Guidelines On Validation - Appendix 5 Validation of Computerized Systems
Guidelines On Validation - Appendix 5 Validation of Computerized Systems
2
August 2018
Draft document for comments
22 .
© World Health Organization 2018
23
24 All rights reserved.
25
26 This draft is intended for a restricted audience only, i.e. the individuals and organizations having received this draft. The draft
27 may not be reviewed, abstracted, quoted, reproduced, transmitted, distributed, translated or adapted, in part or in whole, in any
28 form or by any means outside these individuals and organizations (including the organizations' concerned staff and member
29 organizations) without the permission of the World Health Organization. The draft should not be displayed on any website.
30
31 Please send any request for permission to:
32
33 Dr Sabine Kopp, Group Lead, Medicines Quality Assurance, Technologies Standards and Norms, Regulation of Medicines and
34 other Health Technologies, Department of Essential Medicines and Health Products, World Health Organization, CH-1211
35 Geneva 27, Switzerland, fax: (41 22) 791 4856, email: [email protected].
36
37 The designations employed and the presentation of the material in this draft do not imply the expression of any opinion
38 whatsoever on the part of the World Health Organization concerning the legal status of any country, territory, city or area or of its
39 authorities, or concerning the delimitation of its frontiers or boundaries. Dotted lines on maps represent approximate border lines
40 for which there may not yet be full agreement.
41
42 The mention of specific companies or of certain manufacturers’ products does not imply that they are endorsed or recommended
43 by the World Health Organization in preference to others of a similar nature that are not mentioned. Errors and omissions
44 excepted, the names of proprietary products are distinguished by initial capital letters.
45
46 All reasonable precautions have been taken by the World Health Organization to verify the information contained in this draft.
47 However, the printed material is being distributed without warranty of any kind, either expressed or implied. The responsibility
48 for the interpretation and use of the material lies with the reader. In no event shall the World Health Organization be liable for
49 damages arising from its use.
50
51 This draft does not necessarily represent the decisions or the stated policy of the World Health Organization.
52
Working document QAS/16.667/Rev.2
page 2
88 Appendix 4
89 Analytical method validation – update in process (working document QAS/16.671).
90
91 Appendix 5
92 Validation of computerized systems – updated text proposed in this working document.
93
94 Appendix 6
95 Qualification of systems and equipment – update in process (working document
96 QAS/16.673/Rev.1).
97
98 Appendix 7
99 Non-sterile process validation – update already published as Annex 3, WHO Technical Report
100 Series, No. 992, 2015.
101
102 2. INTRODUCTION AND SCOPE
103
104 2.1 Computerized systems should be validated in accordance with quality risk management
105 principles and the level of validation should be commensurate to identified risks, complexity and
106 intended use. This guide applies to systems used in GMP (4) but may be extended to
107 systems used in all good practice (GxP) activities, as appropriate.
108
109 2.2 The purpose of validation is to confirm that the computerized system specifications
110 conform to the user’s needs and intended use by examination and provision of documented and
111 objective evidence that the particular requirements can be consistently fulfilled. Validation
112 should establish confidence in the accuracy, reliability and consistency in the performance of the
113 system, and it should also ensure that all necessary technical and procedural controls are
114 implemented confirming compliance with good documentation practices for electronic data
115 generated by the system (5).
116
117 2.3 System elements that need to be considered in computerized system validation include
118 computer hardware and software, related equipment and IT infrastructure and operating system
Working document QAS/16.667/Rev.2
page 6
119 environment, procedures and systems documentation, as appropriate, including user manuals.
120 Persons should be appropriately trained and qualified, including but not limited to, developers,
121 end-users, system application administrators, network engineers, database administrators and
122 electronic archivers. Computerized system validation activities should address both system
123 functionality and configuration as well as any custom-developed elements.
124
125 2.4 Computerized systems should be maintained throughout the system life cycle in a
126 validated state with risk-based controls for the operational phase which may include, but is not
127 limited to, system planning, preparation and verification of standard operating procedures
128 (SOPs) and training programs, system operation and maintenance, including handling of
129 software and hardware updates, monitoring and review, change management and incident
130 reporting followed by system retirement.
131
132 2.5 Depending on the types of systems or typical applications, such as process control
133 systems (distributed control system (DCS), programmable logic controller (PLC), supervisory
134 control and data acquisition (SCADA)), laboratory information management systems (LIMS),
135 laboratory instrument control systems and business systems (enterprise resource planning
136 (ERP), manufacturing resource planning (MRP II)) used by the manufacturer, documentation
137 covering, but not limited to, the following information and supporting process should be
138 accessible on-site for review:
139
140 purpose and scope;
141 roles and responsibilities;
142 validation approach;
143 risk management approach;
144 approved system requirement/specifications;
145 system acceptance criteria;
146 vendor selection and assessment;
147 configuration management and change control procedures;
148 backup and recovery (application and data);
149 error handling and corrective action;
Working document QAS/16.667/Rev.2
page 7
180 reports or other mechanisms that display events related to the computerized system, specific
181 electronic records or specific data contained within the record.
182
183 automatic or live update. A process used to bring up-to-date software and system
184 functionalities in a silent or announced way. More specifically, the update takes place
185 automatically with or without the user's knowledge.
186
187 backup. A backup means a copy of one or more electronic files created as an alternative
188 in case the original data or system are lost or become unusable (for example, in the event of a
189 system crash or corruption of a disk). It is important to note that backup differs from archival in
190 that backup copies of electronic records are typically only temporarily stored for the purposes of
191 disaster recovery and may be periodically overwritten. Such temporary backup copies should
192 not be relied upon as an archival mechanism.
193
194 business continuity plan. A documented plan that defines the ongoing process supported
195 by management and funded to ensure that the necessary steps are taken to identify the impact of
196 potential losses, maintain viable recovery strategies and recovery plans and assure continuity of
197 services through personnel training, plan testing and maintenance.
198
199 cloud based. A model for enabling on-demand network access to a shared pool of
200 configurable computing resources that can be rapidly provisioned and released with minimal
201 management effort or service provider interaction. These computing resources should be
202 appropriately qualified.
203
204 computerized system. A computerized system collectively controls the performance and
205 execution of one or more automated processes and/or functions. It includes computer hardware,
206 software, peripheral devices, networks and documentation, for example, manuals and SOPs, as
207 well as personnel interacting with hardware and software.
208
Working document QAS/16.667/Rev.2
page 9
240 safety, product quality and/or the reliability of the decisions made throughout all phases of the
241 data life cycle.
242
243 disaster recovery. A documented process or set of procedures to recover and protect a
244 business information technology infrastructure in any event causing the system to be unavailable.
245 It appropriately defines resources and actions to be taken before, during and after a disaster to
246 return the system to operational use.
247
248 functional specifications. The functional specifications define functions and
249 technological solutions that are specified for the computerized system based upon technical
250 requirements needed to satisfy user requirements (for example, specified bandwidth required to
251 meet the user requirement for anticipated system usage).
252
253 legacy system. It refers to an outdated computer system, programming language,
254 application software, or processes that are used, instead of available upgraded versions, that are
255 deemed not to fully satisfy current GMP requirements.
256
257 master data. A single source of business data used across multiple systems, applications
258 and processes and subject to change control to ensure accuracy through the data life cycle.
259
260 metadata. Metadata is data about data that provides the contextual information required
261 to understand those data. These include structural and descriptive metadata. Such data describe
262 the structure, data elements, interrelationships and other characteristics of data. They also permit
263 data to be attributable to an individual. Metadata necessary to evaluate the meaning of data
264 should be securely linked to the data and subject to adequate review. For example, in weighing,
265 the number 8 is meaningless without metadata, such as, the unit, milligram, etc. Other examples
266 of metadata include the time/date stamp of an activity, the operator identification (ID) of the
267 person who performed an activity, the instrument ID used, processing parameters, sequence files,
268 audit trails and other data required to understand data and reconstruct activities.
269
270
Working document QAS/16.667/Rev.2
page 11
333 during validation and the system should then be released for GMP use.
334
335 5. VENDOR MANAGEMENT
336
337 5.1 When third parties (for example, vendors, service providers) are used, such as, to
338 provide, install, configure, validate, maintain, modify or retain a computerized system or related
339 service, or for data processing or system components, including cloud-based systems. An
340 evaluation of the vendor-supplied system or service and the vendor’s quality systems should be
341 conducted and recorded. The scope and depth of this evaluation should be based upon risk
342 management principles.
343
344 5.2 The competence and reliability of a vendor are key factors when selecting a product
345 and/or service provider. Vendor management is an ongoing process that requires periodic
346 assessment and review. Vendor evaluation activities may include, but are not limited to:
347 completion of a quality-related questionnaire by the vendor; gathering of vendor documentation
348 related to system development, testing and maintenance including vendor procedures,
349 specifications, system architecture diagrams, test evidence, release notes and other relevant
350 vendor documentation; an on-site audit of the vendor’s facilities should be conducted to evaluate
351 the vendor’s system life-cycle control procedures, practices and documentation.
352
353 5.3 A contract should be in place between the manufacturer and the vendor, and/or the
354 service provider defining the roles and responsibilities and quality procedures for both parties,
355 throughout the system life cycle. The contract acceptor should not pass to a third party any of
356 the work entrusted to her/him under the contract without the manufacturer’s prior evaluation and
357 approval of the arrangements.
358
359 6. REQUIREMENTS SPECIFICATIONS
360
361 6.1 Requirements specifications should be written to document user requirements and
362 functional or operational requirements and performance requirements. Requirements may be
363 documented in separate URS and functional requirements specifications (FRS) documents or in
Working document QAS/16.667/Rev.2
page 14
395 sequencing of each step and event (for example, controls that prevent alteration of
396 data in temporary memory in a manner that would not be documented);
397 controls that assure that all steps that create, modify or delete electronic data will be
398 recorded in independent, computer-generated audit trails or other metadata or
399 alternate documents that record the “what” (for example, original entry), “who” (for
400 example, user identification), “when” (for example, time/date stamp) and “why” (for
401 example, reason) of the action;
402 backups and the ability to restore the system and data from backups;
403 the ability to archive and retrieve the electronic data in a manner that assures that the
404 archive copy preserves the full content of the original electronic data set, including
405 all metadata needed to fully reconstruct the GMP activity. The archive copy should
406 also preserve the meaning of the original electronic data set;
407 input/output checks, including implementation of procedures for the review of
408 original electronic data and metadata, such as audit trails;
409 controls for electronic signatures;
410 alarms and flags that indicate alarm conditions and invalid and altered data in order
411 to facilitate detection and a review of these events;
412 system documentation, including system specifications documents, user manuals and
413 procedures for system use, data review and system administration;
414 system capacity and volume requirements based upon the predicted system usage and
415 performance requirements;
416 performance monitoring of the system;
417 controls for orderly system shutdown and recovery; and
418 business continuity.
419
420 6.4 The extent and detail of the requirements should be commensurate with the operational
421 risk and the complexity of the computerized system. User requirements should be specific and
422 be phrased in a way to support their testing or verification within the computerized system’s
423 context.
424
425
Working document QAS/16.667/Rev.2
page 16
457 7.3 The system design and configuration specifications may include, as applicable, a
458 software design specification in case of code development and configuration specifications of
459 the software application parameters, such as security profiles, audit trail configuration, data
460 libraries and other configurable elements.
461
462 7.4 In addition, the system design and configuration specifications may also include, based
463 upon risk, the hardware design and its configuration specifications as well as that of any
464 supporting network infrastructure.
465
466 7.5 System design and configuration specifications should include secure, protected,
467 independent computer-generated audit trails to track configuration changes to critical settings in
468 the system.
469
470 8. DESIGN QUALIFICATION
471
472 8.1 Following design qualification (DQ), a review should be conducted to verify that the
473 proposed design and configuration of the system is suitable for its intended purpose and will
474 meet all applicable user and FRS.
475
476 8.2 It may include a review of vendor documentation, if applicable, and verification that
477 requirements specifications are traceable to proposed design and configuration specifications.
478
479 9. SYSTEM DEVELOPMENT AND PROJECT IMPLEMENTATION
480
481 9.1 Once the system requirements and the system design and configuration are specified and
482 verified, where applicable, system development activities may begin. The development
483 activities may occur as a dedicated phase following completion of specification of system
484 requirements, design and configuration. Alternatively, development activities may occur
485 iteratively as requirements are specified and verified (such as when prototyping or rapid-
486 development methodologies are employed).
487
Working document QAS/16.667/Rev.2
page 18
519 9.6 Prior to the initiation of the system qualification phase, the software program and
520 requirements and specifications documents should be finalized and subsequently managed under
521 formal change control.
522
523 9.7 Persons who will be conducting the system qualification should be trained to adhere to
524 the following requirements for system qualification:
525
526 test documentation should be generated to provide evidence of testing;
527 test documentation should comply with good documentation practices; and
528 any discrepancies between actual test results and expected results should be
529 documented and adequately resolved based upon risk prior to proceeding to subsequent
530 test phases.
531
532 10. INSTALLATION QUALIFICATION
533
534 10.1 Installation qualification (IQ) - also referred to as installation verification testing -
535 should provide documented evidence that the computerized system, including software and
536 associated hardware, is installed and configured in the intended system test and production
537 environments according to written specifications.
538
539 10.2 The IQ will verify, for example, that the computer hardware on which the software
540 application is installed has the proper firmware and operating system, that all components are
541 present and in the proper condition, and that each component is installed per the manufacturer or
542 developer instructions.
543
544 10.3 IQ should include verification that configurable elements of the system are appropriately
545 set as specified. Where appropriate, this could also be done during operational qualification
546 (OQ).
547
548
549
Working document QAS/16.667/Rev.2
page 20
673 circumvented.
674
675 14.8 All GMP computerized systems, either stand-alone or in a network, should have a
676 system commensurate to identified risks for monitoring through an audit trail events that are
677 relevant. These events should include all elements that need to be monitored to ensure that the
678 integrity (5) of the data could not have been compromised, such as but not limited to, changes in
679 data, deletion of data, dates, times, backups, archives, changes in user access rights,
680 addition/deletion of users and logins, in accordance with WHO Guidance on Good Data and
681 Record Management Practices (5). The configuration and archival of these audit trails should
682 be documented and also be subjected to change control. These audit trails should be accurate,
683 consistent, secure and available throughout the retention period and their generation
684 appropriately qualified.
685
686 Operation and maintenance
687
688 14.9 Entry of data into a computerized system should be verified by an independent
689 authorized person and locked before release for routine use.
690
691 14.10 Validated computerized systems should be maintained in a validated state once released
692 to the GxP production environment.
693
694 14.11 There should be written procedures governing system operation and maintenance,
695 including, for example:
696
697 performance monitoring;
698 change management and configuration management;
699 problem/incident management;
700 program and data security;
701 program and data backup/restore and archival/retrieval;
702 system administration and maintenance;
703 data flow and data life cycle;
Working document QAS/16.667/Rev.2
page 25
704 system use and review of electronic data and metadata (such as audit trails);
705 personnel training;
706 disaster recovery and business continuity;
707 availability of replacement parts and technical support; and
708 periodic re-evaluation.
709
710 Data Migration
711
712 14.12 Where electronic data are transferred from one system to another, it should be
713 demonstrated that data are not altered during the migration process. Conversion of data to a
714 different format should be considered as data migration. Where data are transferred to another
715 medium, data must be verified as an exact copy prior to any destruction of the original data.
716
717 14.13 Data migration procedures may vary greatly in complexity and measures to ensure
718 appropriate transfer of data should be commensurate to identified risks. Migrated data should
719 remain usable and should retain its content and meaning. The value and/or meaning of and links
720 between a system audit trail and electronic signatures should be ensured in a migration process.
721
722 Periodic review
723
724 14.14 Computerized systems should be periodically reviewed to determine whether the system
725 remains in a validated state or whether there is a need for revalidation. The scope and extent of
726 the revalidation should be determined using a risk-based approach. The review should at least
727 cover:
728
729 maintenance and calibration;
730 review of changes;
731 review of deviations;
732 review of incidents/events (including review of audit trail);
733 systems documentation;
734 procedures;
Working document QAS/16.667/Rev.2
page 26
767 3. WHO Good Manufacturing Practices: Water for Pharmaceutical Use. WHO Technical Report Series, No.
768 970, 2012, Annex 2.
769
770 4. WHO Good Manufacturing Practices for Pharmaceutical Products: Main Principles. WHO Technical
771 Report Series, No. 986, 2014, Annex 2.
772
773 5. Guidance on Good Data and Record Management Practices. WHO Technical Report Series, No. 996,
774 2016, Annex 5.
775
776 Further reading
777
778 Organization for Economic Co-Operation and Development (OECD) series on Principles of Good Laboratory
779 Practice and Compliance Monitoring, No. 17. Advisory document of the Working Group on Good Laboratory
780 Practice (GLP) and Application of GLP Principles to Computerised Systems, 2016.
781
782 Computerised systems. In: The Rules Governing Medicinal Products in the European Union. Volume 4: Good
783 Manufacturing Practice (GMP) Guidelines: Annex 11. Brussels: European Commission:
784 (http://ec.europa.eu/enterprise/pharmaceuticals/eudralex/vol-4/pdfs-en/anx11en.pdf).
785
786 Drug Information Association. Computerized Systems Used in Non-Clinical Safety Assessment; Current Concepts
787 in Validation and Compliance. Horsham, PA: Drug Information Association (DIA), 2008.
788
789 GAMP® – A Risk-Based Approach to Compliant GxP Computerized Systems. Tampa, FL: GAMP Forum,
790 International Society for Pharmaceutical Engineering (ISPE); 2008.
791
792 GAMP® Good Practice Guide: A Risk-Based Approach to GxP Compliant Laboratory Computerized Systems, 2nd
793 edition. Tampa (FL): International Society for Pharmaceutical Engineering (ISPE); 2012.
794
795 GAMP® Good Practice Guide: A Risk-Based Approach to GxP Process Control Systems, 2nd edition. Tampa (FL):
796 International Society for Pharmaceutical Engineering (ISPE); 2011.
797
798 GAMP® Good Practice Guide: A Risk-Based Approach to Operation of GxP Computerized Systems – A
799 Companion Volume to GAMP®5. Tampa (FL): International Society for Pharmaceutical Engineering (ISPE);
800 2010.
801
802 GAMP® Good Practice Guide: A Risk-Based Approach to Regulated Mobile Applications. Tampa (FL):
803 International Society for Pharmaceutical Engineering (ISPE); 2014.
Working document QAS/16.667/Rev.2
page 28
804
805 GAMP® Good Practice Guide: A Risk-Based Approach to Testing of GxP Systems, 2nd edition. Tampa (FL):
806 International Society for Pharmaceutical Engineering (ISPE); 2012.
807
808 GAMP® Good Practice Guide: Global Information Systems Control and Compliance. Tampa (FL): International
809 Society for Pharmaceutical Engineering (ISPE); 2005.
810
811 GAMP® Good Practice Guide: IT Infrastructure Control and Compliance. Tampa (FL): International Society for
812 Pharmaceutical Engineering (ISPE); 2005.
813
814 GAMP® Good Practice Guide: Manufacturing Execution Systems – A Strategic and Program Management
815 Approach. Tampa (FL): International Society for Pharmaceutical Engineering (ISPE); 2010.
816
817 National Institute of Standards and Technology, U.S. Department of Commerce, (NIST) Cloud Computing
818 References: http://www.nist.gov/itl/cloud/index.cfm.
819
820 Official Medicines Control Laboratories Network of the Council of Europe: Quality assurance documents:
821 PA/PH/OMCL (08) 69 3R – Validation of Computerised Systems – core document:
822 (https://www.edqm.eu/sites/default/files/medias/fichiers/Validation_of_
823 Computerised_Systems_Core_Document.pdf) and its annexes:
824
825 PA/PH/OMCL (08) 87 2R – Annex 1: Validation of Computerised Calculation Systems: Example of
826 Validation of In-House Software:
827 (https://www.edqm.eu/sites/default/files/medias/fichiers/NEW_Annex_1_Validation_of_computerise
828 d_calculation.pdf).
829 PA/PH/OMCL (08) 88 R – Annex 2: Validation of Databases (DB), Laboratory Information
830 Management Systems (LIMS) and Electronic Laboratory Notebooks (ELN):
831 (https://www.edqm.eu/sites/default/files/medias/fichiers/NEW_Annex_2_Validation_of_Databases_
832 DB_Laboratory_.pdf).
833
834 PA/PH/OMCL (08) 89 R – Annex 3: Validation of Computers as Part of Test Equipment:
835 (https://www.edqm.eu/sites/default/files/medias/fichiers/NEW_Annex_3_Validation_of_computers_a
836 s_part_of_tes.pdf).
837
838 PA/PH/OMCL (08) 69 R7 - Annex 17: Application of GLP Principles to Computerised Systems:
839 (http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=env/jm/mono(2016)13&do
840 clanguage=en).
Working document QAS/16.667/Rev.2
page 29
841 Title 21, Code of Federal Regulations (21 CFR Part 11): Electronic records; electronic signatures. US Food and
842 Drug Administration. The current status of 21 CFR Part 11 Guidance is located under Regulations and Guidance
843 at: http://www.fda.gov/cder/gmp/index.htm — see background: http://www.fda.gov/OHRMS/DOCKETS/98fr/03-
844 4312.pdf.
845
846 PIC/S guide to good manufacturing practice for medicinal products annexes: Annex 11 – Computerised systems.
847 Geneva: Pharmaceutical Inspection Co-operation Scheme.
848
849 PIC/S PI 011-3, Good Practices for Computerised Systems in Regulated GxP Environments. Geneva:
850 Pharmaceutical Inspection Co-operation Scheme
851
852 ***