WHO: GOOD DATA AND RECORD MANAGEMENT PRACTICES

Some good stuff in this guidance….particularly the bit on True copies…..

GUIDANCE ON GOOD DATA AND RECORD MANAGEMENT PRACTICES (SEPTEMBER 2015) DRAFT FOR COMMENT

True copy: A true copy is a copy of an original recording of data that has been certified to confirm it is an exact and complete copy that preserves the entire content and meaning of the original record, including in the case of electronic data, all metadata and the original record format as appropriate.

Full Guidance:  http://www.who.int/medicines/areas/quality_safety/quality_assurance/Guidance-on-good-data-management-practices_QAS15-624_16092015.pdf

Advertisements

Vaccines, Real Medicine

I’m so tired of #Homeopathabullshit….

~TJK

Part 11 Cloud Compliance Course

 Timothy J. Kuhn

Timothy J. Kuhn: I’m not affiliated with the provider of the course as you may have surmised. I’ve been looking for a course for some of my team members and this came up in my feed so I thought I’d share. It looks useful; has anyone else taken it?

Best,

TJK

“21 CFR Part 11 Compliance for SaaS/Cloud Applications” has been pre-approved by RAPS as eligible for up to 12 credits

Key Focus:

Agenda: http://www.complianceonline.com/21-cfr-part-11-compliance-for-saas-cloud-applications-seminar-training-80202SEM-prdsm?channel=Nisha_OB

LA Hospital Pays Hackers Nearly $17,000 To Restore Computer Network : The Two-Way : NPR

On security…

LA Hospital Pays Hackers Nearly $17,000 To Restore Computer Network

Updated February 18, 201610:36 AM ET
Published February 17, 20169:08 PM ET
LAURA WAGNER
The Hollywood Presbyterian Medical Center was hacked for ransom earlier this month.
The Hollywood Presbyterian Medical Center was hacked for ransom earlier this month.

A Los Angeles hospital paid a nearly $17,000 ransom to hackers who breached and disabled its computer network, the hospital said in a statement LA Hospital Pays Hackers Nearly $17,000 To Restore Computer Network

The Hollywood Presbyterian Medical Center was hacked for ransom earlier this month.
Junkyardsparkle via Wikimedia Commons
A Los Angeles hospital paid a nearly $17,000 ransom to hackers who breached and disabled its computer network, the hospital said in a statement Wednesday…

Computer Inspection Checklist from PMDA

I’m not a big fan of using checklists during audits, but it is always good to see which ones are being used by the regulators to better understand their thinking and priorities. This one from Japan came up during the quarterly Society of Quality Assurance CVIC (Computer Validation Initiative Committee) on which I sit.

PMDA Checlist CSV

 

~TJK

FDA FY 2010 Inspectional Observation Summaries

The FDA has recently updated their published  483 inspection results here. This is really a great resource as it breaks the findings down by regulation and how often it was cited. The link is to the 2010 483 that I stumbled upon. The parent site has multiple years and in sortable formats:

http://www.fda.gov/ICECI/Inspections/ucm250720.htm

~TJK

 

Computer System Validation (CSV) Audit Mindmap

As a break from writing, I finished the first electronic version of my CSV Audit Mindmap. The intent is for it to be a mental tickler during an audit. Rather than 10-20 pages of checklists, this would be a visual layout of related topics that fit on 1 or 2 pages (or more if you like). Click the link to look at a pdf version…and be sure to let me what you think.

CSV Audit Mindmap

 

Thanks.

TJK

%d bloggers like this: