12.01.2014 Views

Software Manual Freedom EVOware Standard 2.3 Freedom ...

Software Manual Freedom EVOware Standard 2.3 Freedom ...

Software Manual Freedom EVOware Standard 2.3 Freedom ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

B - Appendix B - FDA 21 CFR Part 11 Compliance<br />

Recommendations<br />

Security mechanisms<br />

This refers to techniques for ensuring that data stored in a computer cannot<br />

be read or compromised. Most security measures involve encryption or<br />

passwords.<br />

Server<br />

A computer or device on a network that manages network resources. A file<br />

server stores files, a print server manages printers, a network server manages<br />

network traffic and a database server processes database inquiries.<br />

Service release or service pack<br />

Defect-fix releases of an operating system that address serious issues or<br />

defects reported against a previous release. Service releases need to be<br />

installed on top of the original software. Service releases often address<br />

security issues which have arisen during the use of the software. Generally<br />

speaking, you should install the operating system service release specified for<br />

the <strong>Freedom</strong> <strong>EVOware</strong> software to ensure maximum system security.<br />

Shared desktop, account or login<br />

Shared desktops, accounts or logins can violate the principle of no<br />

repudiation. If the audit trail is not able to distinguish between individuals<br />

using such shared network resources, an electronic signature is not valid.<br />

Tecan customer<br />

Company or organization which uses pipetting instruments and/or other<br />

equipment which is manufactured by Tecan.<br />

User name, User ID<br />

A unique code used together with a password to identify a user.<br />

Validation of a computer system<br />

Confirmation by examination and provision of objective evidence that<br />

computer system specifications conform to user needs and intended uses,<br />

and that all requirements can be consistently fulfilled.<br />

B.4 Recommendations<br />

The following lists points to be considered to ensure compliance with 21 CFR Part<br />

11.<br />

Access security determines who is allowed to log in to a system locally or from a<br />

network and puts mechanisms in place that prevent unauthorized persons from<br />

gaining access to the computer system. For example, the Microsoft operating<br />

systems Windows 2000, NT and XP provide several different types of access<br />

privileges or rights that can be granted or denied to specific users or groups of<br />

users.<br />

System administrator: The person responsible for maintaining a multi-user<br />

computer system and managing the security of the computer network.<br />

Audit trails: 21 CFR Part 11 requires audit trails to be generated independently of<br />

the equipment operator. They must record all activities related to creating,<br />

modifying and deleting records on the system. The user organization must<br />

develop procedures for the data integrity and long-term archiving of audit trails<br />

with data retrieval throughout the legally required retention period.<br />

Configuration settings: An overall organizational structure defining how<br />

permissions or privileges are configured for the computer system, with settings<br />

which may e.g. allow one user to only read a file while another person can<br />

execute the file and a third person can write new data into it.<br />

<strong>Freedom</strong> <strong>EVOware</strong> <strong>Software</strong> <strong>Manual</strong>, 393172, en, V<strong>2.3</strong> B - 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!