Professional Documents
Culture Documents
05 Risk Assessment
05 Risk Assessment
06
Attachment from
Hal 1 dari 12
Page of
<Computerized System>
Risk Assessment
<Doc ID>
<Computerized System>
Risk Assessment and List of Regulated Records
Date: Signature:
Author:
<Function>
Approval:
System Owner
Department Head
IT Head
<Computerized System>
Risk Assessment
<Doc ID>
Document history:
recommended test
Probability of non
Impact / failure
GxP-Criticality
consequence
Probability of
Specification
Trace to Test
chosen test
URS/ FS ID
occurence
Risk scenario/Failure details
approach
approach
detection
- potential failure justification
- source (if chosen test approch different
URS/FS Description Function Description - consequence form recommendation)
URS-B-01 Y H H H Challenge test Challenge test NA PQ
URS-B-02 Y H L H Challenge test Challenge test NA IQ
URS-B-03 N M L H Positive test Positive test NA IQ
OS tidak dapat dilakukan
challenge test karena OS hanya
URS-B-04 Y H H H Challenge test Positive test IQ,OQ
dapat melakukan proses
instalasi pada system/PC
URS-B-05 Y H H H Challenge test Challenge test NA IQ,OQ,PQ
URS-B-06 Y H L H Challenge test Positive test IQ,OQ,PQ
URS-B-06 Y M L L Positive test Positive test NA IQ
Lampiran 10 dari SOP S Q10-004.06
Attachment from
Hal 4 dari 12
Page of
<Computerized System>
Risk Assessment
<Doc ID>
GxP-Criticalyty
Additional Mitigation
Activities
NA Y
NA N
NA
NA Y
NA Y
NA Y
NA
Lampiran 10 dari SOP S Q10-004.06
Attachment from
Hal 5 dari 12
Page of
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
e-records
§ 11.10 (b) The CS must either support the viewing of e-records or the
generation of valid paper copies. The CS should provide
viewing & printing capabilities for all relevant e-records. In Y
certain cases, controlled database queries or accurately
performed screen dumps may satisfy this requirement.
N
§ 11.10 (b) The CS should allow for the export of e-records to portable
file formats, preferably automatically. L
§ 11.10 (c) If the retention strategy does not include keeping the e-
records in the originating system, the CS should have
implemented a mechanism to archive e-records in a
standard file format.
§ 11.10 (d) Ensure that the CS has a security mechanism that uses at
least two distinct identification components (e.g. User ID /
password, PKI mechanisms) or biometrics.
Lampiran 10 dari SOP S Q10-004.06
Attachment from
Hal 6 dari 12
Page of
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.10 (d) The CS must allow for the use of individual accounts,
shared accounts for access levels other than read are not
acceptable.
§ 11.10 (d) The implementation of the lock out process should be well
investigated in regard to safety needs. Access to safety
relevant functions & operations must always be possible
and should be given priority.
§ 11.10 (d) When password entry fields are shown on the screen,
password entries must be obscured (e.g. "*********").
§ 11.10 (d) The system should allow for quality passwords (at least 8
alphanumeric characters) and enforce their use.
§ 11.10 (d) Transaction safeguards as specified in URS-ES-17, URS-
ES-18 and URS-ES-19 should be implemented.
§ 11.10 (e) If the CS provides for secured, computer-generated audit
trails for e-records, they must be enabled.
Lampiran 10 dari SOP S Q10-004.06
Attachment from
Hal 7 dari 12
Page of
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.10 (e) Whenever traceability must be guaranteed for records
which
- are subject to frequent manipulations or
- could become modified and have a direct impact on drug
product quality and safety,
check that the CS has the ability to generate secured audit
trails.
§ 11.10 (e) Computer generated audit trails should contain information
about:
- person/ equipment performing the activity (WHO)
- date and time of its execution (WHEN)
- (WHAT) was changed/ done
§ 11.10 (e) Computer generated audit trails should contain information
about:
- the reason for the activity (WHY) if appropriate
§ 11.10 (e) Audit trails must be built using an unique identifier to trace
“WHO did it” (preferably the unique User ID).
§ 11.10 (e) Computer generated audit trails should at least record the
hour and minute and must be as precise as required by the
business process (e.g. to verify correct sequencing of
events).
§ 11.10 (e) The server time should be used for the generation of time
stamps.
§ 11.10 (e) Time & date settings should be subject to rigorous control
to ensure the accuracy of time stamps, the CS should
provide the ability to restrict access to time settings. Users
should not be able to change time & date settings.
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.10 (e) The CS should have a mechanism to prevent that changes
to e-records obscure or destroy the original recorded
information. Secured references/ pointers from computer
generated audit trails to the original recorded information
are acceptable.
§ 11.10 (e) If audit trail information are not part of the record itself, the
CS must implement mechanisms to establish a secured link
between audit trail & the respective record.
§ 11.10 (e) The ability to change computer generated audit trails must
be restricted to a minimum number of individuals and to
duly authorized personal.
§ 11.10 (g) The CS should apply authority checks to ensure that only
authorized individuals can
- make use of system functions & features
- electronically sign a record
- create, modify, inactivate/ logically delete, delete records
- access input and/ or output devices
- perform operations at hand.
Authority checks should be implemented by role based
access.
Lampiran 10 dari SOP S Q10-004.06
Attachment from
Hal 9 dari 12
Page of
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.10 (g) Records may be linked to an authorization code that
identifies the title or organizational unit of those individuals
who are allowed to modify and/ or sign records. Based on
this authorization code, the CS should provide or reject
access to records/ e-signature functions.
§ 11.10 (g) The CS should enforce record specific access rights (e.g.
only the originator of a record is allowed to modify it)
whenever the business process asks for such controls.
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.10 (h) When it is critical to the proper conduct of the process that
specific HW items / devices / equipments (e.g. shop floor
terminals, barcode readers) create, submit or modify
records, there should be reporting & alarm features
(prompts, flags, or other help features) in place to ensure
consistency of records and to alert the user of records
being out of acceptable range.
e-signature
§ 11.50 (a) Ensure that all users are uniquely identifiable in the CS.
Where the User ID is not the user’s full name, ensure it is
traceable to the user’s full name.
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
§ 11.50 (a)
§ 11.50 (b) E-Signature information, links to the signed records and the
signed information must not be alterable for individuals
involved in the business process.
<Computerized System>
Part 11 Assessment
<Doc ID>
GxP-Criticalyty
Requirement Fulfilled? Actions Comments
§ 11.200 (a) CS must be designed to require two components for the
execution of the first e- signature within a session (e.g.
User ID & password). One of these components must be
private and shall not be shared with other individuals.