ERES PM-QUALITY V10 en
ERES PM-QUALITY V10 en
Product Information
Electronic Records /
Electronic Signatures (ERES)
11/2017
A5E39256039-AA
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will be
used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property
damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions. Qualified
personnel are those who, based on their training and experience, are capable of identifying risks and avoiding
potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software described.
Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in
this publication is reviewed regularly and any necessary corrections are included in subsequent editions.
1 Introduction...................................................................................................................................................7
2 The Requirements in Short...........................................................................................................................9
3 Meeting the Requirements with PM-QUALITY...........................................................................................11
3.1 Lifecycle and Validation of Computerized Systems...............................................................11
3.2 Suppliers and Service Providers............................................................................................11
3.3 Data Integrity..........................................................................................................................11
3.4 Audit Trail, Change Control Support......................................................................................13
3.5 System Access, Identification Codes and Passwords...........................................................14
3.6 Electronic signature................................................................................................................15
4 Evaluation List for PM-QUALITY................................................................................................................17
4.1 Lifecycle and Validation of Computerized Systems...............................................................17
4.2 Suppliers and Service Providers............................................................................................19
4.3 Data Integrity..........................................................................................................................20
4.4 Audit Trail, Change Control Support......................................................................................21
4.5 System Access, Identification Codes and Passwords...........................................................21
4.6 Electronic Signature...............................................................................................................23
4.7 Open Systems........................................................................................................................25
Requirement Description
Lifecycle and Validation of Computerized systems used as a part of GMP-related activities must
Computerized Systems be validated. The validation process should be defined using a risk-
based approach. It should cover all relevant steps of the lifecycle and
must provide appropriate documented evidence.
The system's functionality should be traceable throughout the lifecycle
by being documented in specifications or a system description.
A formal change control procedure as well as an incident management
should be established. Periodic evaluation should confirm that the vali‐
dated state of the system is being maintained.
Suppliers and Service Provid‐ Since competency and reliability of suppliers and service providers are
ers considered key factors, the supplier assessment should be decided on
a risk-based approach. Formal agreements should exist between the
regulated user and these third parties, including clear responsibilities
of the third party.
Data Integrity Under the requirements of both regulations, electronic records and
electronic signatures must be as reliable and trustworthy as paper re‐
cords.
The system must provide the ability to discern altered records. Built-in
checks for the correct and secure handling of data should be provided
for manually entered data as well as for data being electronically ex‐
changed with other systems.
The system's ability to generate accurate and complete copies is es‐
sential for the use of the electronic records for regulated purposes, as
well as the accessibility, readability, and integrity of archived data
throughout the retention period.
Requirement Description
Audit Trail, Change Control Besides recording changes to the system as defined in the lifecycle,
Support both regulations require that changes on GMP-relevant data are being
recorded.
Such an audit trail should include information on the change (before /
after data), the identity of the operator, a time stamp, as well as the
reason for the change.
System Access, Identifica‐ Access to the system must be limited to authorized individuals. Attention
tion Codes and Passwords should be paid to password security. Changes on the configuration of
user access management should be recorded.
Periodic reviews should ensure the validity of identification codes. Pro‐
cedures should exist for recalling access rights if a person leaves and
for loss management.
Special consideration should be given to the use of devices that bear
or generate identification code or password information.
Electronic Signature Regulations consider electronic signatures being legally binding and
generally equivalent to handwritten signatures executed on paper.
Beyond requirements on identification codes and passwords as stated
above, electronic signatures must be unique to an individual. They must
be linked to their respective electronic record and not be copied or oth‐
erwise being altered.
Open Systems Open systems might require additional controls or measures to ensure
data integrity and confidentiality.
Redundancy option
The PM-QUALITY system uses the Data Center option to collect batch data in two databases
at the same time. After completion of a batch, the recordings are compared, combined
according to a specified algorithm and saved in a shared export database.
SIMATIC Logon meets the requirements regarding access security in combination with
procedural controls, such as those for specifying the responsibility and access authorization
of the system users.
In addition, users must be assigned specific access rights at operating system level to prevent
unauthorized access to the directory structure of the various system programs and unintended
manipulation.
Figure 3-4 Adding PM-QUALITY lab data in the WinCC user interface
You can add data to the batch data as long as a batch has not been exported. You select the
respective batch in the batch list. Each input is saved in the batch data with time stamp, user
name and any comment that was entered, and reproduced in the batch report.
4.3.6 Data should be secured by both Annex 11, 7.1 An exported batch data record is write-protected.
physical and electronic means In addition to the system's access security mecha‐
against damage. nisms, the regulated user should establish appropriate
security means like physical access control, backup
strategy, limited user access authorizations, regular
checks on data readability, etc. Furthermore, the data
retention period should be determined by the regulated
user and appropriately considered in the user's pro‐
cesses (see GAMP 5, appendices O3, O4, O8, O9, O11
and O13).
4.3.7 Regular backups of all relevant data Annex 11, 7.2 The regulated user should establish appropriate pro‐
should be done. cesses for backup and restore (see GAMP 5, appen‐
dix O9).
4.3.8 Electronic records must be readily 21 CFR 11.10 (c) Yes. As stated above, procedural controls for Backup/
retrievable throughout the records Annex 11, 17 Restore and Archiving/Retrieval should be established.
retention period.
4.3.9 If the sequence of system steps or 21 CFR 11.10 (f) This requirement is not necessary for a batch report.
events is important, then appropri‐
ate operational system checks
should be enforced.