Abb Part11
Abb Part11
Handwritten signature means the scripted name or legal mark of an individual handwritten by that individual and executed or adopted with the present intention to authenticate a writing in a permanent form.
21 CFR Part 11
For Life Sciences Industries, electronic signatures were given legal equivalence with traditional wet ink signatures on paper in 1997. The Food and Drug Administration (FDA) rule for electronic records and signatures became effective and enforceable on August 20, 1997. The rule has two main areas of enforcement: electronic records and electronic signatures. The rule applies to all areas of Title 21 of the Code of Federal Regulation (CFR) for all manufactured drugs and medical products distributed in the United States of America. Detailed procedural and technical requirements are given for both electronic signatures and electronic records. Some of these include: Ability to discern invalid records Ability to generate electronic copies of records Automatic generation of audit trail Access controls Secure link of signatures to records Use of unique secure signatures
Electronic record keeping and electronic signature use are not mandatory, but if used must comply with the requirements of the rule. The scope of 21 CFR Part 11 includes operational areas of a pharmaceutical, biotechnology or medical device company such as: Manufacturing (for example, production records) Maintenance (for example, asset management or calibration records) Laboratory (for example, sampling results or product development) Although this document deals exclusively with 21 CFR Part 11 for the U.S., many other jurisdictions also have directives in place that enable the use of electronic records and signatures.
22
Electronic record means any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system.
21 CFR Part 11
Electronic signature means a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individuals handwritten signature.
21 CFR Part 11
Our commitment
Our customers ask for support moving into a paperless world in order to satisfy regulatory requirements as well as business requirements such as ease of use and reduced costs. Know the market, follow its demands, open up future opportunities for our customers. This is ABBs philosophy to create value for our customers. 21 CFR Part 11 has become an integrated part of our automation technology and system design. The rule is not a problem anymore. We help our customers to achieve and maintain 21 CFR Part 11 compliance while minimizing life cycle costs. Regulatory compliance The IndustrialIT automation system is a technology platform that can be installed and configured to conform to the 21 CFR Part 11 regulation. Our automation system complies with the rules requirements with features like system security, secure data management and reporting, electronic records and signatures, and a time-stamped audit trail, for automated electronic recording of changes. Electronic records and signatures Our technology combines the efficiency of electronic record keeping with the security of authenticated electronic signatures. Electronic records in an automation system are easier to keep than manual records. Records generated and maintained by the automation system include: 4 Recipe and unit configurations System configuration Device calibration Operator input Audit trail Alarm and event history Trends and batch records Shift, batch and other reports The system security protects electronic records from alterations by non-authorized persons. The automation system can ask the user to electronically sign records; for example, when new calibration data is released for download into an instrument, a new batch recipe is approved for production or an operator input occurs. The electronic signature act is performed by user or supervisor typing in their User ID and Password.
Closed system means an environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system.
21 CFR Part 11
Security
Authorization and access control We utilize and extend the MicrosoftTM Windows security system to meet the demands of automation applications for Life Sciences Industries. Access can be controlled down to the object (e.g., motor) and even function (e.g., start the motor). Critical operator actions can be designated for a user authentication action prior to permitting the action to take effect in the process. Data integrity System, engineering and manufacturing data are protected throughout their life cycle from unauthorized access, modification or deletion in order to ensure accuracy, consistency, and completeness. For example: User access is controlled by a three-dimensional model: Person x Object x Function. User account passwords age. All accesses and changes to system and data are logged and tracked in the audit trail. All essential components are designed with redundancy. When redundancy is implemented in the solution, if one component fails, the redundant partner immediately takes over with no interruption of your operations, or loss of data. Asset monitors use real-time plant and system information as inputs for such tasks as detecting maintenance conditions before failure occurs or to diagnosing a problem. Network The system supports client/server architectures. The use of the Microsoft Domain and Networking ensures unique user IDs and maximizes security in the automation system. The aspect server is one of the core system services that handles object and asset management, file set distribution and cross references as well as security. Redundancy is also available for the aspect server. The automation system network is based on TCP/IP over Ethernet. The routing protocol (RNRP) supports redundant network configurations based on standard network components. Detection of a network failure and switch over to the redundant network takes less than one second, with no loss or duplication of data. Network security considerations depend on whether the system is closed or open. An isolated automation system is an example of a closed system; a system that connects to a corporate intranet or internet is an example of an open system. Proper Information Technology practices should be followed when implementing the network and network security.
Section B-11.10
21 CFR Part 11 Regulation Text Persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine. Such procedures and controls shall include the following: Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records.
ABB Implementation and Application The end-user and manufacturer is responsible for developing procedures to support automation applications in regulated environments. Our validation experts support a full spectrum of compliancy efforts, including end-user validation, SOP development and risk-based approaches to dealing with 21 CFR Part 11 issues. Our customers need to validate their installation. We help by providing project execution and product development methodologies that integrate validation activities throughout the system development life cycle. ABBs automation system supports access control. It registers changes to electronic records as audit trail events. It can be configured to check the validity of input data.
(a)
(b)
The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency. Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records. Protection of records to enable their accurate and ready retrieval throughout the records retention period.
Configuration as well as production data, like recorded history, audit trails or batch reports, can be exported or archived. The information is available on-line to the authorized operator in either standard or customized displays, or can be printed or exported. Our experts help our customers fulfill business and regulatory drivers associated with record retention by defining appropriate procedures for access, archival and retrieval of records. Our automation system supports long-term archiving to a variety of media and common file formats like PDF and XML. It also protects the data from unauthorized access.
(c)
(f)
Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate.
(g)
Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand.
(h)
Use of device (e.g., terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction.
(i)
Determination that persons who develop, maintain, or use electronic record/electronic signature systems have the education, training, and experience to perform their assigned tasks.
(k)
B-11.70
(b)
(c)
Our customers are responsible for submitting a certification to the agency that the electronic signatures used in their system are intended to be the legally binding equivalent of traditional handwritten signatures.
The system distinguishes between an electronic signature assigned and linked to an electronic record, and an authorization for controlled system access, e.g., to open a valve or to schedule a batch recipe. The user must enter his or her user ID and password for each separate signature action.
Our customers need to set up appropriate procedures and policies. The pharmaceutical organization is responsible for installing appropriate procedures and policies. Password data cannot be retrieved from the system. Security and access control limit access to electronic records and audit trail information. As our security and access controls are built around standard Microsoft security features, it may be possible to integrate Microsoft compatible biometric devices into a solution. Every combination of user identification and password is unique.
(3) Be administered and executed to ensure that attempted use of an individuals electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals.
(b)
Electronic signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than their genuine owners.
C-11.300 (a)
Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls shall include: Maintaining the uniqueness of each combined identification code and password, such that no two individuals have the same combination of identification code and password.
(b)
Ensuring that identification code and password issuances are periodically checked, recalled, or revised (e.g., to cover such events as password aging). Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls.
In addition to organizational procedures, the system technology supports password aging and minimum password length and prevents the reuse of a configurable number of prior passwords. Our customer is responsible for defining procedures for handling forgotten or lost passwords. If you need help in this process, please contact ABB.
(c)
10
(e)
This is the responsibility of the system owner. Our experts can support this effort.
Compliant IndustrialIT solutions are delivered and supported by our validation and compliance professionals, ensuring seamless integration into regulated and quality controlled processes. Our automation system can integrate third-party units as well, and process electronic recording and signatures for product-related data for the complete plant area. Many legacy units were not constructed for full 21 CFR Part 11 support. The rule is imposing a considerable burden on pharmaceutical companies to comply. To address criticism of 21 CFR Part 11, especially from the owners of legacy systems, the FDA issued a statement about the risk-based approach to GMP and later, in August 2003, issued a guidance Scope and Application, stating that Part 11 will be interpreted narrowly. Our consultants will support you in a transition from the traditional approach to compliance, to a risk based approach.
Risk Based Approach IndustrialIT ABB has developed a pragmatic and risk based approach to dealing with 21 CFR Part 11. The main characteristics of the model are consistency, rationale and risk reduction: Assessments are brief and directed towards the highest risk. No assessment is complete until the remediation is identified. Regulatory, inspection and business criticality are determined. Prioritization is based on criticality, cost and economic life cycle All corrective actions are justified with a rationale, both those that are to be implemented and those that are not.
ABB is more than an equipment supplier and automation provider. We are your complete Industrial Information Technology partner. Thats IndustrialIT from ABB, allowing you to operate your plant the way you want to. With IndustrialIT youre always in full control.
11
3BUS045001R0001 Copyright 2004 by ABB Inc. All rights to trademarks reside with their respective owners. Specifications subject to change without notice. Pictures, schematics and other graphics contained herein are published for illustration purposes only and do not represent product configurations or functionality. User documentation accompanying the product is the exclusive source for functionality descriptions.