Live Online Training - Computerised System Validation: Leveraging Suppliers + Computerised System Validation Master Class

Live Online Training - Computerised System Validation: Leveraging Suppliers + Computerised System Validation Master Class

Course No 18303

 

Costs

ECA-Member: EUR 2390,--
Non ECA Member: EUR 2590,--
EU/GMP Inspectorates: EUR 1440,--
APIC Member Discount: EUR 2490,--

(All prices excl. VAT)

If you have any questions, please contact us:
Tel.: +49 (0)6221 / 84 44 0 E-Mail: info@gmp-compliance.org

Speakers

Frank Behnisch, CSL Behring GmbH
Maurice Kerens, Rescop
Yves Samson, Kereon
Dr Robert Stephenson, Rob Stephenson Consultancy

Objectives

Leveraging Suppliers:
  • Learn what activities and deliverables you should expect to see from your IS/IT supplier to demonstrate Supplier Good Practice
  • Learn how to verify your supplier’s capabilities so that there are “no surprises”.
  • Learn how to plan validation (verification) activities, leveraging the expertise of your supplier
  • Learn how to minimise duplication of effort between the supplier and your regulated company in order to achieve lean and effective processes throughout the system life cycle
  • Learn how to work with your supplier in order to build a strong and lasting client-supplier relationship
 
Computerised Systems Validation Master Class:
 
As a specialist for the validation of computerised systems, this event will provide you with
  • Suggestions on how current regulatory guidance on computerised systems relating to data integrity, critical thinking and CSA (Computer Software Assurance) can be put into practice
  • Real-life examples of how validation effort can be scaled according to risk-based approaches
  • Answers to specific questions, e.g. on source code review or on creating specification documents
  • The opportunity to bring questions from your own practice up for discussion

Background

Leveraging Suppliers:

Recognising the potential savings and flexibility available, regulated companies are increasingly withdrawing from ‘in-house’ developed solutions and looking to their external suppliers to provide them with innovative and compliant products and services which fulfil their operational and business Needs.
The EU-GMP Annex 11 on Computerised Systems states that ‘the competence and reliability of a supplier are key factors when selecting a product or service provider’; ‘Leveraging Supplier Involvement’ is also one of the 5 key concepts of the GAMP®5 guidance ‘A Risk-Based Approach to Compliant GxP Computerized Systems’.

This Live Online Training aims to provide attendees with the knowledge, and opportunities to practice the skills required, to achieve successful partnerships with their IS/IT suppliers and to improve the efficiency and effectiveness of their validation processes.
 
Computerised System Validation Master Class:
 
The V-model has become a standard worldwide methodology for the validation of computerised systems. Regulatory requirements, as well as industry guidelines, like GAMP®5, are orientated towards this model. In practice, you as a validation specialist will want to know how to apply this model to current and increasingly complex validation projects.

Target Group

Leveraging Suppliers:

This ECA Live Online Training is directed at employees from Production, Quality Control/Quality Assurance, Engineering and IS/ IT, who have to assess, manage or work with computerised system or service providers.
 
The Live Online Training will also be of value to representatives from supplier organisations that are working or seeking to work with Regulated Companies in the Life Sciences Sector.
 
 
Computerised System Validation Master Class:
 
The Master Class is directed at employees from
  • IT
  • Production
  • Engineering
  • Quality Assurance
  • Quality Control
Participants should already have gained experience in the validation of computerised systems, and preferably will have also attended a basic CSV Course.
Technical Requirements
For our webinars, we use Cisco WebEx, one of the leading suppliers of online meetings. At https://www.webex.com/test-meeting.html you can check if your system meets the necessary requirements for the participation at a WebEx meeting and at the same time install the necessary plug-in. Please just enter your name and email address for the test. If the installation is not possible because of your rights for the computer system, please contact your IT department. WebEx is a standard nowadays and the necessary installation is fast and easy.

Programme

Programme Leveraging Suppliers
 
Introduction – What the Participants Expect
An open session capturing the expectations of the delegates.
 
Leveraging Suppliers Expertise: An Overview of Good Practice
  • What is current Good Practice?
  • Optimising Supplier involvement
  • Integrating the supplier’s  expertise and deliverables into your validation process
  • How to do more with less
Performing a Supplier Assessment
  • Why Assess the Supplier?
  • The Overall Process
  • Assessment Topics
  • Types of Assessment
  • Corrective Actions & Follow Up Audits
Case Study: Selecting a Supplier
  • What factors to take into account?
  • How to focus the assessment?
  • How to engage with the supplier?
  • How to report and manage the findings?
  • Regulatory expectation
Case Study: Quality Planning within a Supplier’s QMS - Developing a Quality Plan that Delivers
  • Quality Management System
  • Establishing Requirements
  • Producing Specifications
  • Testing and Release
  • Support and Maintenance
Identifying Leveraging Opportunities
  • Define the role of the supplier
  • What must the supplier do?
  • What must the regulated company do?
Case Study: Leveraging Supplier Testing
  • Test script development
  • Test script execution
  • Test script review and approval
Managing Quality within an Outsourced IS/IT Environment
  • Making a Business Case
  • Outsourced Supplier Specification and Selection
  • Implementation
  • Monitoring
  • Contract Change and Exit
 
Programme Computerised System Validation Master Class
 
Introduction – Gain Understanding of Delegate Experience and Background

Case Study: What the Delegates expect
Working in groups delegates derive their requirements from the training event and share them with the tutors
  • Capturing delegates expectations
  • Sharing and reducing to key points in groups
  • Sharing with all delegates and tutors
Current Challenges and Evolution for CSV Activities
  • What does compliance really mean?
  • Data Integrity
  • Securing operation: cybersecurity
  • Project agility
  • Cost efficiency vs effective risk management
  • Applying critical thinking
Roles, Responsibilities and Governance
  • PQS – Pharmaceutical Quality System according to ICH Q10
  • Responsibilities
    • Operational ownerships
    • Supporting roles
  • QA oversight
Case Study: Governance Benchmark
  • Polling Exercise plus facilitated discussion
  • IT and System Governance
  • CSV Roles and Responsibilities
  • Role of Quality Unit
Practical Use of Scalability
  • What do we mean by Scalability?
  • How does it work in practice?
  • How can we combine documents successfully?
  • How much is enough?
Case Studies: Scaleability of Validation Activities
  • LIMS – Laboratory Information Management System
  • Laboratory computerised equipment
  • Process control system: PLC – Programmable
  • Logic Controller
Writing Requirements Documents
  • What goes into a requirements document?
  • What are the considerations for systems?
  • Characteristics of good and bad requirements documents
  • Sources of requirements Information
Requirements: The Good, the Bad and the Ugly
  • ƒGood, bad, and could-be-better requirements
  • ƒTestability
  • ƒUse of templates / boilerplates
  • ƒWhat you should never write
Ideal Content of a CSV SOP
  • ƒEmbedding the CSV SOP into the PQS
  • ƒTopics to address
Data Integrity and Record Management: A Necessary Long-Term Approach
  • ƒRegulatory context
  • ƒDocument life cycle
  • ƒRetention requirements and constraints
  • ƒSupporting processes
  • ƒAreas of concern
System Classification – A Record-based Approach
  • Needs for record-based system classification
  • ƒClassification criteria
  • ƒClass A, B, C, D
Design Review – How to Apply Critical Thinking?
  • ƒCSA – Computer Software Assurance
  • ƒScaleable Risk Management
  • ƒDocument Review
Case Study:Design Review Scaleability
  • Combining Risk Management & Design Review
Bringing Legacy Systems into Compliance
  • ƒHow to approach legacy system remediation
  • ƒExamples
    • Learning management system
    • Laboratory Instruments
Interactive Session: Good Validation Practices
Open session in which delegates score their CSV approach against 12 good validation practices
  • ƒEach good practice introduced
  • ƒDelegates score themselves
  • ƒResults consolidated and fed back
  • ƒAllows delegates to compare their CSV system against best practice and other practitioners
Alternative & Agile Approaches
  • Alternative software development models
    • Unified Process, Scrum
  • Agility objectives
    • Need for flexible engineering methodologies
  • What Agile engineering is not
    • What Agile engineering needs
  • Practical approaches and recommendation
    • Conditions for success
Validating Spreadsheets
  • Why are spreadsheets high risks?
  • Design considerations
  • What is important (risk again)!
  • How to document spreadsheet validation
Case Studies: Complex Projects
  • ƒGlobal projects
    • Roles & Responsibilities
    • Data-related requirements
  • Large systems
    • Phase-based implementation and deployment
  • ƒInterface projects
    • Roles & Responsibilities
    • Testing
Today / Future IT Compliance Challenges
  • ƒOpen Source Software validation
  • ƒChallenge demands Infrastructure platforms for applications
  • ƒGlobal systems validation vs local defence
  • ƒPaperless recipes based production – ISA 95 / S 88
  • ƒCloud Computing – Data Integrity
  • ƒValidating Artificial Intelligence (AI)
  • ƒChallenges for data integrity on Lab-Systems
Elaboration of a Data Integrity Programme
  • Data Integrity Programme: What to do?
  • Topics to address
  • Action planning
  • ƒEmbedding the Data Integrity Programme into the PQS
  • ƒProgress Reporting
Code Review
  • Principles of code review
  • Regulatory expectations of code review
  • Carrying out code reviews
  • Recording and documenting code Reviews
Real Life Qualification / Validation Projects
  • ƒReal Life Qualification / Validation Projects
  • ƒRequirements
  • ƒConstraints
  • ƒIssues identified
  • ƒLessons learned

Go back

GMP Conferences by Topics

Cookies help us in providing our services. By using our services, you agree that we use cookies. Further information

OK