How to be Efficient and Compliant with Part 11, Validation, and SaaS/Cloud

Course “How to be Efficient and Compliant with Part 11, Validation, and SaaS/Cloud” has been pre-approved by RAPS as eligible for up to 12 credits towards a participant’s RAC recertification upon full completion.
  • This interactive two-day course explores proven techniques for reducing costs associated with implementing, using, and maintaining computer systems in regulated environments.
  • Many companies are outsourcing IT resources and getting involved with Software as a Service (SaaS) and cloud computing. These vendors are not regulated and therefore regulated companies must ensure compliance for both infrastructure qualification and computer system validation. It is the regulated company that wants to avoid FDA form 483s and warning letters. The seminar is intended for regulated companies, software vendors, and SaaS/Cloud providers.
  • The instructor addresses the latest computer system industry standards for data security, data transfer, audit trails, electronic records and signatures, software validation, and computer system validation.
  • Today the FDA performs both GxP and Part 11 inspections, the Europeans have released an updated Annex 11 regulation that expands Part 11 requirements and companies must update their systems and processes to maintain compliance.
  • This seminar will help you understand the specific requirements associated with local and SaaS/cloud hosting solutions.
  • Nearly every computerized system used in laboratory, clinical, manufacturing settings and in the quality process has to be validated.
  • Participants learn how to decrease software implementation times and lower costs using a 10-step risk-based approach to computer system validation.
  • Finally, the instructor reviews recent FDA inspection trends and discusses how to streamline document authoring, revision, review, and approval.
  • This course benefits anyone that uses computer systems to perform their job functions and is ideal for regulatory, clinical, and IT professionals working in the health care, clinical trial, biopharmaceutical, and medical device sectors. It is essential for software vendors, auditors, and quality staff involved in GxP applications.

Course Objectives:

  • Understand what is expected in 21 CFR Part 11 and Annex 11 inspections
  • Avoid 483 and Warning Letters
  • Learn how to buy COTS software and qualify vendors.
  • Implement a computer system using risk-based validation to gain maximum productivity and reduce cost by as much as two thirds
  • Requirements for local, SaaS, and cloud hosting
  • How to select resources and manage validation projects
  • “Right size” change control methods that allows quick and safe system evolution
  • Minimize the validation documentation to reduce costs without increasing regulatory or business risk
  • Write test cases that trace to elements of risk management
  • Protect intellectual property and keep electronic records safe

    Day 1 Schedule


    Day 1 (8am to 5pm; 0.5 registration, 1.0 lunch, 0.5 (2-15min) breaks, 7.0 class = 9.0)
    8:00am to 8:30am registration
    8:30am class starts


    Lecture 1:
    Introduction to the FDA (1:30) {1:30}

    • How the regulations help your company to be successful
    • Which data and systems are subject to Part 11

    Lecture 2:
    21 CFR Part 11/Annex 11 – Compliance for Electronic Records and Signatures (4:00) {5:30}

    • What Part 11 means to you, not just what it says in the regulations
    • Avoid 483 and Warning Letters
    • Explore the three primary areas of Part 11 compliance: SOPs, software product features, and validation documentation
    • How SaaS/cloud computing changes qualification and validation
    • Ensure data integrity, security, and protect intellectual property
    • Understand the current computer system industry standards for security, data transfer, and audit trails
    • Electronic signatures, digital pens, and biometric signatures
    • SOPs required for the IT infrastructure
    • Product features to look for when purchasing COTS software
    • Reduce validation resources by using easy to understand fill-in-the-blank validation documents

    Lecture 3:
    The Five Keys to COTS Computer System Validation (0:30) {6:30}

    • The Who, What, Where, When, and Why of CSV

    Lecture 4:
    The Validation Team (0:30) {7:00}

    • How to select team members
    • How to facilitate a validation project

    Day 2 Schedule


    Day 2 (9am to 3:30pm; 1.0 lunch, 0.5 (2-15min) breaks, 5.00 class = 6.5)


    Lecture 5:
    Ten-Step Process for COTS Risk-Based Computer System Validation (1:00) {1:00}

    • Learn which documents the FDA expects to audit.
    • How to use the risk-based validation approach to lower costs.
    • How to link requirements, specifications, risk management, and testing.
    • Document a computer system validation project using easy to understand fill-in-the-blank templates.
    • Based on: “Risk-Based Software Validation – Ten Easy Steps” (Davis Horwood International and PDA – http://www.pda.org, 2006).

    Lecture 6:
    How to Write Requirements and Specifications (0:30) {1:30}

    • Workshop for writing requirements and then expanding them for specifications

    Lecture 7:
    How to Conduct a Hazard Analysis/Risk Assessment-Exercise (0:30) {2:00}

    • Step-by-step instructions for performing and documenting a risk assessment, and how to use the results to reduce validation documentation.

    Lecture 8:
    Software Testing (1:00) {3:00}

    • Reduce testing by writing test cases that trace to elements of risk management.
    • How to write efficient test cases

    Lecture 9:
    System Change Control (0:30) {3:30}

    • How to manage a validated system with minimal documentation

    Lecture 10:
    Purchasing COTS Software (0:30) {4:00}

    • How to purchase COTS software and evaluate software vendors.

    Lecture 11:
    Cost Reduction Without Increasing Regulatory or Business Risk (1:00) {5:00}

    • How to save money
    • How to increase quality
    • How to increase compliance with less documentation

      Carolyn Troiano

      Consultant, BrainStorm Central Consulting

      Carolyn (McKillop) Troiano has more than 35 years of experience in the tobacco, pharmaceutical, medical device and other FDA-regulated industries. She has worked directly, or on a consulting basis, for many of the larger pharmaceutical and tobacco companies in the US and Europe, developing and executing compliance strategies and programs. Carolyn is currently active in the Association of Information Technology Professionals (AITP), and Project Management Institute (PMI) chapters in the Richmond, VA area.

      During her career, Carolyn worked directly, or on a consulting basis, for many of the larger pharmaceutical companies in the US and Europe. She developed validation programs and strategies back in the mid-1980s, when the first FDA guidebook was published on the subject, and collaborated with FDA and other industry representatives on 21 CFR Part 11, the FDA’s electronic record/electronic signature regulation.

     

    Click Here to Continue Learning

200+ followers. WOWWWWWW…

followed- 200

Hello Everyone,

Today we have the pleasure of celebrating the fact that we have reached the milestone of 200+ followers on WordPress. Since we started this blog, we have had such a great time connecting with everyone.  we never expected to actually to connect with other people in the blogging community.

we are so incredibly thankful for each and every one of you who follows and comments on my blog posts. Please know that!

we would continue our blogging in these areas FDA Regulation, Medical Devices, Drugs and Biologics, Healthcare Compliance, Biotechnology, Clinical Research, Laboratory Compliance, Quality Management ,HIPAA Compliance ,OSHA Compliance, Risk Management, Trade and Logistics Compliance ,Banking and Financial Services, Auditing/Accounting & Tax, Packaging and Labeling, SOX Compliance, Environmental Compliance, Microsoft Excel Spreadsheet, Geology and Mining, Human Resources Compliance, Food Safety Compliance and etc.

Get more articlehttps://www.globalcompliancepanel.com/freeresources/resource-directory

Please follow us on

Facebook – https://www.facebook.com/TrainingsAtGlobalCompliancePanel

Twitter – https://twitter.com/gcpanel

LinkedIn – https://www.linkedin.com/company/10519587/admin/updates/

Orkambi Reduces Main Biomarker of CF, Vertex Says in Updated Results on Four Therapies

Orkambi Reduces

Orkambi (lumacaftor/ivacaftor) reduced levels of the main biomarker of the lung disease cystic fibrosis and improved the nutritional status of children with the condition, according to a Phase 3 clinical trial.

The results were part of a recent update that Vertex Pharmaceuticals provided on Orkambi and three of its other CF therapies, Kalydeco (ivacaftor), tezacaftor (VX-661) and VX-371.

Vertex conducted the Phase 3 trial (NCT02797132) of Orkambi to evaluate its effectiveness and safety in preschoolers with two copies of the CFTR gene’s F508del mutation. The 60 children were aged 2 to 5. Mutations of the gene cause CF by producing faulty versions of the CFTR protein.

An indication of Orkambi’s effectiveness in the trial was that it reduced the production of the children’s sweat chloride and improved their nutritional status.

A sweat test is the gold standard for diagnosing CF because people with the disease have more chloride in their sweat than those who don’t. As for nutrition, the thick mucus that CF produces in the digestive system can prevent patients from absorbing nutrients and fat properly, leading to difficulty gaining weight and slower growth. CF also produces the mucus in lungs and other organs.

The Phase 3 trial also showed that Orkambi was safe and that the children tolerated it well. Researchers reported no adverse events besides those seen in studies of patients aged 6 to 11.

Based on the promising results of the trial, Vertex plans to submit a New Drug Application on Orkambi to the U.S. Food and Drug Administration during the first quarter of 2018. It will also ask the European Medicines Agency to extend the therapy’s availability to very young children.

Another Phase 3 trial (NCT02412111) that Vertex conducted evaluated a combination of tezacaftor and Kalydeco’s ability to reduce respiratory problems in patients more than 12 years old.

The study included 151 participants at 68 sites in the United States, Canada, Australia, and the European Union. The patients had one copy of the F508del mutation and one copy of another CFTR mutation.

Eight weeks of treatment with the combo led to a negligible improvement in a measure of patients’ lung function known as forced expiratory volume in one second, or FEV1. This is the amount of air that people can forcefully blow out of their lungs in one second.

The combo did lead to a reduction in sweat chloride that was larger than Kalydeco generated alone, however.

Given the results, Vertex has decided not to continue pursuing regulatory approval for the combo. One reason is that most patients older than 12 are eligible to receive Kalydeco by itself.

The FDA is expected to make a decision by February 2018 on a related New Drug Application that Vertex has filed. That application involves using the tezacaftor-Kalydeco combo to treat patients aged 12 or older who carry two copies of an F508del mutation or one copy of an F508del mutation plus another mutation. The FDA is giving the request priority review.

European regulators are expected to decide whether to approve the combo therapy in the second half of 2018.

Vertex has completed enrolling children 12 to 24 months for another Phase 3 trial (NCT03277196) of Kalydeco. It will evaluate the therapy’s safety in children less than 2 years old with a CFTR gating mutation and an R117H mutation.

To continue reading

Seminar Calendar of Upcoming Courses – June to July – 2017

Upcoming-Courses-for-French-Circles-Club

GlobalCompliancePanel’s seminars are a wonderful opportunity for professionals in the regulatory compliance areas to understand the latest happenings and updates in the regulatory compliance areas and to implement them, something they need to climb in their professions. GlobalCompliancePanel brings together a few of the best recognized names in the field of regulatory compliance on its panel of experts. The result: Learning that is effective, valuable and helpful.

GlobalCompliancePanel’s experts help you unravel all the knowledge you need in all the areas of regulatory compliance. At these seminars which are held all over the globe, you get to interact with them in person, so that any doubt or clarification you have is sorted out by none other than the honcho. They help professionals like you implement the regulations and stay updated, so that regulatory compliance causes no stress for you.

GlobalCompliancePanel’s experts offer their insightful analysis into the issues that are of consequence to regulatory professionals in their daily work. Their thoughts help you implement the best practices of the industry into your work. They also offer updates on the latest regulatory requirements arising out of a host of the laws and issues related to regulatory compliance, including, but not limited to medical devices, food and beverages, pharmaceuticals, life sciences, biotechnology and pharmaceutical water systems.

Take a look at our upcoming webinars from GlobalCompliancePanel, which will put you on the road to learning about any area that is of importance to your profession. You can plan your learning from GlobalCompliancePanel by looking at our seminars in the next few weeks at locations of convenience to you. You can choose from a whole range of topics. See which among these trainings suit you: Design of Experiments (DOE) for Process Development and Validation, Writing and implementing effective SOP’s, new FSMA rules, risk management and device regulations, data integrity, combination products, and what have you!

Contact us today!
NetZealous LLC DBA GlobalCompliancePanel
john.robinson@globalcompliancepanel.com
Toll free: +1-800-447-9407
FAX : 302 288 6884
Website: http://bit.ly/Courses-June-to-July-2017

Wrong hiring and ways of avoiding it

A perfect hire is a boon to any organization. At the other extreme, a bad hire can bring the inverse result to the organization: It can not only impede productivity; it can even result in drawing the organization into legal issues associated with wrong hiring. Problem employees create employee problems, which is why HR professionals need to be aware of what steps to take and what scenarios to avoid if they have to take hiring decisions that are legally defensible. A hire that is weak from the legal perspective is the stepping stone for troubles for the organization.

As if the legal troubles of wrong hiring are not enough; organizations have to also deal with the financial burden it brings. Many organizations have realized that in the absence of the right precautions, there is a near certainty that could end up hiring someone with a wrong background.

Facing embarrassing lawsuits

If an organization’s HR overlooks areas such as the candidate’s criminal record, or fails to take note of a falsified background, all that it is going to see is workplace violence, not to speak of lawsuits for negligent hiring and all the loss of time spent on finding the unsuited person.

Employers have to also face the prospect of inviting lawsuits for initiating screening methods that either violate the law or fail to take into account the changes in civil rights legislation and the new EEOC Guidance on the use of criminal records. This makes the screening process more complex than it ever was. It adds a new layer of woes for the organization, which has to bear the brunt of a wrong decision in hiring.

Get to understand all the aspects of legally compliant hiring practices

The way out is to gain familiarity with legally compliant best practices. This is the only truly proven antidote to not only keep the business productive; but to also make sure the organization will not be taken to court. Want to explore the ways of putting legally compliant hiring practices in place? Then, you need to enroll for a highly engaging and valuable two-day seminar from GlobalCompliancePanel, a leading provider of professional trainings for the areas of regulatory compliance.

At this seminar, Lester S. Rosen, who is CEO and Attorney at Law at Employment Screening Resources, a national background screening company accredited by the National Association of Professional Background Screeners (NAPBS), will be the Director. To gain the benefit of the rich experience Lester brings into hiring best practices, please register for this seminar by visiting Wrong hiring and ways of avoiding it .

Touching upon all aspects of legally safe hiring and background checks

Over these two days, which will see a high level of interactivity, Lester will equip the participants with cutting edge tools, the latest legal developments and practical advice on the challenges of recruiting, background screening and hiring the best people for their organization. All those related to hiring practices, such as Human Resources professionals, Employers, Business Owners, Hiring Managers, Staffing Directors, Risk Management and Security Processionals, Staffing Professionals, Recruiters, and Background Screening Professionals will gain immensely from this session.

This seminar will help participants with the ways of obtaining and utilizing criminal records and background information on job applicants. The Director will update them on recent legal developments, and describe a few case studies which will help them understand the steps employers should take and the mistakes they should avoid. He will also familiarize them with the critical issues relating to hiring, such as the use of social networking sites, new technology and the EEOC approach to the use of criminal records and credit reports. Also taken up for discussion is the topic of why class action lawsuits are rising exponentially against employers and how to effectively comply with the federal Fair Credit Reporting Act (FCRA), as well as the many state laws that are in place for regulating background checks.

The Director will help participants understand with the immediate steps they can take to avoid a bad hire by putting in place a screening policy that withstands legal scrutiny. He will also traverse a variety of topics related to background checks such as:

o  The process employers should use in hiring to minimize the chance of a bad hire

o  The ways of adapting a background screening system

o  The ways of selecting the rightly suited screening partner

o  The most judicious ways of using social media, international background checks and drug testing.

Today’s Article on Understanding the HIPAA Privacy Rule, Security Rule and Breach Notification Rules and their compliance

The Health Insurance Portability and Accountability Act (HIPAA)’s Privacy, Security, and Breach Notification Rules are aimed at protecting the privacy, as well as the security aspects of health information. This set of rules has the intention of providing individuals with some rights on information relating to their health.

This is how the three rules need to be understood:

The Privacy Rule: Sets out standards about the conditions to be met for using and disclosing Protected Health Information (PHI). This Rule applies nationally.

The Security Rule: Specifies the kinds of safeguards that Covered Entities and Business Associates have to put in place and implement for protecting electronic Protected Health Information (ePHI) and ensure that they remain confidential and are made available when required, and have integrity.

The Breach Notification Rule: Covered Entities have to report breach of unsecured PHI to the affected individuals and the HHS. In some situations, this has to be reported to the media, as well. The Breach Notification Rule has details on how this is to be done. Generally, a window period of 60 days is given from the date of detection of the breach. Small breaches, meaning breaches that affect lesser than 500 individuals, may be directly reported to the HHS annually.

Purview of the HIPAA Privacy Rule and Security Rule

Privacy Rule: HIPAA Privacy Rule has standards on how to protect PHI held by the following: Health plans, healthcare clearinghouses, healthcare providers; part of whose healthcare transactions are carried out electronically, and Business Associates

Security Rule: HIPAA Security Rule sets out standards and guidelines on the steps that Covered Entities and Business Associates have to take to ensure that Protected Health Information is confidential, has integrity and is made available when needed. The Security Rule describes how these qualities in the ePHI created, maintained or transmitted by them.

Knowledge of all these aspects is very necessary if the Covered Entity or Business Associate has to ensure HIPAA compliance. The task of HIPAA compliance does not become possible with just a reading of the rules and the procedures. Expert advice on how to actually implement the requirements is needed.

This is what a two-day seminar from GlobalCompliancePanel, a leading provider of professional trainings for the regulatory compliance areas, will offer. At this seminar, Jim Sheldon Dean, Director of Compliance Services, Lewis Creek Systems, LLC, will be the Director.

In order to gain complete understanding of the HIPAA Privacy Rule, Security Rule and the Breach Notification Rules, and to understand ways by which to ensure compliance with them in a way that satisfies the regulatory authorities, please register for this seminar by logging on to http://www.globalcompliancepanel.com/control/globalseminars/~product_id=900754?linkedin-SEO .

Jim Sheldon Dean will explain the requirements of HIPAA, how to prevent incidents, and how to survive audits, so that penalties can be avoided. He will offer an explanation of the background to HIPAA, and detail what a manager of healthcare information privacy and security has to know about the most important privacy and security issues. He will also show how to ensure HIPAA compliance, and explain the consequences of inadequate HIPAA compliance.

This seminar will provide in-depth understanding on the major aspects of HIPAA compliance, such as:

o  The new features of the regulations

o  The recent changes

o  The aspects that Covered Entities and Business Associates need to address if they have to remain compliant.

Learning on all aspects of HIPAA Privacy Rule, Security Rule and Breach Notification Rules

Jim will also explain audits and enforcements. He will also describe privacy and security breaches and explain how to avoid them. He will enrich the learning by providing sample documents and references.

Jim will cover the following areas at this two-day session:

o  Overview of HIPAA Regulations

o  HIPAA Privacy Rule Principles, Policies and Procedures

o  Recent and Proposed Changes to the HIPAA Rules

o  HIPAA Security Rule Principles

o  HIPAA Security Policies and Procedures and Audits

o  Risk Analysis for Security and Meaningful Use

o  Risk Mitigation and Compliance Remediation

o  Documentation, Training, Drills and Self-Audits.

https://www.cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/MLNProducts/Downloads/HIPAAPrivacyandSecurityTextOnly.pdf