Difference between revisions of "Chain of custody"

From LIMSWiki
Jump to navigationJump to search
(Created article stub.)
 
(Updated article stub.)
Line 1: Line 1:
Represents the record of a [[sample]], including its collection, preservation, transportation, transfers, analysis and final disposal.
'''Chain of custody''' ('''COC''') represents the chronological record of a [[sample]] or evidence, including its collection, preservation, transportation, transfers, analysis and final disposal. A properly documented chain of custody guarantees the identity and integrity if the item "from the time it is collected through the time the results of the analysis are reported and subsequently disposed of."<ref>{{cite book |title=Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility |chapter=Chapter 1: An Introduction to Digital Forensics |author=Jones, Andrew; Craig Valli |url=http://books.google.com/books?id=F5IU7XXKwCQC |pages=11 |year=2008 |publisher=Butterworth-Heinemann |isbn=1856175103}}</ref> A COC is created when one entity acknowledges (in writing or through an automated software process) that it has taken possession of the item from the previous entity, proving that the item that was collected is the same as the one being analyzed and reported on.<ref>{{cite book |title=International IT Regulations and Compliance: Quality Standards in the Pharmaceutical and Regulated Industries |chapter=Chapter 18: Laboratory Information Management Systems |author=Segalstad, Siri H. |url=http://books.google.com/books?id=j4zbBMOmPvAC |pages=262 |year=2008 |publisher=John Wiley and Sons |isbn=0470758821}}</ref> The resulting COC allows users and auditors the opportunity to note exactly when the item was logged in, who handled the item during all processes performed on it, and the location(s) it was stored in during its processing. In a LIMS, this is typically accomplished with date stamps, user IDs, and location IDs.<ref name=LIMSPaszko>{{cite book |author=Paszko, Christine; Paszko Turner; Elizabeth Turner |title=Laboratory Information Management Systems |chapter=Chapter 4: Data Management and Advanced LIMS Functional Requirements and Features |year=2001 |pages=35–36 |publisher=CRC Press |url=http://books.google.com/books?id=ycEqnzPl2lYC |isbn=0824741412}}</ref>
 
==References==
<references />

Revision as of 21:36, 7 March 2012

Chain of custody (COC) represents the chronological record of a sample or evidence, including its collection, preservation, transportation, transfers, analysis and final disposal. A properly documented chain of custody guarantees the identity and integrity if the item "from the time it is collected through the time the results of the analysis are reported and subsequently disposed of."[1] A COC is created when one entity acknowledges (in writing or through an automated software process) that it has taken possession of the item from the previous entity, proving that the item that was collected is the same as the one being analyzed and reported on.[2] The resulting COC allows users and auditors the opportunity to note exactly when the item was logged in, who handled the item during all processes performed on it, and the location(s) it was stored in during its processing. In a LIMS, this is typically accomplished with date stamps, user IDs, and location IDs.[3]

References

  1. Jones, Andrew; Craig Valli (2008). "Chapter 1: An Introduction to Digital Forensics". Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility. Butterworth-Heinemann. pp. 11. ISBN 1856175103. http://books.google.com/books?id=F5IU7XXKwCQC. 
  2. Segalstad, Siri H. (2008). "Chapter 18: Laboratory Information Management Systems". International IT Regulations and Compliance: Quality Standards in the Pharmaceutical and Regulated Industries. John Wiley and Sons. pp. 262. ISBN 0470758821. http://books.google.com/books?id=j4zbBMOmPvAC. 
  3. Paszko, Christine; Paszko Turner; Elizabeth Turner (2001). "Chapter 4: Data Management and Advanced LIMS Functional Requirements and Features". Laboratory Information Management Systems. CRC Press. pp. 35–36. ISBN 0824741412. http://books.google.com/books?id=ycEqnzPl2lYC.