金币
UID185364
帖子
主题
积分1609
注册时间2014-11-16
最后登录1970-1-1
听众
性别保密
|
欢迎您注册蒲公英
您需要 登录 才可以下载或查看,没有帐号?立即注册
x
接着昨天的话题,昨天是讲如何确认计算机化系统和电子记录,以及其控制。现在回头看看其实写的很差。简单说了对于两个定义的通俗的理解,举了几个例子。完全没有系统的去梳理计算机化系统的知识体系。今天我们就将如何从0开始保障计算机化系统的数据完整性。
首先还是要有清单,这个清单包括所有的计算机化系统以及其ID、所属部门、位置、系统的名称和版本号、控制的设备、供应商、系统类型(嵌入式、基于windows的单机版、基于windows 的网络版)、系统负责人、流程负责人、GXP相关性、ERES相关性、受监管的电子记录、系统分类(1、3、4、5)
然后进行风险评估(基于ICH Q9),先进行系统的关键性和复杂性评估得出风险等级,然后再根据系统的数据完整性的偏差和系统验证文档的偏差来确定系统合规状态,然后根据风险等级和合规状态来确定系统整改的优先性。
这个优先性可以帮助我们确定我们要在繁多的计算机化系统选择在精力有限的情况下先做哪些整改后做那些整改。
这个是做事的步骤,接下来几天我开始讲每个步骤该如何去做。
I had descried how to identify and control the CS and ES yesterday. But I found that the article is not good. That article just mentioned the understanding of the CS and ER without the systematic knowledge. So today I will tell you how to control the DI of the computerized system from 0.
First we need a inventory which includes computerized system ID, unit, location, SW name, version, controlled equipment, supplier, system type (bench, stand alone, network), system owner, process owner, GXP relevance, ERES relevance, regulated ER, GAMP category (1, 3, 4, 5)
Then we can start the risk assessment (base on ICH Q9), at first we get the risk level assessment as result of criticality and complexity of the system. We got system compliance status which is combination of Validation Documentation and Data Integrity gaps. At last we got the system priority level as result of risk level assessment and system compliance status.
The System Priority will be used in order to ensure that any remediation activity will be prioritized according to the risk associated to the System.
Today is for the procedure, tomorrow will be the details of how to execute these actions.
另外做个广告,有兴趣的可以关注我的公众号GMP-qc,可以去我的博客www.gmpqc.top
接下来几天会在这个贴子里把今天这篇文章的每一步详细解释一下。
|
|