Scilife _ EU Annex 11 Mapping Checklist 2023
Scilife _ EU Annex 11 Mapping Checklist 2023
Compliance
checklist
This checklist is a nexus of EU GMP Annex 11’s clauses and
Scilife expertise. As a leading SaaS platform, Scilife’s QMS
harmonizes seamlessly with these mandates, guiding your
digital transformation path. This matrix unveils alignment
and synergy, where regulations find their match in Scilife's
functionalities.
Validation
For critical data entered manually, there should be an additional System requires unique User IDs and
check on the accuracy of the data. This check may be done by a mandatory passwords for each active
Accuracy
6 second operator or by validated electronic means. The criticality Yes user. System requires authentication
checks
and the potential consequences of erroneous or incorrectly for any deletion and modification in the
entered data to a system should be covered by risk management. system.
Regular back-ups of all relevant data should be done. Integrity Back-ups, integrity and accuracy
Data
8 and accuracy of backup data and the ability to restore the data Yes checks are done as per defined
Storage
should be checked during validation and monitored periodically. procedure.
APPLICABLE
ITEM # & TITLE REQUIREMENT / DESCRIPTION EXPLANATION
YES/NO
Change and
configuratio Any changes to a computerized system including system
Changes are made as per predefined
11 n configurations should only be made in a controlled manner in 12 Yes
procedure
managemen accordance with a defined procedure
t
APPLICABLE
ITEM # & TITLE REQUIREMENT / DESCRIPTION EXPLANATION
YES/NO
The extent of security controls depends on the criticality of the System asks for electronic signature for
15 Security 16 Yes
computerized system. creation, modification or confirmation
of records as per module
Creation, change, and cancellation of access authorizations configurations.
should be recorded. Each executed electronic signature
contains printed name of the signer,
Management systems for data and for documents should be date and time of signature and
designed to record the identity of operators entering, changing, meaning of the signature.
confirming or deleting data including date and time.
APPLICABLE
ITEM # & TITLE REQUIREMENT / DESCRIPTION EXPLANATION
YES/NO
All incidents, not only system failures and data errors, should be
Incident
reported and assessed. The root cause of a critical incident Incidents are reported and assessed as
17 Managemen 18 Yes
should be identified and should form the basis of corrective and per defined procedure
t
preventive actions.