular failed logins?  &lt;br /&gt;
*Does the system lock out users after a specified number of failed logins? &lt;br /&gt;
*Are system administrators notified if such an event occurs?&lt;br /&gt;
*Is there evidence that administrators respond to such events in an appropriate manner?  &lt;br /&gt;
*Are there policies governing password complexity, change and reuse frequency?  Are the policies consistent with current &amp;quot;standards&amp;quot; within the industry?&lt;br /&gt;
*Are employees trained to maintain strict secrecy regarding their passwords?&lt;br /&gt;
*Are there procedures mandating that IT may not request passwords from users?&lt;br /&gt;
&lt;br /&gt;
====Security Incident Procedures====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place for responding to security incidents?&lt;br /&gt;
*Is there evidence that these procedures are being followed (review any logs/files regarding actions taken in response to security incidents).&lt;br /&gt;
&lt;br /&gt;
====Contingency Plan====&lt;br /&gt;
&lt;br /&gt;
*Does the organization have a comprehensive disaster preparedness/business continuity plan?&lt;br /&gt;
*Does the plan included a backup and recovery procedure for all system data?&lt;br /&gt;
*Does the plan adequately address how operations can be continued under various scenarios?&lt;br /&gt;
*Does the plan include procedures for testing the various elements of the plan to ensure they are still valid?&lt;br /&gt;
*Does the plan address the criticality of the various systems in its design?&lt;br /&gt;
&lt;br /&gt;
====Evaluation====&lt;br /&gt;
&lt;br /&gt;
*Is a periodic re-evaluation of security standards undertaken?&lt;br /&gt;
*Does the re-evaluation take into account changes in the current state of IT security and the environment of threats facing secured systems, as well as the current state of the regulations?&lt;br /&gt;
&lt;br /&gt;
====Business Associate Agreements====&lt;br /&gt;
&lt;br /&gt;
*If components of the system are held outside the direct control of the company, such that PHI will be outside of the direct control of the company, do sufficient agreements exist to guarantee that the party responsible for handling the PHI will adhere to the requirements of the regulation?&lt;br /&gt;
*Are these agreements in such a form that they qualify as a contract or equivalent?&lt;br /&gt;
&lt;br /&gt;
==Physical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Facility Access Controls====&lt;br /&gt;
*Is the facility containing the system (this includes electronic access points that connect to the system in a &amp;quot;non-secure&amp;quot; manner) sufficiently protected from unauthorized access?&lt;br /&gt;
*Is access to application and database servers further restricted to only those personnel who are authorized to directly interact with those elements of the system (i.e., system administrators).&lt;br /&gt;
*Is there a system that limits access to facilities and areas within facilities to authorized personnel?  Does this system implement a mechanism for confirming the identify of individuals accessing the facility (e.g., through a electronic key access system)&lt;br /&gt;
*Does this system apply to visitors as well?&lt;br /&gt;
*Is access to systems used for testing and revision of software similarly restricted? Evaluate the access restrictions to tools that could be used to modify and deploy the software.  Ensure that these access restrictions are addressed via SOP.&lt;br /&gt;
&lt;br /&gt;
====Workstation Use====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist which govern the class of workstation that can be used to access PHI?&lt;br /&gt;
&lt;br /&gt;
====Workstation Security====&lt;br /&gt;
&lt;br /&gt;
*Are workstations that are used to access PHI appropriately restricted?&lt;br /&gt;
*If workstations can directly interact with PHI without additional controls, are the workstations secured in appropriately restricted areas?&lt;br /&gt;
&lt;br /&gt;
====Device and Media Controls====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place governing the use and removal of hardware and storage media used to house PHI?&lt;br /&gt;
*Do the procedures seem reasonable?&lt;br /&gt;
*Do procedures exist regarding the disposal of media and devices used to store PHI?&lt;br /&gt;
*Are records maintained that account for the movement of such media, and who moved it?&lt;br /&gt;
&lt;br /&gt;
==Technical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Access Control====&lt;br /&gt;
&lt;br /&gt;
*Do systems with access to PHI have a robust authentication process for gaining access?&lt;br /&gt;
*Do these system require that all users have a unique id?&lt;br /&gt;
*Are password assignment, change, recovery, and related processes designed in such a way so as to ensure that the user gaining access to PHI is who they say they are?&lt;br /&gt;
*Is there a mechanism for gaining access to necessary PHI in the event of an emergency?  Is this mechanism designed such that it's invocation during non-emergencies would not be achievable in a non-obvious way?&lt;br /&gt;
*Does this system automatically log off users after a defined period of inactivity?&lt;br /&gt;
*Does the system maintain PHI in an encrypted state?&lt;br /&gt;
&lt;br /&gt;
====Audit Controls====&lt;br /&gt;
&lt;br /&gt;
*Do systems used for PHI maintain audit trails which record, in a secure manner, all activities within the system.  Are the audit trails reviewed periodically?&lt;br /&gt;
&lt;br /&gt;
====Integrity====&lt;br /&gt;
&lt;br /&gt;
*Are policies and procedures in place to ensure that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
*Are electronic mechanisms employed to corroborate that PHI has not been altered or destroyed in an unauthorized manner?*&lt;br /&gt;
*If PHI is transmitted outside of the responsible entity (i.e., via the internet), is the data transmitted in such a way so as to prevent unauthorized access (via ssl or similar protocols?)&lt;br /&gt;
*Are security certificates on servers involved in managing PHI current, and authenticated by a recognized third party certifying organization?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organizational requirements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Business associate contracts====&lt;br /&gt;
&lt;br /&gt;
*Are business associates required contractually to adhere to the regulations with regard to PHI they maintain?&lt;br /&gt;
*Do business associate agreements exist with third party data/application hosting services?&lt;br /&gt;
*Do business associate agreements extend, contractually, to agents/subcontractors?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the business associate must immediately report any breaches or incidents?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the relationship can be terminated if the associate fails to comply with the requirements of the regulations?&lt;br /&gt;
*Do records exist of audits and other reviews of business associates?  If breeches or violations of the regulation have occurred, have appropriate actions been taken, up to and including termination of the agreement?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Requirements for group health plans====&lt;br /&gt;
&lt;br /&gt;
*Have group health plans amended their plans to reflect the need to comply with the regulation with regard to PHI?&lt;br /&gt;
&lt;br /&gt;
==Documentation requirements==&lt;br /&gt;
&lt;br /&gt;
====Documentation====&lt;br /&gt;
&lt;br /&gt;
*Are the procedures required by the regulations maintained in written (or alternatively electronic, but signed) form?&lt;br /&gt;
*Are actions and activities which are required to be documented maintained in written form (or electronic alternatives)?&lt;br /&gt;
*Is there a retention policy regarding the policies and procedures?  Does the policy require that such documents be maintained for at least 6 years after either the date of its creation or of its effective date (whichever is later)?&lt;br /&gt;
*Does a review system exist for these policies and procedures to ensure that they are current?&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10945</id>
		<title>LII:Health Insurance Portability and Accountability Act audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10945"/>
		<updated>2013-05-22T03:01:18Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with the [[Health Insurance Portability and Accountability Act]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
The following checklist is focused largely on computerized systems that house Protected Health Information (PHI) under the HIPAA regulations.  However, since the computerized system exists as part of a complete operation, even when it is hosted by a Cloud provider, the checklist covers the majority of the regulation.  This notion of the requirements of the entire regulation applying even to Cloud companies is particularly underscored with the HITECH modifications to the HIPAA regulations where Business Associates are now entirely responsible with adherence to the HIPAA privacy regulations and not merely on a contractual basis.&lt;br /&gt;
&lt;br /&gt;
==Administrative safeguards==&lt;br /&gt;
&lt;br /&gt;
====Security Management Process====&lt;br /&gt;
&lt;br /&gt;
*Does a detailed risk assessment exist regarding potential vulnerabilities to the confidentiality, integrity, and availability of PHI?&lt;br /&gt;
*Does the assessment identify actions to mitigate certain risks?  Have these actions been taken, or have plans been generated to take these actions? &lt;br /&gt;
*Does a policy exist specifying sanctions to be taken against employees who fail to comply with security policies and procedures?&lt;br /&gt;
*Is there a system in place for regular review of system activity, including things such as audit logs and incident reports?&lt;br /&gt;
&lt;br /&gt;
====Assigned security responsibility====&lt;br /&gt;
&lt;br /&gt;
*Is there a formally identified individual who is responsible for developing and implementing security policies?&lt;br /&gt;
*Has this individual, or the individual's direct reports, developed and implemented security policies?&lt;br /&gt;
*Collect evidence of security policies being implemented (group policy reports for the AD server, for instance)&lt;br /&gt;
&lt;br /&gt;
====Workforce security and Information Access Management====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist governing access to PHI by employees?&lt;br /&gt;
*Are employees who should not have access to PHI prevented from accessing it?&lt;br /&gt;
*If employees are permitted to access systems that contain PHI, but are not permitted to access PHI, does the system have suitable controls to prevent that access?&lt;br /&gt;
*View system accesses by both individuals who have access to PHI and those who don't, and evaluate potential areas of weakness in the security measures.&lt;br /&gt;
*Do processes exist for authorizing access to PHI?  Do these processes seem reasonable.  &lt;br /&gt;
*Are employees who have access to PHI supervised appropriately?  Do their supervisors have adequate training and understanding regarding the treatment of PHI?&lt;br /&gt;
*Are adequate procedures in place governing the termination of employees with access to PHI?&lt;br /&gt;
*Do these procedures include appropriately times termination of accounts (i.e., in the case of involuntary termination, is the account terminated before the employee might have the opportunity to cause harm?).&lt;br /&gt;
*For voluntary terminations, are procedures in place that require the supervisor to evaluate the need for continued access to PHI prior to the departure of the employee in question?&lt;br /&gt;
*Is there a clear requirement for communication with system administrators and IT staff regarding affected accounts?&lt;br /&gt;
*If a health clearinghouse is part of a larger organization, confirm that adequate controls exist that prevent the larger organization from accessing PHI.&lt;br /&gt;
*Do the PHI access procedures apply to the IT/IS organization?  That is, is access to PHI only allowed for IT/IS employees with a legitimate business reason to access that data?  Are IT/IS employees adequately trained in the HIPAA regulations, internal policies and procedures regarding PHI?&lt;br /&gt;
&lt;br /&gt;
====Security Awareness and Training====&lt;br /&gt;
*Is there a formal and documented training program for employees who deal with PHI?&lt;br /&gt;
*Are employees provided training on principles of security?&lt;br /&gt;
*Are there procedures in place for addressing malicious software, including it's detection and reporting?  Are employees prevented from accessing remote sites that are at high risk for containing malicious software?&lt;br /&gt;
*Is there a system for ensuring that security protection software (in particular anti-virus programs, and firewalls) are updated periodically?&lt;br /&gt;
*For outward facing applications, is there a process by which security flaws in components (such as Java) are identified and fixed.&lt;br /&gt;
*For systems that provide access to PHI, do they track log-ins, and in particular failed logins?  &lt;br /&gt;
*Does the system lock out users after a specified number of failed lockouts? &lt;br /&gt;
*Are system administrators notified if such an event occurs?&lt;br /&gt;
*Is there evidence that administrators respond to such events in an appropriate manner?  &lt;br /&gt;
*Are there policies governing password complexity, change and reuse frequency?  Are the policies consistent with current &amp;quot;standards&amp;quot; within the industry?&lt;br /&gt;
*Are employees trained to maintain strict secrecy regarding their passwords?&lt;br /&gt;
*Are there procedures mandating that IT may not request passwords from users?&lt;br /&gt;
&lt;br /&gt;
====Security Incident Procedures====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place for responding to security incidents?&lt;br /&gt;
*Is there evidence that these procedures are being followed (review any logs/files regarding actions taken in response to security incidents).&lt;br /&gt;
&lt;br /&gt;
====Contingency Plan====&lt;br /&gt;
&lt;br /&gt;
*Does the organization have a comprehensive disaster preparedness/business continuity plan?&lt;br /&gt;
*Does the plan included a backup and recovery procedure for all system data?&lt;br /&gt;
*Does the plan adequately address how operations can be continued under various scenarios?&lt;br /&gt;
*Does the plan include procedures for testing the various elements of the plan to ensure they are still valid?&lt;br /&gt;
*Does the plan address the criticality of the various systems in its design?&lt;br /&gt;
&lt;br /&gt;
====Evaluation====&lt;br /&gt;
&lt;br /&gt;
*Is a periodic re-evaluation of security standards undertaken?&lt;br /&gt;
*Does the re-evaluation take into account changes in the current state of IT security and the environment of threats facing secured systems, as well as the current state of the regulations?&lt;br /&gt;
&lt;br /&gt;
====Business Associate Agreements====&lt;br /&gt;
&lt;br /&gt;
*If components of the system are held outside the direct control of the company, such that PHI will be outside of the direct control of the company, do sufficient agreements exist to guarantee that the party responsible for handling the PHI will adhere to the requirements of the regulation?&lt;br /&gt;
*Are these agreements in such a form that they qualify as a contract or equivalent?&lt;br /&gt;
&lt;br /&gt;
==Physical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Facility Access Controls====&lt;br /&gt;
*Is the facility containing the system (this includes electronic access points that connect to the system in a &amp;quot;non-secure&amp;quot; manner) sufficiently protected from unauthorized access?&lt;br /&gt;
*Is access to application and database servers further restricted to only those personnel who are authorized to directly interact with those elements of the system (i.e., system administrators).&lt;br /&gt;
*Is there a system that limits access to facilities and areas within facilities to authorized personnel?  Does this system implement a mechanism for confirming the identify of individuals accessing the facility (e.g., through a electronic key access system)&lt;br /&gt;
*Does this system apply to visitors as well?&lt;br /&gt;
*Is access to systems used for testing and revision of software similarly restricted? Evaluate the access restrictions to tools that could be used to modify and deploy the software.  Ensure that these access restrictions are addressed via SOP.&lt;br /&gt;
&lt;br /&gt;
====Workstation Use====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist which govern the class of workstation that can be used to access PHI?&lt;br /&gt;
&lt;br /&gt;
====Workstation Security====&lt;br /&gt;
&lt;br /&gt;
*Are workstations that are used to access PHI appropriately restricted?&lt;br /&gt;
*If workstations can directly interact with PHI without additional controls, are the workstations secured in appropriately restricted areas?&lt;br /&gt;
&lt;br /&gt;
====Device and Media Controls====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place governing the use and removal of hardware and storage media used to house PHI?&lt;br /&gt;
*Do the procedures seem reasonable?&lt;br /&gt;
*Do procedures exist regarding the disposal of media and devices used to store PHI?&lt;br /&gt;
*Are records maintained that account for the movement of such media, and who moved it?&lt;br /&gt;
&lt;br /&gt;
==Technical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Access Control====&lt;br /&gt;
&lt;br /&gt;
*Do systems with access to PHI have a robust authentication process for gaining access?&lt;br /&gt;
*Do these system require that all users have a unique id?&lt;br /&gt;
*Are password assignment, change, recovery, and related processes designed in such a way so as to ensure that the user gaining access to PHI is who they say they are?&lt;br /&gt;
*Is there a mechanism for gaining access to necessary PHI in the event of an emergency?  Is this mechanism designed such that it's invocation during non-emergencies would not be achievable in a non-obvious way?&lt;br /&gt;
*Does this system automatically log off users after a defined period of inactivity?&lt;br /&gt;
*Does the system maintain PHI in an encrypted state?&lt;br /&gt;
&lt;br /&gt;
====Audit Controls====&lt;br /&gt;
&lt;br /&gt;
*Do systems used for PHI maintain audit trails which record, in a secure manner, all activities within the system.  Are the audit trails reviewed periodically?&lt;br /&gt;
&lt;br /&gt;
====Integrity====&lt;br /&gt;
&lt;br /&gt;
*Are policies and procedures in place to ensure that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
*Are electronic mechanisms employed to corroborate that PHI has not been altered or destroyed in an unauthorized manner?*&lt;br /&gt;
*If PHI is transmitted outside of the responsible entity (i.e., via the internet), is the data transmitted in such a way so as to prevent unauthorized access (via ssl or similar protocols?)&lt;br /&gt;
*Are security certificates on servers involved in managing PHI current, and authenticated by a recognized third party certifying organization?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organizational requirements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Business associate contracts====&lt;br /&gt;
&lt;br /&gt;
*Are business associates required contractually to adhere to the regulations with regard to PHI they maintain?&lt;br /&gt;
*Do business associate agreements exist with third party data/application hosting services?&lt;br /&gt;
*Do business associate agreements extend, contractually, to agents/subcontractors?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the business associate must immediately report any breaches or incidents?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the relationship can be terminated if the associate fails to comply with the requirements of the regulations?&lt;br /&gt;
*Do records exist of audits and other reviews of business associates?  If breeches or violations of the regulation have occurred, have appropriate actions been taken, up to and including termination of the agreement?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Requirements for group health plans====&lt;br /&gt;
&lt;br /&gt;
*Have group health plans amended their plans to reflect the need to comply with the regulation with regard to PHI?&lt;br /&gt;
&lt;br /&gt;
==Documentation requirements==&lt;br /&gt;
&lt;br /&gt;
====Documentation====&lt;br /&gt;
&lt;br /&gt;
*Are the procedures required by the regulations maintained in written (or alternatively electronic, but signed) form?&lt;br /&gt;
*Are actions and activities which are required to be documented maintained in written form (or electronic alternatives)?&lt;br /&gt;
*Is there a retention policy regarding the policies and procedures?  Does the policy require that such documents be maintained for at least 6 years after either the date of its creation or of its effective date (whichever is later)?&lt;br /&gt;
*Does a review system exist for these policies and procedures to ensure that they are current?&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10944</id>
		<title>LII:Health Insurance Portability and Accountability Act audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10944"/>
		<updated>2013-05-22T02:55:45Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: First upload checklist&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with the [[Health Insurance Portability and Accountability Act]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
==Administrative safeguards==&lt;br /&gt;
&lt;br /&gt;
====Security Management Process====&lt;br /&gt;
&lt;br /&gt;
*Does a detailed risk assessment exist regarding potential vulnerabilities to the confidentiality, integrity, and availability of PHI?&lt;br /&gt;
*Does the assessment identify actions to mitigate certain risks?  Have these actions been taken, or have plans been generated to take these actions? &lt;br /&gt;
*Does a policy exist specifying sanctions to be taken against employees who fail to comply with security policies and procedures? 164.308(1)(ii)(C)&lt;br /&gt;
*Is there a system in place for regular review of system activity, including things such as audit logs and incident reports?&lt;br /&gt;
&lt;br /&gt;
====Assigned security responsibility====&lt;br /&gt;
&lt;br /&gt;
*Is there a formally identified individual who is responsible for developing and implementing security policies?&lt;br /&gt;
*Has this individual, or the individual's direct reports, developed and implemented security policies?&lt;br /&gt;
*Collect evidence of security policies being implemented (group policy reports for the AD server, for instance)&lt;br /&gt;
&lt;br /&gt;
====Workforce security and Information Access Management====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist governing access to PHI by employees?&lt;br /&gt;
*Are employees who should not have access to PHI prevented from accessing it?&lt;br /&gt;
*If employees are permitted to access systems that contain PHI, but are not permitted to access PHI, does the system have suitable controls to prevent that access?&lt;br /&gt;
*View system accesses by both individuals who have access to PHI and those who don't, and evaluate potential areas of weakness in the security measures.&lt;br /&gt;
*Do processes exist for authorizing access to PHI?  Do these processes seem reasonable.  &lt;br /&gt;
*Are employees who have access to PHI supervised appropriately?  Do their supervisors have adequate training and understanding regarding the treatment of PHI?&lt;br /&gt;
*Are adequate procedures in place governing the termination of employees with access to PHI?&lt;br /&gt;
*Do these procedures include appropriately times termination of accounts (i.e., in the case of involuntary termination, is the account terminated before the employee might have the opportunity to cause harm?).&lt;br /&gt;
*For voluntary terminations, are procedures in place that require the supervisor to evaluate the need for continued access to PHI prior to the departure of the employee in question?&lt;br /&gt;
*Is there a clear requirement for communication with system administrators and IT staff regarding affected accounts?&lt;br /&gt;
*If a health clearinghouse is part of a larger organization, confirm that adequate controls exist that prevent the larger organization from accessing PHI.&lt;br /&gt;
*Do the PHI access procedures apply to the IT/IS organization?  That is, is access to PHI only allowed for IT/IS employees with a legitimate business reason to access that data?  Are IT/IS employees adequately trained in the HIPAA regulations, internal policies and procedures regarding PHI?&lt;br /&gt;
&lt;br /&gt;
====Security Awareness and Training====&lt;br /&gt;
*Is there a formal and documented training program for employees who deal with PHI?&lt;br /&gt;
*Are employees provided training on principles of security?&lt;br /&gt;
*Are there procedures in place for addressing malicious software, including it's detection and reporting?  Are employees prevented from accessing remote sites that are at high risk for containing malicious software?&lt;br /&gt;
*Is there a system for ensuring that security protection software (in particular anti-virus programs, and firewalls) are updated periodically?&lt;br /&gt;
*For outward facing applications, is there a process by which security flaws in components (such as Java) are identified and fixed.&lt;br /&gt;
*For systems that provide access to PHI, do they track log-ins, and in particular failed logins?  &lt;br /&gt;
*Does the system lock out users after a specified number of failed lockouts? &lt;br /&gt;
*Are system administrators notified if such an event occurs?&lt;br /&gt;
*Is there evidence that administrators respond to such events in an appropriate manner?  &lt;br /&gt;
*Are there policies governing password complexity, change and reuse frequency?  Are the policies consistent with current &amp;quot;standards&amp;quot; within the industry?&lt;br /&gt;
*Are employees trained to maintain strict secrecy regarding their passwords?&lt;br /&gt;
*Are there procedures mandating that IT may not request passwords from users?&lt;br /&gt;
&lt;br /&gt;
====Security Incident Procedures====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place for responding to security incidents?&lt;br /&gt;
*Is there evidence that these procedures are being followed (review any logs/files regarding actions taken in response to security incidents).&lt;br /&gt;
&lt;br /&gt;
====Contingency Plan====&lt;br /&gt;
&lt;br /&gt;
*Does the organization have a comprehensive disaster preparedness/business continuity plan?&lt;br /&gt;
*Does the plan included a backup and recovery procedure for all system data?&lt;br /&gt;
*Does the plan adequately address how operations can be continued under various scenarios?&lt;br /&gt;
*Does the plan include procedures for testing the various elements of the plan to ensure they are still valid?&lt;br /&gt;
*Does the plan address the criticality of the various systems in its design?&lt;br /&gt;
&lt;br /&gt;
====Evaluation====&lt;br /&gt;
&lt;br /&gt;
*Is a periodic re-evaluation of security standards undertaken?&lt;br /&gt;
*Does the re-evaluation take into account changes in the current state of IT security and the environment of threats facing secured systems, as well as the current state of the regulations?&lt;br /&gt;
&lt;br /&gt;
====Business Associate Agreements====&lt;br /&gt;
&lt;br /&gt;
*If components of the system are held outside the direct control of the company, such that PHI will be outside of the direct control of the company, do sufficient agreements exist to guarantee that the party responsible for handling the PHI will adhere to the requirements of the regulation?&lt;br /&gt;
*Are these agreements in such a form that they qualify as a contract or equivalent?&lt;br /&gt;
&lt;br /&gt;
==Physical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Facility Access Controls====&lt;br /&gt;
*Is the facility containing the system (this includes electronic access points that connect to the system in a &amp;quot;non-secure&amp;quot; manner) sufficiently protected from unauthorized access?&lt;br /&gt;
*Is access to application and database servers further restricted to only those personnel who are authorized to directly interact with those elements of the system (i.e., system administrators).&lt;br /&gt;
*Is there a system that limits access to facilities and areas within facilities to authorized personnel?  Does this system implement a mechanism for confirming the identify of individuals accessing the facility (e.g., through a electronic key access system)&lt;br /&gt;
*Does this system apply to visitors as well?&lt;br /&gt;
*Is access to systems used for testing and revision of software similarly restricted? Evaluate the access restrictions to tools that could be used to modify and deploy the software.  Ensure that these access restrictions are addressed via SOP.&lt;br /&gt;
&lt;br /&gt;
====Workstation Use====&lt;br /&gt;
&lt;br /&gt;
*Do procedures exist which govern the class of workstation that can be used to access PHI?&lt;br /&gt;
&lt;br /&gt;
====Workstation Security====&lt;br /&gt;
&lt;br /&gt;
*Are workstations that are used to access PHI appropriately restricted?&lt;br /&gt;
*If workstations can directly interact with PHI without additional controls, are the workstations secured in appropriately restricted areas?&lt;br /&gt;
&lt;br /&gt;
====Device and Media Controls====&lt;br /&gt;
&lt;br /&gt;
*Are procedures in place governing the use and removal of hardware and storage media used to house PHI?&lt;br /&gt;
*Do the procedures seem reasonable?&lt;br /&gt;
*Do procedures exist regarding the disposal of media and devices used to store PHI?&lt;br /&gt;
*Are records maintained that account for the movement of such media, and who moved it?&lt;br /&gt;
&lt;br /&gt;
==Technical safeguards==&lt;br /&gt;
&lt;br /&gt;
====Access Control====&lt;br /&gt;
&lt;br /&gt;
*Do systems with access to PHI have a robust authentication process for gaining access?&lt;br /&gt;
*Do these system require that all users have a unique id?&lt;br /&gt;
*Are password assignment, change, recovery, and related processes designed in such a way so as to ensure that the user gaining access to PHI is who they say they are?&lt;br /&gt;
*Is there a mechanism for gaining access to necessary PHI in the event of an emergency?  Is this mechanism designed such that it's invocation during non-emergencies would not be achievable in a non-obvious way?&lt;br /&gt;
*Does this system automatically log off users after a defined period of inactivity?&lt;br /&gt;
*Does the system maintain PHI in an encrypted state?&lt;br /&gt;
&lt;br /&gt;
====Audit Controls====&lt;br /&gt;
&lt;br /&gt;
*Do systems used for PHI maintain audit trails which record, in a secure manner, all activities within the system.  Are the audit trails reviewed periodically?&lt;br /&gt;
&lt;br /&gt;
====Integrity====&lt;br /&gt;
&lt;br /&gt;
*Are policies and procedures in place to ensure that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
*Are electronic mechanisms employed to corroborate that PHI has not been altered or destroyed in an unauthorized manner?*&lt;br /&gt;
*If PHI is transmitted outside of the responsible entity (i.e., via the internet), is the data transmitted in such a way so as to prevent unauthorized access (via ssl or similar protocols?)&lt;br /&gt;
*Are security certificates on servers involved in managing PHI current, and authenticated by a recognized third party certifying organization?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Organizational requirements==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Business associate contracts====&lt;br /&gt;
&lt;br /&gt;
*Are business associates required contractually to adhere to the regulations with regard to PHI they maintain?&lt;br /&gt;
*Do business associate agreements exist with third party data/application hosting services?&lt;br /&gt;
*Do business associate agreements extend, contractually, to agents/subcontractors?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the business associate must immediately report any breaches or incidents?&lt;br /&gt;
*Is it clear within the terms of the business associate agreements that the relationship can be terminated if the associate fails to comply with the requirements of the regulations?&lt;br /&gt;
*Do records exist of audits and other reviews of business associates?  If breeches or violations of the regulation have occurred, have appropriate actions been taken, up to and including termination of the agreement?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Requirements for group health plans====&lt;br /&gt;
&lt;br /&gt;
*Have group health plans amended their plans to reflect the need to comply with the regulation with regard to PHI?&lt;br /&gt;
&lt;br /&gt;
==Documentation requirements==&lt;br /&gt;
&lt;br /&gt;
====Documentation====&lt;br /&gt;
&lt;br /&gt;
*Are the procedures required by the regulations maintained in written (or alternatively electronic, but signed) form?&lt;br /&gt;
*Are actions and activities which are required to be documented maintained in written form (or electronic alternatives)?&lt;br /&gt;
*Is there a retention policy regarding the policies and procedures?  Does the policy require that such documents be maintained for at least 6 years after either the date of its creation or of its effective date (whichever is later)?&lt;br /&gt;
*Does a review system exist for these policies and procedures to ensure that they are current?&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10943</id>
		<title>LII:Health Insurance Portability and Accountability Act audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=LII:Health_Insurance_Portability_and_Accountability_Act_audit_guidelines_and_checklist&amp;diff=10943"/>
		<updated>2013-05-22T02:39:49Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with the [[Health Insurance Portability and Accountability Act]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
==Administrative safeguards==&lt;br /&gt;
&lt;br /&gt;
===Security Management Process===&lt;br /&gt;
&lt;br /&gt;
*Does a detailed risk assessment exist regarding potential vulnerabilities to the confidentiality, integrity, and availability of PHI? 164.308(1)(ii)(A)&lt;br /&gt;
*Does the assessment identify actions to mitigate certain risks?  Have these actions been taken, or have plans been generated to take these actions? 164.308(1)(ii)(B)&lt;br /&gt;
*Does a policy exist specifying sanctions to be taken against employees who fail to comply with security policies and procedures? 164.308(1)(ii)(C)&lt;br /&gt;
*Is there a system in place for regular review of system activity, including things such as audit logs and incident reports?&lt;br /&gt;
&lt;br /&gt;
Assigned security responsibility&lt;br /&gt;
&lt;br /&gt;
Is there a formally identified individual who is responsible for developing and implementing security policies?&lt;br /&gt;
Has this individual, or the individual's direct reports, developed and implemented security policies?&lt;br /&gt;
Collect evidence of security policies being implemented (group policy reports for the AD server, for instance)&lt;br /&gt;
&lt;br /&gt;
Workforce security and Information Access Management&lt;br /&gt;
&lt;br /&gt;
Do procedures exist governing access to PHI by employees?&lt;br /&gt;
Are employees who should not have access to PHI prevented from accessing it?&lt;br /&gt;
If employees are permitted to access systems that contain PHI, but are not permitted to access PHI, does the system have suitable controls to prevent that access?&lt;br /&gt;
View system accesses by both individuals who have access to PHI and those who don't, and evaluate potential areas of weakness in the security measures.&lt;br /&gt;
Do processes exist for authorizing access to PHI?  Do these processes seem reasonable.  &lt;br /&gt;
Are employees who have access to PHI supervised appropriately?  Do their supervisors have adequate training and understanding regarding the treatment of PHI?&lt;br /&gt;
Are adequate procedures in place governing the termination of employees with access to PHI?&lt;br /&gt;
Do these procedures include appropriately times termination of accounts (i.e., in the case of involuntary termination, is the account terminated before the employee might have the opportunity to cause harm?).&lt;br /&gt;
For voluntary terminations, are procedures in place that require the supervisor to evaluate the need for continued access to PHI prior to the departure of the employee in question?&lt;br /&gt;
Is there a clear requirement for communication with system administrators and IT staff regarding affected accounts?&lt;br /&gt;
If a health clearinghouse is part of a larger organization, confirm that adequate controls exist that prevent the larger organization from accessing PHI.&lt;br /&gt;
Do the PHI access procedures apply to the IT/IS organization?  That is, is access to PHI only allowed for IT/IS employees with a legitimate business reason to access that data?  Are IT/IS employees adequately trained in the HIPAA regulations, internal policies and procedures regarding PHI?&lt;br /&gt;
&lt;br /&gt;
Security Awareness and Training&lt;br /&gt;
Is there a formal and documented training program for employees who deal with PHI?&lt;br /&gt;
Are employees provided training on principles of security?&lt;br /&gt;
Are there procedures in place for addressing malicious software, including it's detection and reporting?  Are employees prevented from accessing remote sites that are at high risk for containing malicious software?&lt;br /&gt;
Is there a system for ensuring that security protection software (in particular anti-virus programs, and firewalls) are updated periodically?&lt;br /&gt;
For outward facing applications, is there a process by which security flaws in components (such as Java) are identified and fixed.&lt;br /&gt;
For systems that provide access to PHI, do they track log-ins, and in particular failed logins?  &lt;br /&gt;
Does the system lock out users after a specified number of failed lockouts? &lt;br /&gt;
Are system administrators notified if such an event occurs?&lt;br /&gt;
Is there evidence that administrators respond to such events in an appropriate manner?  &lt;br /&gt;
Are there policies governing password complexity, change and reuse frequency?  Are the policies consistent with current &amp;quot;standards&amp;quot; within the industry?&lt;br /&gt;
Are employees trained to maintain strict secrecy regarding their passwords?&lt;br /&gt;
Are there procedures mandating that IT may not request passwords from users?&lt;br /&gt;
&lt;br /&gt;
Security Incident Procedures&lt;br /&gt;
&lt;br /&gt;
Are procedures in place for responding to security incidents?&lt;br /&gt;
Is there evidence that these procedures are being followed (review any logs/files regarding actions taken in response to security incidents).&lt;br /&gt;
&lt;br /&gt;
Contingency Plan&lt;br /&gt;
&lt;br /&gt;
Does the organization have a comprehensive disaster preparedness/business continuity plan?&lt;br /&gt;
Does the plan included a backup and recovery procedure for all system data?&lt;br /&gt;
Does the plan adequately address how operations can be continued under various scenarios?&lt;br /&gt;
Does the plan include procedures for testing the various elements of the plan to ensure they are still valid?&lt;br /&gt;
Does the plan address the criticality of the various systems in its design?&lt;br /&gt;
&lt;br /&gt;
Evaluation&lt;br /&gt;
&lt;br /&gt;
Is a periodic re-evaluation of security standards undertaken?&lt;br /&gt;
Does the re-evaluation take into account changes in the current state of IT security and the environment of threats facing secured systems, as well as the current state of the regulations?&lt;br /&gt;
&lt;br /&gt;
Business Associate Agreements&lt;br /&gt;
&lt;br /&gt;
If components of the system are held outside the direct control of the company, such that PHI will be outside of the direct control of the company, do sufficient agreements exist to guarantee that the party responsible for handling the PHI will adhere to the requirements of the regulation? (note exceptions)&lt;br /&gt;
Are these agreements in such a form that they qualify as a contract or equivalent?&lt;br /&gt;
&lt;br /&gt;
Physical safeguards:&lt;br /&gt;
&lt;br /&gt;
Facility Access Controls&lt;br /&gt;
Is the facility containing the system (this includes electronic access points that connect to the system in a &amp;quot;non-secure&amp;quot; manner) sufficiently protected from unauthorized access?&lt;br /&gt;
Is access to application and database servers further restricted to only those personnel who are authorized to directly interact with those elements of the system (i.e., system administrators).&lt;br /&gt;
Is there a system that limits access to facilities and areas within facilities to authorized personnel?  Does this system implement a mechanism for confirming the identify of individuals accessing the facility (e.g., through a electronic key access system)&lt;br /&gt;
Does this system apply to visitors as well?&lt;br /&gt;
Is access to systems used for testing and revision of software similarly restricted? Evaluate the access restrictions to tools that could be used to modify and deploy the software.  Ensure that these access restrictions are addressed via SOP.&lt;br /&gt;
&lt;br /&gt;
Workstation Use&lt;br /&gt;
&lt;br /&gt;
Do procedures exist which govern the class of workstation that can be used to access PHI?&lt;br /&gt;
&lt;br /&gt;
Workstation Security&lt;br /&gt;
&lt;br /&gt;
Are workstations that are used to access PHI appropriately restricted?&lt;br /&gt;
If workstations can directly interact with PHI without additional controls, are the workstations secured in appropriately restricted areas?&lt;br /&gt;
&lt;br /&gt;
Device and Media Controls&lt;br /&gt;
&lt;br /&gt;
Are procedures in place governing the use and removal of hardware and storage media used to house PHI?&lt;br /&gt;
Do the procedures seem reasonable?&lt;br /&gt;
Do procedures exist regarding the disposal of media and devices used to store PHI?&lt;br /&gt;
Are records maintained that account for the movement of such media, and who moved it?&lt;br /&gt;
&lt;br /&gt;
Technical safeguards:&lt;br /&gt;
&lt;br /&gt;
Access Control&lt;br /&gt;
&lt;br /&gt;
Do systems with access to PHI have a robust authentication process for gaining access?&lt;br /&gt;
Do these system require that all users have a unique id?&lt;br /&gt;
Are password assignment, change, recovery, and related processes designed in such a way so as to ensure that the user gaining access to PHI is who they say they are?&lt;br /&gt;
Is there a mechanism for gaining access to necessary PHI in the event of an emergency?  Is this mechanism designed such that it's invocation during non-emergencies would not be achievable in a non-obvious way?&lt;br /&gt;
Does this system automatically log off users after a defined period of inactivity?&lt;br /&gt;
Does the system maintain PHI in an encrypted state?&lt;br /&gt;
&lt;br /&gt;
Audit Controls&lt;br /&gt;
&lt;br /&gt;
Do systems used for PHI maintain audit trails which record, in a secure manner, all activities within the system.  Are the audit trails reviewed periodically?&lt;br /&gt;
&lt;br /&gt;
Integrity&lt;br /&gt;
&lt;br /&gt;
Are policies and procedures in place to ensure that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
Are electronic mechanisms employed to corroborate that PHI has not been altered or destroyed in an unauthorized manner?&lt;br /&gt;
If PHI is transmitted outside of the responsible entity (i.e., via the internet), is the data transmitted in such a way so as to prevent unauthorized access (via ssl or similar protocols?)&lt;br /&gt;
Are security certificates on servers involved in managing PHI current, and authenticated by a recognized third party certifying organization?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Organizational requirements&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Business associate contracts&lt;br /&gt;
&lt;br /&gt;
- Are business associates required contractually to adhere to the regulations with regard to PHI they maintain?&lt;br /&gt;
Do business associate agreements exist with third party data/application hosting services?&lt;br /&gt;
Do business associate agreements extend, contractually, to agents/subcontractors?&lt;br /&gt;
Is it clear within the terms of the business associate agreements that the business associate must immediately report any breaches or incidents?&lt;br /&gt;
Is it clear within the terms of the business associate agreements that the relationship can be terminated if the associate fails to comply with the requirements of the regulations?&lt;br /&gt;
Do records exist of audits and other reviews of business associates?  If breeches or violations of the regulation have occurred, have appropriate actions been taken, up to and including termination of the agreement?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Requirements for group health plans&lt;br /&gt;
&lt;br /&gt;
- Have group health plans amended their plans to reflect the need to comply with the regulation with regard to PHI?&lt;br /&gt;
&lt;br /&gt;
Documentation requirements&lt;br /&gt;
&lt;br /&gt;
Documentation&lt;br /&gt;
&lt;br /&gt;
Are the procedures required by the regulations maintained in written (or alternatively electronic, but signed) form?&lt;br /&gt;
Are actions and activities which are required to be documented maintained in written form (or electronic alternatives)?&lt;br /&gt;
Is there a retention policy regarding the policies and procedures?  Does the policy require that such documents be maintained for at least 6 years after either the date of its creation or of its effective date (whichever is later)?&lt;br /&gt;
Does a review system exist for these policies and procedures to ensure that they are current?&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10422</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10422"/>
		<updated>2013-04-20T06:41:52Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Process Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to? - [[#21 CFR Part 11|21 CFR 11.70]]&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls). - [[#21 CFR Part 11|21 CFR 11.200(a)(3)]]&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access? - [[#21 CFR Part 11|21 CFR 11.200(a)(1)(i)]]&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)? - [[#21 CFR Part 11|21 CFR 11.300(c)]]&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts? - [[#21 CFR Part 11|21 CFR 11.300(d)]]&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted? - [[#21 CFR Part 11|21 CFR 11.300(e)]]&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 123]]&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency? - [[#21 CFR Part 11|21 CFR 11.10(b)]]&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy? - [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system? - [[#21 CFR Part 11|21 CFR 11.10(g)]]&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)? - [[#21 CFR Part 11|21 CFR 11.10(f)]]&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10421</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10421"/>
		<updated>2013-04-20T06:39:39Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Records Retention Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to? - [[#21 CFR Part 11|21 CFR 11.70]]&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls). - [[#21 CFR Part 11|21 CFR 11.200(a)(3)]]&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access? - [[#21 CFR Part 11|21 CFR 11.200(a)(1)(i)]]&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)? - [[#21 CFR Part 11|21 CFR 11.300(c)]]&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts? - [[#21 CFR Part 11|21 CFR 11.300(d)]]&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted? - [[#21 CFR Part 11|21 CFR 11.300(e)]]&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 123]]&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency? - [[#21 CFR Part 11|21 CFR 11.10(b)]]&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy? - [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10420</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10420"/>
		<updated>2013-04-20T06:35:07Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Export of Records for Agency Review */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to? - [[#21 CFR Part 11|21 CFR 11.70]]&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls). - [[#21 CFR Part 11|21 CFR 11.200(a)(3)]]&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access? - [[#21 CFR Part 11|21 CFR 11.200(a)(1)(i)]]&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)? - [[#21 CFR Part 11|21 CFR 11.300(c)]]&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts? - [[#21 CFR Part 11|21 CFR 11.300(d)]]&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted? - [[#21 CFR Part 11|21 CFR 11.300(e)]]&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 123]]&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency? - [[#21 CFR Part 11|21 CFR 11.10(b)]]&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10419</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10419"/>
		<updated>2013-04-20T06:20:41Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Electronic Signatures */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to? - [[#21 CFR Part 11|21 CFR 11.70]]&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls). - [[#21 CFR Part 11|21 CFR 11.200(a)(3)]]&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access? - [[#21 CFR Part 11|21 CFR 11.200(a)(1)(i)]]&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)? - [[#21 CFR Part 11|21 CFR 11.300(c)]]&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts? - [[#21 CFR Part 11|21 CFR 11.300(d)]]&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted? - [[#21 CFR Part 11|21 CFR 11.300(e)]]&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 123]]&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10418</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10418"/>
		<updated>2013-04-20T05:20:20Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* System Specific */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10417</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10417"/>
		<updated>2013-04-20T05:18:59Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Open Systems Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls&amp;lt;ref&amp;gt;The field of IT security has exploded in recent years with a number of high profile breaches.  At the time of the writing of Part 11, the internet was much safer in this regard than it is today.  The auditor should focus significant effort on security around all systems, but especially open systems.&amp;lt;ref&amp;gt;===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10416</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10416"/>
		<updated>2013-04-20T05:09:14Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Open Systems Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10415</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10415"/>
		<updated>2013-04-19T05:11:38Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Access Controls */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10414</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10414"/>
		<updated>2013-04-19T05:05:59Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Audit Trails 21 CFR 11.10(e) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails ===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records time stamped? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review? [[#21 CFR Part 11|21 CFR 11.10(e)]]&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10413</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10413"/>
		<updated>2013-04-19T05:04:25Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Audit Trails */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails [[#21 CFR Part 11|21 CFR 11.10(e)]]===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10412</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10412"/>
		<updated>2013-04-19T05:02:54Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Fraud Detection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent? [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10411</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10411"/>
		<updated>2013-04-19T05:00:03Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Records Retention Policy */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations? [[#21 CFR Part 11|21 CFR 11.10(c)]]&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10410</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10410"/>
		<updated>2013-04-19T04:56:41Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Electronic Signature Certification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so? [[#21 CFR Part 11|21 CFR 11.100(c)]]&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10409</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10409"/>
		<updated>2013-04-19T04:55:07Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Change Control Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?  [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10408</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10408"/>
		<updated>2013-04-19T04:54:30Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Change Control Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?  [[#General Principles of Software Validation|GPSV 5.2.7]]&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding? &lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable? [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
*Do change control systems in use require appropriate approvals as governed by the SDLC model in use?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10407</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10407"/>
		<updated>2013-04-19T04:39:40Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Change Control Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a configuration management system in place such that the contents of each version of released software is archived and readily identifiable?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10406</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10406"/>
		<updated>2013-04-19T04:34:37Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Training and Personnel */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?[[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
*Are users trained on the use of electronic records systems? [[#21 CFR Part 11|21 CFR 11.10(i)]]&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10405</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10405"/>
		<updated>2013-04-19T04:16:25Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Training Programs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training and Personnel===&lt;br /&gt;
*Is an organizational chart available covering personnel involved in the design, development, administration or use of electronic records systems?&lt;br /&gt;
*Are job descriptions available for these individuals, indicating their specific responsibilities regarding electronic record systems?&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations?&lt;br /&gt;
*Are users trained on the use of electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10404</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10404"/>
		<updated>2013-04-19T04:13:26Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Cloud Computing PoliciesIn general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems. */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner? [[#21 CFR Part 11|21 CFR 11.30]]&lt;br /&gt;
&lt;br /&gt;
===Training Programs===&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations?&lt;br /&gt;
*Are users trained on the use of electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10403</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10403"/>
		<updated>2013-04-19T04:10:31Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Cloud Computing Policies */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies&amp;lt;ref&amp;gt;In general there was little anticipation when Part 11 was drafted that such a thing as the cloud would come to exist.  These checklist items, therefore, are reasonable extensions of requirements for in house systems.&amp;lt;/ref&amp;gt;===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do these policies include Service Level Agreements(SLA's) regarding such things as up time, and support responsiveness?&lt;br /&gt;
*Are cloud vendors evaluated for security and compliance with appropriate regulations?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner?&lt;br /&gt;
&lt;br /&gt;
===Training Programs===&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations?&lt;br /&gt;
*Are users trained on the use of electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
	<entry>
		<id>https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10358</id>
		<title>21 CFR Part 11/Audit guidelines and checklist</title>
		<link rel="alternate" type="text/html" href="https://www.limswiki.org/index.php?title=21_CFR_Part_11/Audit_guidelines_and_checklist&amp;diff=10358"/>
		<updated>2013-04-17T04:55:54Z</updated>

		<summary type="html">&lt;p&gt;Jleecbd: /* Identity Management Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The following guidelines and checklist items provide a frame of reference for [[:Category:Vendors|vendors]] and auditors to better determine potential compliance issues with [[21 CFR Part 11|Title 21 Code of Federal Regulations Part 11]] and a variety of other regulatory guidelines.&lt;br /&gt;
&lt;br /&gt;
All items in the checklist for general IT controls should also be checked for individual systems, especially where those systems use different control measures (e.g., they have an independent authentication system).&lt;br /&gt;
&lt;br /&gt;
If this checklist is used by software vendors, then certain elements may or may not apply depending on the circumstances. For instance, validation is technically the responsibility of the entity acquiring the software. However, in the case of [[software as a service|SaaS]], a greater practical responsibility to validate the system may lie with the vendor. In all cases, the vendor should assume responsibility for ensuring that their software operates as intended within the targeted environments. Failure to do so may result in a lack of willingness of potential customers to obtain the system.&lt;br /&gt;
&lt;br /&gt;
References will be provided for each checklist item to indicate where the requirement comes from. These references are either to the regulation itself, Agency responses in the Final Rule, or from the guidance document &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff&amp;quot; (GPSV).&lt;br /&gt;
&lt;br /&gt;
==General IT==&lt;br /&gt;
&lt;br /&gt;
Following is a list of questions that either apply to the larger IT environment, or to both the larger environment and to individual systems. The auditor must be sure to evaluate both where necessary. For instance, an organization may have a robust password policy which is managed by a centralized identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or may not leverage the corporate IDM and thus it’s identity management should be evaluated on its own merits.&lt;br /&gt;
&lt;br /&gt;
====Computer Systems Validation - 21 CFR 11.10(a)====&lt;br /&gt;
*Does a defined computer system validation policy exist? - [[#21 CFR Part 11|21 CFR 11.10(a)]]&lt;br /&gt;
*Are all computer systems involved in activities covered by predicate regulations validated? - [[#21 CFR Part 11|21 CFR 11.10(a)]], [[#Others|21 CFR 211.68(b)]], [[#Others|21 CFR 820.30(g)]]&lt;br /&gt;
*Does the computer system validation cover the current deployed version of the system? - [[#General Principles of Software Validation|GPSV 4.7]]&lt;br /&gt;
*Validation Assessment&lt;br /&gt;
**Does the software developer have a defined systems development life-cycle (SDLC)? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Does the SDLC reflect a generally recognized life cycle approach? &amp;lt;ref&amp;gt;While the Agency specifically does not recommend an SDLC, and rightfully so, established SDLC approaches become established typically due to the quality of product that comes from them.  An SDLC that is either unique or a blend of disparate approaches may merit additional attention on the part of the auditor &amp;lt;/ref&amp;gt;&lt;br /&gt;
**Is the SDLC followed? - [[#General Principles of Software Validation|GPSV 4.4]]&lt;br /&gt;
**Is the software well documented from a design/development/implementation perspective? - [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**Is there evidence of design review activities (what this entails will depend on the nature of the SDLC - for instance, Agile methodologies will involve daily standup  meetings,while a waterfall approach may reflect formal design review steps)? - [[#General Principles of Software Validation|GPSV 3.5]]&lt;br /&gt;
**Does the level of validation coverage reflect the risk from system failure? - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**Is there sufficient level of independence in the validation/verification activities? - [[#General Principles of Software Validation|GPSV 4.9]]&lt;br /&gt;
**Are sufficient resources and personnel provided for software development and validation? - [[#Others|21 CFR 211.25(c)]], [[#Others|21 CFR 820.25(a)]]&lt;br /&gt;
**Are records maintained of defects and failures identified in the development process? - [[#General Principles of Software Validation|GPSV 5.2.6]]&lt;br /&gt;
**For any software system, is there a set of approved requirements which drove the design (note:  the name can vary based on the SDLC in use). - [[#General Principles of Software Validation|GPSV 6.1]]&lt;br /&gt;
**For iterative development approaches, are previous versions of deliverables (such as requirements lists) archived in some fashion? - [[#General Principles of Software Validation|GPSV 5.2.1]]&lt;br /&gt;
**Is there an audit trail for modifications to system documentation? - [[#21 CFR Part 11|21 CFR 11.10(k)(2)]]&lt;br /&gt;
**For commercial off-the-shelf (COTS), has the vendor been evaluated for its quality systems? - [[#General Principles of Software Validation|GPSV 6.3]]&lt;br /&gt;
**Is there some form of traceability that permits tracking of test results and verification activities to specific requirements? - [[#General Principles of Software Validation|GPSV 5.2.2]]&lt;br /&gt;
**Are adequate change control systems in place during the development and implementation processes? [[#General Principles of Software Validation|GPSV 3.3]]&lt;br /&gt;
**For each of the other elements of this checklist that apply directly to an electronic record system, has appropriate validation work been undertaken to establish that the system complies with the checklist item?&lt;br /&gt;
&lt;br /&gt;
===Identity Management Systems===&lt;br /&gt;
*Do any identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable? - [[#21 CFR Part 11|21 CFR Part 11 Final Rule Section 130]]&lt;br /&gt;
*Do these id systems have policies regarding password change frequency? -  [[#21 CFR Part 11|21 CFR 11.300(b)]]&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s? &amp;lt;ref&amp;gt;Although the regulation only specifies that identification codes in combination with passwords must be unique, since passwords are typically stored in encrypted format, there is no practical way to do this outside of ensuring that user ID's are unique&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Do formal procedures exist governing user account creation for electronic records systems.&lt;br /&gt;
*Do formal procedures exist governing access to network and server resources that are used to operate electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Cloud Computing Policies===&lt;br /&gt;
*Are policies in place governing the selection and use of cloud vendors for electronic record systems?&lt;br /&gt;
*Do policies governing record retention specifically apply to cloud vendors?&lt;br /&gt;
*Are systems for transmitting electronic records configured to do so in a secure manner?&lt;br /&gt;
&lt;br /&gt;
===Training Programs===&lt;br /&gt;
*Is there a defined training program around authentication practices?  Electronic signatures?&lt;br /&gt;
*Are system administrators and developers trained in Part 11 and related regulations?&lt;br /&gt;
*Are users trained on the use of electronic records systems?&lt;br /&gt;
&lt;br /&gt;
===Change Control Systems===&lt;br /&gt;
*Is there a formal change control system for modifications to the production electronic records system?&lt;br /&gt;
*Is there a formal change control system for changes to requirements and design elements of the system during the development process?&lt;br /&gt;
*Does the change control system require an assessment of impact, risk, and require authorization before proceeding?&lt;br /&gt;
*Do change control systems in use for Agile development models require product owner and development team approvals?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signature Certification===&lt;br /&gt;
*If the organization is using electronic signatures, have they filed a certification with the FDA indicating so?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Policy===&lt;br /&gt;
* Does the organization have a records retention policy covering records per the predicate regulations?&lt;br /&gt;
&lt;br /&gt;
==System Specific==&lt;br /&gt;
&lt;br /&gt;
===Fraud Detection===&lt;br /&gt;
* Is the system designed to either prevent record alteration or make such alteration apparent?&lt;br /&gt;
&lt;br /&gt;
===Audit Trails===&lt;br /&gt;
*Does the system maintain an audit trail that tracks changes to electronic records?&lt;br /&gt;
*Are the audit trail records time stamped?&lt;br /&gt;
*Are the audit trail records system generated, such that human intervention is not required?&lt;br /&gt;
*Are audit trail records secured such that they cannot be modified by users of the system?&lt;br /&gt;
*Is the audit trail data available for export (printing or electronic) to support agency review?&lt;br /&gt;
&lt;br /&gt;
===Access Controls===&lt;br /&gt;
*Does the identity management systems have minimum password complexity/strength requirements?  Do these minimums seem reasonable?&lt;br /&gt;
*Do these id systems have policies regarding password change frequency?&lt;br /&gt;
*Do identity management systems prevent the creation of duplicate user ID’s?&lt;br /&gt;
&lt;br /&gt;
===Open Systems Controls===&lt;br /&gt;
*Are records transmitted by the system sent in a secure manner, such that their authenticity, integrity and confidentiality are ensured?&lt;br /&gt;
*Is access to the system appropriately managed to prevent unauthorized external access?&lt;br /&gt;
*Has the system been evaluated for susceptibility to intrusion?&lt;br /&gt;
*Is there a system in place to evaluate current IT security threats that have been identified (by the National Cyber Awareness System via NIST, or other appropriate organization)?&lt;br /&gt;
&lt;br /&gt;
===Electronic Signatures===&lt;br /&gt;
*Is the electronic signature system engineered in such a way as to ensure that the signatures cannot be attached to other records, or cannot be removed from the records they are attached to?&lt;br /&gt;
*Is the system engineered such that in order to apply someone else’s signature to a file that collaboration is required between two or more individuals? (this is largely covered by the identity management controls).&lt;br /&gt;
*If a signature event only requires one signature element, is it only in the case of being part of a continuous period of system access?&lt;br /&gt;
*Are their suitable loss management procedures in place to address compromised passwords, or lost/stolen authentication devices (such as RSA ID tokens)?&lt;br /&gt;
*Is the system designed to alert security and/or management in the event of an apparent attempt at unauthorized use of electronic signatures?  Does the system automatically take steps to lock out users associated with these attempts?&lt;br /&gt;
*Is there a system for the periodic testing of tokens and cards to ensure that they are still operating as expected and have not been altered?  If not, is there something in the nature of the tokens/cards that would render them unusable should alteration be attempted?&lt;br /&gt;
*Is there a password reset method that does not require system administrators to know a user’s password?&lt;br /&gt;
*Are user passwords suitably encrypted in any persistent data store, such that elucidating the original password would require extraordinary means?&lt;br /&gt;
*Are controls in place to ensure that password reset instructions are sent to the correct individual?&lt;br /&gt;
&lt;br /&gt;
===Export of Records for Agency Review===&lt;br /&gt;
*Does the system support exporting records in a format that is readable by the agency?&lt;br /&gt;
*If the agency hasn’t been specifically consulted with regard to acceptable formats, does the system support export into common formats such as XML or JSON?&lt;br /&gt;
&lt;br /&gt;
===Records Retention Support===&lt;br /&gt;
* Does the system have sufficient controls to ensure that the records stored within it will be available throughout the period specified in the records retention policy?&lt;br /&gt;
&lt;br /&gt;
===Process Controls===&lt;br /&gt;
*Does the system have a mechanism to establish differing levels of authority to perform tasks in the system?&lt;br /&gt;
*Does the system have a mechanism for preventing steps being taken out of sequence (e.g., signing a record before data has been entered, or releasing a record before the review step was completed)?&lt;br /&gt;
&lt;br /&gt;
==Reference material==&lt;br /&gt;
&lt;br /&gt;
===21 CFR Part 11===&lt;br /&gt;
&lt;br /&gt;
'''Subpart A — General Provisions'''&lt;br /&gt;
:§ 11.1 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.1 Scope]&lt;br /&gt;
:§ 11.2 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.2 Implementation]&lt;br /&gt;
:§ 11.3 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.3 Definitions]&lt;br /&gt;
&lt;br /&gt;
'''Subpart B — Electronic Records'''&lt;br /&gt;
:§ 11.10 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.10 Controls for closed systems]&lt;br /&gt;
:§ 11.30 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.30 Controls for open systems]&lt;br /&gt;
:§ 11.50 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.50 Signature manifestations]&lt;br /&gt;
:§ 11.70 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.70 Signature/record linking]&lt;br /&gt;
&lt;br /&gt;
'''Subpart C — Electronic Signatures'''&lt;br /&gt;
:§ 11.100 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.100 General requirements]&lt;br /&gt;
:§ 11.200 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.200 Electronic signature components and controls]&lt;br /&gt;
:§ 11.300 [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/CFRSearch.cfm?fr=11.300 Controls for identification codes/passwords]&lt;br /&gt;
&lt;br /&gt;
===General Principles of Software Validation===&lt;br /&gt;
&lt;br /&gt;
The full name of this FDA guidance document is &amp;quot;General Principles of Software Validation; Final Guidance for Industry and FDA Staff,&amp;quot; referenced on here as &amp;quot;GPSV.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237928 Section 1. Purpose]'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237929 Section 2. Scope]'''&lt;br /&gt;
:2.1. Applicability&lt;br /&gt;
:2.2. Audience&lt;br /&gt;
:2.3. The Least Burdensome Approach&lt;br /&gt;
:2.4. Regulatory Requirements for Software Validation&lt;br /&gt;
:2.4. Quality System Regulation vs Pre-Market Submissions&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237935 Section 3. Context for Software Validation]'''&lt;br /&gt;
:3.1. Definitions and Terminology&lt;br /&gt;
::3.1.1 Requirements and Specifications&lt;br /&gt;
::3.1.2 Verification and Validation&lt;br /&gt;
::3.1.3 IQ/OQ/PQ&lt;br /&gt;
:3.2. Software Development as Part of System Design&lt;br /&gt;
:3.3. Software is Different from Hardware&lt;br /&gt;
:3.4. Benefits of Software Validation&lt;br /&gt;
:3.5  Design Review&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237944 Section 4. Principles of Software Validation]'''&lt;br /&gt;
:4.1. Requirements&lt;br /&gt;
:4.2. Defect Prevention&lt;br /&gt;
:4.3. Time and Effort&lt;br /&gt;
:4.4. Software Life Cycle&lt;br /&gt;
:4.5. Plans&lt;br /&gt;
:4.6. Procedures&lt;br /&gt;
:4.7. Software Validation After a Change&lt;br /&gt;
:4.8. Validation Coverage&lt;br /&gt;
:4.9. Independence of Review&lt;br /&gt;
:4.10. Flexibility and Responsibility&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237955 Section 5. Activities and Tasks]'''&lt;br /&gt;
:5.1. Software Life Cycle Activities&lt;br /&gt;
:5.2. Typical Tasks Supporting Validation&lt;br /&gt;
::5.2.1. Quality Planning&lt;br /&gt;
::5.2.2. Requirements&lt;br /&gt;
::5.2.3. Design&lt;br /&gt;
::5.2.4. Construction or Coding&lt;br /&gt;
::5.2.5. Testing by the Software Developer&lt;br /&gt;
::5.2.6. User Site Testing&lt;br /&gt;
::5.2.7. Maintenance and Software Changes&lt;br /&gt;
&lt;br /&gt;
'''[http://www.fda.gov/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm085281.htm#_Toc517237965 Section 6. Validation of Automated Process Equipment and Quality System Software]'''&lt;br /&gt;
:6.1. How Much Validation Evidence Is Needed?&lt;br /&gt;
:6.2. Defined User Requirements&lt;br /&gt;
:6.3. Validation of Off-the-Shelf Software and Automated Equipment&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=211 21 CFR Part 211]: Current Good Manufacturing Practice for Finished Pharmaceuticals&lt;br /&gt;
	&lt;br /&gt;
* [http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=820 21 CFR Part 820]: Quality System Regulation&lt;br /&gt;
&lt;br /&gt;
==References and footnotes==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Regulatory information]]&lt;/div&gt;</summary>
		<author><name>Jleecbd</name></author>
	</entry>
</feed>