This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
21_cfr_part_11 [2022/01/17 13:56] yves |
21_cfr_part_11 [2022/03/29 16:03] (current) yves |
||
---|---|---|---|
Line 7: | Line 7: | ||
* Data will be formatted to allow transfer to another system for long-term storage in a common portable format either during the life of the system or after the system is retired | * Data will be formatted to allow transfer to another system for long-term storage in a common portable format either during the life of the system or after the system is retired | ||
* The system will contain detection mechanisms for invalid field entries, values out of range, and blank fields if entry is required | * The system will contain detection mechanisms for invalid field entries, values out of range, and blank fields if entry is required | ||
- | * It will be possible to provide regulatory agenties with both human-readable and electronic copies of the records, including metadata. It will be possible to transfer data in a human readable format onto transportable media such as PDF, XML, SGML. The system must allow that the copying process produces copies that preserve the content and meaning of the records | + | * It will be possible to provide regulatory agencies with both human-readable and [[submitted_data|electronic copies of the records, including metadata]]. It will be possible to transfer data in a human readable format onto transportable media such as PDF, XML, SGML. The system must allow that the copying process produces copies that preserve the content and meaning of the records |
* If it is important to system functionally that steps be performed in a specified order, the system will contain a mechanism to ensure that actions are performed in the correct sequence (in case of sequenced steps) | * If it is important to system functionally that steps be performed in a specified order, the system will contain a mechanism to ensure that actions are performed in the correct sequence (in case of sequenced steps) | ||
- | * The system will contain an automatically generated [[audit trail]] function for all process significant and GxP critical events and allow audit trails on tables and individual records | + | * The system will contain an automatically generated [[audit_trailing|audit trail]] function for all process significant and GxP critical events and allow [[audit_trailing|audit trails]] on tables and individual records |
- | * The audit trail data will be read-only | + | * The [[audit_trailing|audit trail]] data will be read-only |
- | * It will be impossible to disable the audit trail function | + | * It will be impossible to disable the [[audit_trailing|audit trail]] function |
- | * The system will prevent the accidental or intentional modifications or deletion of audit trail files | + | * The system will prevent the accidental or intentional modifications or deletion of [[audit_trailing|audit trail]] files |
* It will be possible to generate a report to view which data in the record has been modified | * It will be possible to generate a report to view which data in the record has been modified | ||
* A mechanism will be in place to detect and report any attempts of unauthorized use immediately to the customer | * A mechanism will be in place to detect and report any attempts of unauthorized use immediately to the customer | ||
Line 19: | Line 19: | ||
* The system will not allow changes in date and time by the user | * The system will not allow changes in date and time by the user | ||
* The system date and time will be periodically checked and corrected. The system will support time synchronization | * The system date and time will be periodically checked and corrected. The system will support time synchronization | ||
- | * The electronic audit trails will be readily available for review | + | * The [[audit_trailing|electronic audit trails]] will be readily available for review |
- | * The system will be protected against unauthorized use | + | * The system will be [[user_management|protected against unauthorized use]] |
* Security will consist of at least two elements (e.g. login ID and password) in case of non-biometric security | * Security will consist of at least two elements (e.g. login ID and password) in case of non-biometric security | ||
* The system must enforce and automatic log-out after a defined period of no activity | * The system must enforce and automatic log-out after a defined period of no activity |