practical approaches to electronic signatures

21
1 MD&M East 98 Conference New York June 1998 Presentation by Daniel E. Worden PRACTICAL APPROACHES PRACTICAL APPROACHES TO TO ELECTRONIC SIGNATURES ELECTRONIC SIGNATURES

Upload: viveka

Post on 22-Feb-2016

57 views

Category:

Documents


0 download

DESCRIPTION

PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES. MD&M East 98 Conference New York June 1998 Presentation by Daniel E. Worden. AGENDA. Summary of 21 CFR, Part 11 Subpart A: General Provisions Subpart B: Electronic Records Subpart C: Electronic Signatures Potential Issues - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

1

MD&M East 98 ConferenceNew YorkJune 1998

Presentation by Daniel E. Worden

PRACTICAL APPROACHESPRACTICAL APPROACHESTOTO

ELECTRONIC SIGNATURESELECTRONIC SIGNATURES

Page 2: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

2

AGENDAAGENDA

• Summary of 21 CFR, Part 11

Subpart A: General ProvisionsSubpart B: Electronic RecordsSubpart C: Electronic Signatures

• Potential Issues

• Advantages and Challenges

• Critical Success Factors

• Security and Control

Page 3: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

3

SUBPART A - GENERAL PROVISIONSSUBPART A - GENERAL PROVISIONSSection 11.1 Scope

• Regulations establish the criteria the FDA considers for electronic records and and electronic signature to be trustworthy, reliable, and generally equivalent to paper.

• Applies to all records in electronic form under any records requirement within any FDA regulation.

• Electronic records are considered equivalent to full handwritten signatures, initials, and other general signings.

• Electronic records may be used in accordance with Part 11 unless paper records are specifically required.

• Computer system (hardware and software), controls, and relevant documentation must be available for review during FDA inspections.

Page 4: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

4

DEFINITIONS DEFINITIONS

Electronic Record

• “Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system.”

Electronic Signature

• “A computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual’s handwritten signature.”

Page 5: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

5

DEFINITIONS (cont.)DEFINITIONS (cont.)Handwritten Signature

• “The scripted name or legal mark of an individual handwritten by that individual and executed or adopted with the present intention to authenticate a writing in a permanent form.”

• “The act of signing with a writing or marking instrument such as a pen or stylus is preserved. The scripted name or legal mark, while conventionally applied to paper, may also be applied to other devices that capture the name or mark.”

Digital Signature

• “An electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified.”

Page 6: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

6

DEFINITIONS (cont.)DEFINITIONS (cont.)Closed System

• “An environment in which system access is controlled by persons who are persons who are responsible for the content of electronic records that are on the system.”

Open System

• “An environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system.”

Biometrics

• “A method of verifying an individual’s identity based on measurement of the individual’s physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable.”

Page 7: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

7

SUBPART B - ELECTRONIC RECORDSSUBPART B - ELECTRONIC RECORDS

Section 11.10-Controls for Closed Systems

• Must develop procedures and controls to ensure authenticity, integrity and confidentiality, and that signer cannot repudiate the signed record. The controls must:

• Be validated• Maintain accurate and complete records• Limit the system to authorized persons• Protect records through retention period• Contain audit trails that are secure, operator independent,

computer-generated, time-stamped, cover the creation , modification and deletion of records and do not obscure previous information

Page 8: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

8

SUBPART B - ELECTRONIC RECORDSSUBPART B - ELECTRONIC RECORDS

Section 11.10-Controls for Closed Systems (cont.)

• Allow for the performance of operational system checks, authority checks, and device checks to ensure system, record, and data integrity

• Ensure appropriate personnel qualifications

• Policies written and followed to hold personnel accountable for actions and to deter records falsification

• Control over system documentation including distribution, access, use, revision and change control

Page 9: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

9

SUBPART B - ELECTRONIC RECORDSSUBPART B - ELECTRONIC RECORDS

Section 11.10-Controls for closed systems (cont.)

• Allow for the performance of operational system checks, authority checks, and device checks to ensure system, record, and data integrity

• Ensure appropriate personnel qualifications

• Policies written and followed to hold personnel accountable for actions and to deter records falsification

• Control over system documentation including distribution, access, use, revision and change control

Page 10: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

10

SUBPART B - ELECTRONIC RECORDSSUBPART B - ELECTRONIC RECORDS

Section 11.50-Signature Manifestation

• Signed electronic records must include the printed name of the signer, date and time of signature, and the purpose of the signature (e.g. review, approval etc.) Each of these must be readable by display or printout.

Section 11.70-Signature/Record Linking

• Electronic signature and handwritten signatures must be linked to ensure signatures cannot be excised, copied, transferred or falsified.

Page 11: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

11

SUBPART C - ELECTRONIC SIGNATURESUBPART C - ELECTRONIC SIGNATURE

Section 11.100-General Requirements

• Must be unique to an individual and not reassigned

• Identity of individual must be verified by organization

• Must certify electronic signature system to the agency prior to or at the time of use of the system

• Certification must be submitted in paper form and, upon agency request, provide certification that signature is legally binding

Page 12: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

12

SUBPART C - ELECTRONIC SIGNATURESUBPART C - ELECTRONIC SIGNATURESection 11.200-Electronic Signature Components and Controls

• Non-Biometric signatures must:

• Contain at least two different identification components (e.g. User ID and Password)

• Single sign-on with multiple tasks: Use all identification components at first, with partial identification for each task thereafter

• Multiple sign-on without continuous access requires all identification components to be used each time

• Be used only by the owner

• Ensure use by other individuals is precluded and does not occur without collaboration by at least two other individuals

• Biometric signatures must ensure use by the owner

Page 13: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

13

SUBPART C - ELECTRONIC SIGNATURESUBPART C - ELECTRONIC SIGNATURE

Section 11.300-Controls for Identification Codes/Passwords

• Persons using electronic signatures must use controls to ensure security and integrity and should include:

• Assuring that no two individuals have the same combination of identification code and password

• Periodic check, recall, or revision of identification code and password

• Loss management and replacement procedures

• Testing of devices (i.e. tokens or cards) that produce or maintain identification codes or passwords to ensure proper function and unaltered state.

• Unauthorized use safeguards

• Report attempts in urgent & immediate manner to:

•Security unit and Management, as appropriate

Page 14: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

14

POTENTIAL ISSUESPOTENTIAL ISSUES• The final rule does not establish numerical standards for levels of security or validation

(persons have the option of determining the frequency).

• Wide spread implementation of time date stamped audit trails executed objectively and automatically and controls for limiting access to the database search software may change a company’s current practices.

• The word “ensure” is used in the regulations. It is defined as “to make certain”. How will this be interpreted by a field inspector?

• “Unique nature of passwords”. How is uniqueness determined and what are “good password practices”?

• Part 11 does not apply to paper records that are or have been transmitted by electronic means but it does apply to records in electronic form that are created, modified, maintained, archived, retrieved under any record requirement regulated by FDA.

• Record retention requirements for software and hardware used to create records that are retained in electronic form are subject to part 11.

Page 15: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

15

POTENTIAL ISSUES (cont.)POTENTIAL ISSUES (cont.)

• “As the agency’s experience with part 11 increases certain records may need to be limited to paper if there are problems with the electronic versions of such records.”

• “It may be necessary to inspect hardware and software used to generate and maintain electronic records to determine if the provisions of part 11 are being met.”

• The assessment of adequacy of systems validation will include inspection of hardware to “determine if it matches the system documentation description of the hardware.”

• For geographically dispersed systems, inspections would extend to operations, procedures and controls at one location and the agency would inspect other locations of the network in a separate but coordinated manner.

• Is the implementation of an electronic system significant enough in manufacturing to require an NDA supplement prior to going live?

• Dial-in access over public phone lines can be a closed system if access to the system is under the control of the persons responsible for the content of the record.

Page 16: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

16

POTENTIAL ISSUES (cont.)POTENTIAL ISSUES (cont.)

• When an organization’s electronic records are stored on systems operated by third parties the agency would consider this to be an open system.

• Electronic record is defined as “any combination of text, graphics, data, audio, pictorial or other information representation in digital form that is created, modified, maintained, archived, retrieved or distributed by a computer system.”

• “The Agency believes that if it is important enough that a record be signed, human readable displays of such records must include the printed name of the signer, the date and time of signing, and the meaning of the signature”. Example: a message from a firm’s management to employees instructing them on a particular course of action may be critical in litigation.

• “A single certification may be stated in broad terms that encompass electronic signatures of all current and future employees”.

Page 17: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

17

ADVANTAGES / CHALLENGESADVANTAGES / CHALLENGESAdvantages

• Electronic Batch records can eliminate mountains of paper work, speed processing and allow for statistical and trend analyses.

• NDA’s and other submissions can be submitted electronically in place of paper submission.

• Increases the speed of information exchange.

• Cost savings from reduced need for storage space.

• Manufacturing process streamlining.

• Job creation in industries involved in electronic record and electronic signature technologies.

Challenges

• Firms planning on using electronic signatures in FDA regulated environments will be required to validate the computer related systems.

• Design of systems must be well thought out and tested thoroughly.

• Critical control points must be identified which can be monitored through electronic audit trails.

• Adequate testing of security.

Page 18: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

18

CRITICAL SUCCESS FACTORSCRITICAL SUCCESS FACTORS

• Validation activities in manufacturing, toxicology, clinical, regulatory and perhaps marketing (label approval) will need to be better process focussed, requiring definition of inputs and outputs with, procedural controls governing the process activities and standards dictating the format and content of inputs and outputs and well documented.

• Configuration management, security management and periodic review and quality management must be a continual process.

• Record retention and record disposal practices need to be revised to reflect company requirements to comply with new regulatory requirements.

• Documentation standards and practices should be created that systematize the processes for creating and maintaining documents.

• Planning will have to take into consideration re-engineering, replacement, or retirement of a computer system when operating costs increase or business process changes.

• Requires effective change control.

Page 19: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

19

SECURITY AND CONTROLSECURITY AND CONTROL

Obtain and Review Corporate Security policy, security standards and procedures

Evaluate the effectiveness of the security organization Evaluate the effectiveness of the process for requesting, granting and

removing access.PROCEDURAL

PHYSICAL

LOGICAL

Review Physical Access Policy Identify sensitive areas (computer room, data rooms, wiring closets). Determine process for granting, reviewing, monitoring and removing

access. Verify that process is operating effectively.

Obtain and review data access policy Identify access “Paths” to cGMP data

Dial-in / Internet / Local Area Network / Wide Area Network Operating System Database Security / Application Security

Page 20: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

20

AN ENTERPRISE-WIDE SECURITY STRATEGYAN ENTERPRISE-WIDE SECURITY STRATEGY

An Enterprise-wide security strategy should:

• Identify risk, threats and potential vulnerabilities

• Classify information based on sensitivity (sensitive, public, cGMP vs. non-cGMP, etc.)

• Determine and implement appropriate controls based on risk assessment/classification

• Ensure a consistent process to maintain an effective level of security and control

• Document this approach in the form of an SOP

Page 21: PRACTICAL APPROACHES TO ELECTRONIC SIGNATURES

21

FDA’S VIEW OF WHAT INDUSTRY NEEDS TO DO• Learn Part 11

• File 11.100 (c) Certification

• E-records maintained

• ID formats FDA can audit/copy• Check with FDA auditors• Watch for guidance docs

• E-records submitted to FDA

• Check docket 92S-0251• http://www.fda.gov

• Attn: logistics and guidance• file format/media• Transmission methods/archiving