User:Shawndouglas/sandbox/sublevel22

From LIMSWiki
Jump to navigationJump to search

Sandbox begins below

32. System Validation and Commission

Regulation, Specification, or Guidance Requirement
ASTM E1578-18 S-2-1
CJIS Security Policy Appendix G.8
32.1 The vendor should be able to demonstrate the use of software development standards, secure coding practices, formal change control, and software revision control within its development practices. The vendor should also document its staff's skills and certifications.
ASTM E1578-18 S-2-2 32.2 The vendor should be willing to provide access to source code through a suitable escrow.
ASTM E1578-18 S-2-3 32.3 The system should be able to document a summary and evaluation of enterprise performance markers and processes.
ASTM E1578-18 S-2-4
ISO 15189:2012 5.10.3
ISO/IEC 17025:2017 7.11.5
32.4 The system should be well documented by the vendor in comprehensive training material for all aspects of system use, including administration, operation, and troubleshooting.

21 CFR Part 11.10 (a)
21 CFR Part 820.70 (i)
E.U. Annex 11-11
EPA 815-R-05-004 Chap. IV, Sec. 8.6
EPA 815-R-05-004 Chap. VI, Sec. 8.6
E.U. Commission Directive 2003/94/EC Article 9.2
ISO 15189:2012 5.10.3
ISO/IEC 17025:2017 7.11.2
OECD GLP Principles 4.1

32.5 The system shall be validated initially and periodically, with those validation activities being documented, to ensure the accuracy, consistency, and reliability of system performance and its electronic records.
ASTM E1578-18 S-2-2
E.U. Annex 11-4
32.6 The documentation associated with system validation shall discuss all applicable steps of the life cycle, justify applied methods and standards, and include change control records and observed deviations during validation, if applicable.

33. System Administration

Regulation, Specification, or Guidance Requirement

21 CFR Part 11.200 (a)
45 CFR Part 164.312
45 CFR Part 170.315 (d-5)
ASTM E1578-18 S-3-1
CJIS Security Policy 5.5.5

33.1 The system shall provide administrators with a configurable period of time to apply to user access or inactivity before again prompting a user for authentication credentials.
ASTM E1578-18 S-3-2 33.2 The system should provide a means for modifying personnel data in a batch.
ASTM E1578-18 S-3-3 33.3 The system should support the storage of standard and industry-specific data formats.

7 CFR Part 331.11
9 CFR Part 121.11
21 CFR Part 11.10 (d)
21 CFR Part 211.68 (b)
42 CFR Part 73.11
45 CFR Part 164.308
45 CFR Part 164.514
ASTM E1578-18 S-3-7
CJIS Security Policy 5.5.1
CJIS Security Policy 5.5.2.4
CJIS Security Policy Appendix G.5
EPA 815-R-05-004 Chap. IV, Sec. 8.6
EPA 815-R-05-004 Chap. VI, Sec. 8.6
EPA ERLN Laboratory Requirements 4.1.14–15
ISO 15189:2012 5.10.2
USDA Administrative Procedures for the PDP 5.2.4
USDA Administrative Procedures for the PDP 5.5.1.2

33.4 The system shall support the ability to define, record, and change the level of access for individual users to system groups, roles, machines, processes, and objects based on their responsibilities, including when those responsibilities change. The system should be able to provide a list of individuals assigned to a given system group, role, machine, process, or object.