SlideShare ist ein Scribd-Unternehmen logo
1 von 24
August 5, 2015 Proprietary and Confidential - 1 -
IT Compliance in 2015
Beyond the “V” Model
Arik Gorban
July 23, 2015
August 5, 2015 Proprietary and Confidential - 2 -
Today’s Speaker
 Veteran on Computer Systems compliance with over 25 years of
experience in strategic regulatory compliance consulting, application
life cycle management, and quality system implementation for the
Life Sciences industry.
 Has led IT compliance projects for many Life Science and technology
companies besides consulting major companies on global quality system
harmonization.
 An international authority on risk-based approach to computer
validation and regulatory compliance management. Frequent lecturer
at professional conferences, user group meeting, and events on IT
compliance, validation, and Part 11 topics.
 Leads the development of IGATE Life Sciences’ Quality & Compliance
practices and IGATE’s compliance solutions and services for Cloud
Computing and Mobility.
 Leads client initiatives to integrate and harmonize IT-related compliance
strategies, methodologies, and tools across the organization and across
the regulatory landscape (e.g., FDA, SOX, and EU Annex 11).
Arik Gorban
Associate Vice President
Consulting & Solutions
IGATE, Life Sciences
August 5, 2015 Proprietary and Confidential - 3 -
Today’s Agenda
 IT Compliance issues facing Life Sciences industry
 Background – the industry today
 New challenges
 Lean, risk-based CSV
 Real-life case study
 Next steps
August 5, 2015 Proprietary and Confidential - 4 -
Objective
 We’ll take a fresh look at CSV and risk management approach that is
effective, efficient, and enables the adoption of new technologies,
methodologies, and service models with external providers.
 A validation process that:
 Supports a true risk-based approach that is flexible and feasible with new
technologies (cloud, mobility, IoT), new system lifecycle approaches (Agile),
and new service models (SaaS).
 Ensures the quality of the validated system.
 Reduces business and operational risks.
 Increases the level of regulatory compliance.
 Reduces compliance costs.
August 5, 2015 Proprietary and Confidential - 5 -
Issues that often bother Life Sciences executives
I feel frustrated with the
cost and effort
associated with the
Computer System
Validation (CSV).
My vendor tells me that
they validated the
system that we want to
implement but QA tells
me that we still need to
validate it.
We have detailed
procedures and
extensive training but
still inadequate results.
Repeated review cycles
of validation
documentation is
causing costly project
delays.
We are under pressure
to reduce IT costs and
adopt new technologies
and methodologies, but
our validation process
prevents us from doing
that.
My projects suffer from
long debates and re-
work due to different
opinions on CSV related
activities.
Our risk-based approach
takes longer and costs us
more than our old
process.
August 5, 2015 Proprietary and Confidential - 6 -
Issues & Opportunities in IT Compliance
High
Low
Cost
High
Opportunitiestoreducecostsandreducerisks
5%
65%5%
Quadrant II:
High risk
Lack of CSV understanding
Over-spend
Still not-compliant
Quadrant I:
High risk
Under-spend
Non-compliant
Low
20%
5%
“In compliance”
and
“Budget-right”
Quadrant IV:
Highly-compliant
Under-spend
Not attainable
Risk
Quadrant III:
Inefficient, ineffective CSV
Over-spend on marginal
value add activities
Highly compliant
August 5, 2015 Proprietary and Confidential - 7 -
Background – Industry Today
 Validation principles did not change in the last two decades.
 Part 11 added some requirements for electronic records and signature
but did not impose new validation requirements.
 Attempts to implement harmonized and consistent risk-based CSV as an
effective way to optimize the validation process often result in more
cumbersome and costly validation.
 Validation planning discussions are typically focused on the V-Model’s
system lifecycle (SLC) phases and deliverables.
 SLC artifacts are the focus, not system quality and risk mitigation.
 Risk assessments focus on testing to determine how much IQ, OQ, and
PQ are necessary.
August 5, 2015 Proprietary and Confidential - 8 -
Background – Industry Today
 Risk assessments often neglect to address risk areas, such as:
– User account management, system availability, data protection, user
competency, system support, data ownership, non-traditional software
development and technologies
 The right technical, business, and regulatory experts don’t always
participate
 The industry needs to address new challenges:
– Cloud Computing
– Mobility and IoT – Technology and Application
– SaaS – Software as a Service Delivery Model
– Agile Software Development Methodology
August 5, 2015 Proprietary and Confidential - 9 -
Risks in Today’s Environment
 Evolving technologies and service models
 Evolving expectations and practices
 Lack of transparency (actual providers, locations, support, quality
practices...)
 Use of open source
 Rapid software development approaches
 Security gaps and exposure
 Availability of system and data (short term and long term)
 Quality and compliance gaps
 It’s new. We don’t know what we don’t know.
August 5, 2015 Proprietary and Confidential - 10 -August 5, 2015 Proprietary and Confidential - 10 -
Lean Risk-Based CSV
August 5, 2015 Proprietary and Confidential - 11 -
“V” Model
User Requirements
Specification
Functional
Specification
Architecture Design
Specification
User Acceptance
Testing (PQ)
Validation
Report
Validation
Plan
VERIFIES
VERIFIES
VERIFIES
Installation
Qualification (IQ)
Software Design
Specification/Build
Development
Testing
(Unit, System)
Functional Testing
(OQ)
August 5, 2015 Proprietary and Confidential - 12 -
Risk Assessment Types
System
Categorization
Based on type of system: custom
development, configured product
(COTS), turnkey COTS, layered
product, embedded software, smart
devices, etc.
Determine which validation
process applies (validation /
qualification / verification)
Risk Profile
(High-Level)
Based on the regulatory, operational
and business risks associated with the
system (e.g., GxP applicability, privacy
requirements, SOX applicability, and
business complexity and criticality)
Define the overall validation
strategy and required
deliverables
Functional Risk
Assessment
Based on operational and regulatory
risk
Determine requirements for
negative and boundary testing in
OQ
Determine which processes to
test in PQ
The table below describes the three levels of categorization and risk
assessment that should be followed for computer system applications.
August 5, 2015 Proprietary and Confidential - 13 -
Data modification
Regulatory un-preparedness
Data loss
Lack of traceability
Mis-use of system
Data accuracy
Incorrect process - system
Incorrect process - people
Data falsification
System unavailability
Risk Priority-before Revised Risk-after mitigation
Lowest risk at outer edge
Highest in the center
System Risk Profile
August 5, 2015 Proprietary and Confidential - 14 -
Lean Risk-Based CSV
Avoid the mechanical and rigid CSV. Lean, risk-based CSV should be
supported by the appropriate organization, people, methodology,
process, execution, and tools.
 Organization – clear governance, roles, responsibilities, and authorities;
that facilitates a true risk based approach and ensures consistent
interpretation of regulatory requirements.
 People – fully trained competent individuals with uniform interpretation
throughout the corporation and trained business owners.
 Methodology – single, fully matured set of standards with integrated risk
analysis and enhanced risk-based approach that goes beyond functional
risk evaluation.
 Process / Execution – flexible process that follows a risk-based plan.
 Tools – templates, guidance documents and quality reviews are consistent
and targeted to drive value.
August 5, 2015 Proprietary and Confidential - 15 -August 5, 2015 Proprietary and Confidential - 15 -
Case Study
August 5, 2015 Proprietary and Confidential - 16 -
Real Life Scenario – the Problem
 A company planned a move to a new location.
 They planned to move the whole infrastructure as is.
 There will be no new equipment, software, or configuration, besides
new network layouts inside the building and new connections to the
outside (e.g., power, network, and phone lines).
 Initial validation discussions focused on how much IQ, OQ, and PQ.
 Some insisted that all are required; some felt that PQ (user acceptance)
is not required; and some suggested partial IQ, OQ, and PQ.
 The discussions focused on standard validation phases and deliverables,
rather than risks and mitigations.
 The team was focused on the artifacts, not on quality objectives.
August 5, 2015 Proprietary and Confidential - 17 -
Real Life Scenario – the Approach
 Shifted the focus from artifacts to risk management
 Created a list of bullets that describe what can go wrong with the
data center move
– incorrect assembly
– hardware components break or get lost
– faulty network wiring
– wireless network unreliable
– incorrect network configuration
– unstable power supply
– physical security issues
– other transport, assembly, and location-related risks
August 5, 2015 Proprietary and Confidential - 18 -
Real Life Scenario – the Approach
 Identified risk mitigation actions
– reduce the impact
– reduce the likelihood
– or allow early detection
 Mitigation actions included
– configuration documentation activities
– inventory of parts
– labeling wires and components
– writing assembly scripts
– testing connectivity
– verifying that systems and applications start correctly
– printing
– verifying power supply
August 5, 2015 Proprietary and Confidential - 19 -
Real Life Scenario – the Approach
 The proposed activities were focused on risk mitigation and
quality and compliance objectives, not driven by a list of
deliverables.
 The last step was mapping the activities and documentation to
applicable system lifecycle phases and deliverables.
August 5, 2015 Proprietary and Confidential - 20 -
Benefits
 Clarity on how to manage risk
 Effective Data Center Move Quality Plan
 Mitigation to reduce potential operational, regulatory,
and business risks
 Quality Plan ensured that activities and documentation
met applicable company standards
 Management was able to evaluate real risks and actions
 The approach did not cut corners and sacrifice quality,
but increased quality and compliance
 Avoided allocating costly resources to low-value tasks
August 5, 2015 Proprietary and Confidential - 21 -
Next Steps
 Start with an overall strategy that takes into consideration
short term and long term investments, risks, required controls,
and benefits.
 The plan and investment in a compliant environment must
consider an evolutionary process which will allow the
technology, controls, validation approaches, and training to be
tested and refined.
 Create a list of “risks” for your new environment. Identify
which of the “risks” are:
 True risks to the integrity, quality, reliability, or availability
of the data
 Compliance risks
 Gaps from current expectations, but not risks
August 5, 2015 Proprietary and Confidential - 22 -
Next Steps
 Adjust your Quality System, including system lifecycle and
computer system validation policies, procedures, work
instruction, guidelines, and templates to ensure that they can
be followed when systems are implemented in a new
environment.
 Work with Compliance Subject Matter Experts to drive a true
risk-based approach.
 Work with your internal stakeholders to ensure that the
approach is acceptable and defendable.
 Follow Life Sciences industry trends with
regard to utilizing new technologies in regulated
environments. Monitor agency activities, statements, and
regulatory actions in order to understand their interpretation
and expectations.
August 5, 2015 Proprietary and Confidential - 23 -
Conclusion
 Taking a fresh look at a risk-based approach to CSV would be
very useful in dealing with today’s dynamics due to new
technologies, software and service delivery models, and
frequent organizational changes.
August 5, 2015 Proprietary and Confidential - 24 -
THANK YOU!
www.igate.com
For additional information or questions, please contact us by email
arik.gorban@igate.com

Weitere ähnliche Inhalte

Was ist angesagt?

Using PRIMO Mobile to Collect Adverse Events in the Field
Using PRIMO Mobile to Collect Adverse Events in the FieldUsing PRIMO Mobile to Collect Adverse Events in the Field
Using PRIMO Mobile to Collect Adverse Events in the Field
November Research Group
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 

Was ist angesagt? (20)

Connections 2013 change your thinking - integrating analytics into the audit ...
Connections 2013 change your thinking - integrating analytics into the audit ...Connections 2013 change your thinking - integrating analytics into the audit ...
Connections 2013 change your thinking - integrating analytics into the audit ...
 
GRC in Australia slides
GRC in Australia slidesGRC in Australia slides
GRC in Australia slides
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
Does audit make us more secure
Does audit make us more secureDoes audit make us more secure
Does audit make us more secure
 
Agile Software Development and the FDA
Agile Software Development and the FDAAgile Software Development and the FDA
Agile Software Development and the FDA
 
QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)QCDR or QR (Selecting the Correct Reporting Mechanism)
QCDR or QR (Selecting the Correct Reporting Mechanism)
 
Is Your Safety Inbox a Black Hole?
Is Your Safety Inbox a Black Hole?Is Your Safety Inbox a Black Hole?
Is Your Safety Inbox a Black Hole?
 
Regulatory intelligence
Regulatory intelligenceRegulatory intelligence
Regulatory intelligence
 
Best practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'tsBest practices for global regulatory intelligence do's & don'ts
Best practices for global regulatory intelligence do's & don'ts
 
It12015
It12015It12015
It12015
 
Using PRIMO Mobile to Collect Adverse Events in the Field
Using PRIMO Mobile to Collect Adverse Events in the FieldUsing PRIMO Mobile to Collect Adverse Events in the Field
Using PRIMO Mobile to Collect Adverse Events in the Field
 
Why a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA ComplianceWhy a Risk Assessment is NOT Enough for HIPAA Compliance
Why a Risk Assessment is NOT Enough for HIPAA Compliance
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
It32015 slides
It32015 slidesIt32015 slides
It32015 slides
 
Surviving a HIPAA Audit: Five Crucial Steps
Surviving a HIPAA Audit: Five Crucial Steps Surviving a HIPAA Audit: Five Crucial Steps
Surviving a HIPAA Audit: Five Crucial Steps
 
Agile Development for FDA Regulated Medical Software
Agile Development for FDA Regulated Medical SoftwareAgile Development for FDA Regulated Medical Software
Agile Development for FDA Regulated Medical Software
 
It42015 slides
It42015 slidesIt42015 slides
It42015 slides
 
Identifying critical security controls
Identifying critical security controlsIdentifying critical security controls
Identifying critical security controls
 
Scrum and Compliance (2013)
Scrum and Compliance (2013)Scrum and Compliance (2013)
Scrum and Compliance (2013)
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 

Andere mochten auch

Model+Risk+Validation+Raphael+Albrecht
Model+Risk+Validation+Raphael+AlbrechtModel+Risk+Validation+Raphael+Albrecht
Model+Risk+Validation+Raphael+Albrecht
Raphael Albrecht
 
Software validation
Software validationSoftware validation
Software validation
Robert Phe
 
2014-12-10 - GAMP Presentation for LI
2014-12-10 - GAMP Presentation for LI2014-12-10 - GAMP Presentation for LI
2014-12-10 - GAMP Presentation for LI
Natalia Pando de Cea
 
System models of sdlc- v model
System models of sdlc- v modelSystem models of sdlc- v model
System models of sdlc- v model
Minal Kashyap
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences July
Paul Gulbin
 
Release With Maven
Release With MavenRelease With Maven
Release With Maven
eugenn
 
Apuntes historia 2do cuatrimestre
Apuntes historia 2do cuatrimestreApuntes historia 2do cuatrimestre
Apuntes historia 2do cuatrimestre
Sierras89
 
Presentación los unicos
Presentación los unicosPresentación los unicos
Presentación los unicos
Mima9
 
Innosfera 6 de junio de 2012
Innosfera 6 de junio de 2012Innosfera 6 de junio de 2012
Innosfera 6 de junio de 2012
Innosfera
 
yti-august2009-090910-spreads
yti-august2009-090910-spreadsyti-august2009-090910-spreads
yti-august2009-090910-spreads
Stephanie Smith
 

Andere mochten auch (20)

Medical Device Connectivity Platform
Medical Device Connectivity PlatformMedical Device Connectivity Platform
Medical Device Connectivity Platform
 
Model+Risk+Validation+Raphael+Albrecht
Model+Risk+Validation+Raphael+AlbrechtModel+Risk+Validation+Raphael+Albrecht
Model+Risk+Validation+Raphael+Albrecht
 
Horizon Presentation
Horizon PresentationHorizon Presentation
Horizon Presentation
 
Software validation do's and dont's may 2013
Software validation do's and dont's may 2013Software validation do's and dont's may 2013
Software validation do's and dont's may 2013
 
Software validation
Software validationSoftware validation
Software validation
 
Documentation MUST
Documentation MUSTDocumentation MUST
Documentation MUST
 
2014-12-10 - GAMP Presentation for LI
2014-12-10 - GAMP Presentation for LI2014-12-10 - GAMP Presentation for LI
2014-12-10 - GAMP Presentation for LI
 
The Software Testing V-model reclaimed
The Software Testing V-model reclaimedThe Software Testing V-model reclaimed
The Software Testing V-model reclaimed
 
V-Model in Software Testing
V-Model in Software TestingV-Model in Software Testing
V-Model in Software Testing
 
Computer System Validation Training
Computer System Validation TrainingComputer System Validation Training
Computer System Validation Training
 
System models of sdlc- v model
System models of sdlc- v modelSystem models of sdlc- v model
System models of sdlc- v model
 
Digital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences JulyDigital Innovation Impact in Life Sciences July
Digital Innovation Impact in Life Sciences July
 
Release With Maven
Release With MavenRelease With Maven
Release With Maven
 
Apuntes historia 2do cuatrimestre
Apuntes historia 2do cuatrimestreApuntes historia 2do cuatrimestre
Apuntes historia 2do cuatrimestre
 
İnternetteki̇ ri̇skler
İnternetteki̇ ri̇sklerİnternetteki̇ ri̇skler
İnternetteki̇ ri̇skler
 
The Metter Advertiser
The Metter Advertiser The Metter Advertiser
The Metter Advertiser
 
Clase mejora escolar
Clase mejora escolarClase mejora escolar
Clase mejora escolar
 
Presentación los unicos
Presentación los unicosPresentación los unicos
Presentación los unicos
 
Innosfera 6 de junio de 2012
Innosfera 6 de junio de 2012Innosfera 6 de junio de 2012
Innosfera 6 de junio de 2012
 
yti-august2009-090910-spreads
yti-august2009-090910-spreadsyti-august2009-090910-spreads
yti-august2009-090910-spreads
 

Ähnlich wie IT Compliance in 2015 - Beyond the “v” model

2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed
promediakw
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
Oracle
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
Rishi Kant
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore.
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Doeren Mayhew
 

Ähnlich wie IT Compliance in 2015 - Beyond the “v” model (20)

Security audit
Security auditSecurity audit
Security audit
 
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019 PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
PPT TCA, SIGMA Workshop on Digital Auditing for SAIs, Skopje, November 2019
 
Applying Technologies Across the End-to-End Pharmacovigilance Process to Incr...
Applying Technologies Across the End-to-End Pharmacovigilance Process to Incr...Applying Technologies Across the End-to-End Pharmacovigilance Process to Incr...
Applying Technologies Across the End-to-End Pharmacovigilance Process to Incr...
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
Taking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to SplunkTaking Splunk to the Next Level - New to Splunk
Taking Splunk to the Next Level - New to Splunk
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed2015 05-kuwait-log maturity-compressed
2015 05-kuwait-log maturity-compressed
 
Dr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressedDr. Almerindo Graziano - log maturity-compressed
Dr. Almerindo Graziano - log maturity-compressed
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
Suitability of Agile Methods for Safety-Critical Systems Development: A Surve...
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
Introduction of Secure Software Development Lifecycle
Introduction of Secure Software Development LifecycleIntroduction of Secure Software Development Lifecycle
Introduction of Secure Software Development Lifecycle
 
Bayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance AnalystBayo Omisore, IT Auditor-Compliance Analyst
Bayo Omisore, IT Auditor-Compliance Analyst
 
Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19Understanding New Technology and Security Risks as you respond to COVID-19
Understanding New Technology and Security Risks as you respond to COVID-19
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Next generation software testing trends
Next generation software testing trendsNext generation software testing trends
Next generation software testing trends
 
Adaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_studyAdaptive grc life_sciences_case_study
Adaptive grc life_sciences_case_study
 

Mehr von IGATE Corporation

Mehr von IGATE Corporation (7)

Bridging the Training Gap between a Multi-Generational Workforce
Bridging the Training Gap between a Multi-Generational WorkforceBridging the Training Gap between a Multi-Generational Workforce
Bridging the Training Gap between a Multi-Generational Workforce
 
Warranty Fraud Detection
Warranty Fraud DetectionWarranty Fraud Detection
Warranty Fraud Detection
 
Social Media Analytics in Life Sciences
Social Media Analytics in Life SciencesSocial Media Analytics in Life Sciences
Social Media Analytics in Life Sciences
 
Global Billing Solution
Global Billing SolutionGlobal Billing Solution
Global Billing Solution
 
SpendSMART
SpendSMARTSpendSMART
SpendSMART
 
AssetSMART
AssetSMARTAssetSMART
AssetSMART
 
IGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offeringsIGATE - Corporate Presentation - An overview of the Company and its offerings
IGATE - Corporate Presentation - An overview of the Company and its offerings
 

Kürzlich hochgeladen

Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848
Ifra Zohaib
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Sana Rajpoot
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Sana Rajpoot
 

Kürzlich hochgeladen (20)

Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848
 
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book nowMysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment BookingHaldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
Haldwani call girls 📞 8617697112 At Low Cost Cash Payment Booking
 
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book nowKanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
 
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book nowSilchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
Silchar Call Girl 97487*63073 Call Girls in Silchar Escort service book now
 
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...Dehradun ❣️  Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
Dehradun ❣️ Call Girl 97487*63073 Call Girls in Dehradun Escort service book...
 
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRLMysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
Mysore ❤CALL GIRL 84099*07087 ❤CALL GIRLS IN Mysore ESCORT SERVICE❤CALL GIRL
 
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 37 (Delhi) Call Girl Service
 
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
 
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book nowJodhpur  Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
Jodhpur Call Girl 97487*63073 Call Girls in Jodhpur Escort service book now
 
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
Bhubaneswar ❣️ Call Girl 9748763073 Call Girls in Bhubaneswar Escort service ...
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
 
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur  Call Girl 97487*63073 Call Girls in Berhampur Escort service book nowBerhampur  Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
Berhampur Call Girl 97487*63073 Call Girls in Berhampur Escort service book now
 
Chennai ❣️ Call Girl 97487*63073 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 97487*63073 Call Girls in Chennai Escort service book nowChennai ❣️ Call Girl 97487*63073 Call Girls in Chennai Escort service book now
Chennai ❣️ Call Girl 97487*63073 Call Girls in Chennai Escort service book now
 

IT Compliance in 2015 - Beyond the “v” model

  • 1. August 5, 2015 Proprietary and Confidential - 1 - IT Compliance in 2015 Beyond the “V” Model Arik Gorban July 23, 2015
  • 2. August 5, 2015 Proprietary and Confidential - 2 - Today’s Speaker  Veteran on Computer Systems compliance with over 25 years of experience in strategic regulatory compliance consulting, application life cycle management, and quality system implementation for the Life Sciences industry.  Has led IT compliance projects for many Life Science and technology companies besides consulting major companies on global quality system harmonization.  An international authority on risk-based approach to computer validation and regulatory compliance management. Frequent lecturer at professional conferences, user group meeting, and events on IT compliance, validation, and Part 11 topics.  Leads the development of IGATE Life Sciences’ Quality & Compliance practices and IGATE’s compliance solutions and services for Cloud Computing and Mobility.  Leads client initiatives to integrate and harmonize IT-related compliance strategies, methodologies, and tools across the organization and across the regulatory landscape (e.g., FDA, SOX, and EU Annex 11). Arik Gorban Associate Vice President Consulting & Solutions IGATE, Life Sciences
  • 3. August 5, 2015 Proprietary and Confidential - 3 - Today’s Agenda  IT Compliance issues facing Life Sciences industry  Background – the industry today  New challenges  Lean, risk-based CSV  Real-life case study  Next steps
  • 4. August 5, 2015 Proprietary and Confidential - 4 - Objective  We’ll take a fresh look at CSV and risk management approach that is effective, efficient, and enables the adoption of new technologies, methodologies, and service models with external providers.  A validation process that:  Supports a true risk-based approach that is flexible and feasible with new technologies (cloud, mobility, IoT), new system lifecycle approaches (Agile), and new service models (SaaS).  Ensures the quality of the validated system.  Reduces business and operational risks.  Increases the level of regulatory compliance.  Reduces compliance costs.
  • 5. August 5, 2015 Proprietary and Confidential - 5 - Issues that often bother Life Sciences executives I feel frustrated with the cost and effort associated with the Computer System Validation (CSV). My vendor tells me that they validated the system that we want to implement but QA tells me that we still need to validate it. We have detailed procedures and extensive training but still inadequate results. Repeated review cycles of validation documentation is causing costly project delays. We are under pressure to reduce IT costs and adopt new technologies and methodologies, but our validation process prevents us from doing that. My projects suffer from long debates and re- work due to different opinions on CSV related activities. Our risk-based approach takes longer and costs us more than our old process.
  • 6. August 5, 2015 Proprietary and Confidential - 6 - Issues & Opportunities in IT Compliance High Low Cost High Opportunitiestoreducecostsandreducerisks 5% 65%5% Quadrant II: High risk Lack of CSV understanding Over-spend Still not-compliant Quadrant I: High risk Under-spend Non-compliant Low 20% 5% “In compliance” and “Budget-right” Quadrant IV: Highly-compliant Under-spend Not attainable Risk Quadrant III: Inefficient, ineffective CSV Over-spend on marginal value add activities Highly compliant
  • 7. August 5, 2015 Proprietary and Confidential - 7 - Background – Industry Today  Validation principles did not change in the last two decades.  Part 11 added some requirements for electronic records and signature but did not impose new validation requirements.  Attempts to implement harmonized and consistent risk-based CSV as an effective way to optimize the validation process often result in more cumbersome and costly validation.  Validation planning discussions are typically focused on the V-Model’s system lifecycle (SLC) phases and deliverables.  SLC artifacts are the focus, not system quality and risk mitigation.  Risk assessments focus on testing to determine how much IQ, OQ, and PQ are necessary.
  • 8. August 5, 2015 Proprietary and Confidential - 8 - Background – Industry Today  Risk assessments often neglect to address risk areas, such as: – User account management, system availability, data protection, user competency, system support, data ownership, non-traditional software development and technologies  The right technical, business, and regulatory experts don’t always participate  The industry needs to address new challenges: – Cloud Computing – Mobility and IoT – Technology and Application – SaaS – Software as a Service Delivery Model – Agile Software Development Methodology
  • 9. August 5, 2015 Proprietary and Confidential - 9 - Risks in Today’s Environment  Evolving technologies and service models  Evolving expectations and practices  Lack of transparency (actual providers, locations, support, quality practices...)  Use of open source  Rapid software development approaches  Security gaps and exposure  Availability of system and data (short term and long term)  Quality and compliance gaps  It’s new. We don’t know what we don’t know.
  • 10. August 5, 2015 Proprietary and Confidential - 10 -August 5, 2015 Proprietary and Confidential - 10 - Lean Risk-Based CSV
  • 11. August 5, 2015 Proprietary and Confidential - 11 - “V” Model User Requirements Specification Functional Specification Architecture Design Specification User Acceptance Testing (PQ) Validation Report Validation Plan VERIFIES VERIFIES VERIFIES Installation Qualification (IQ) Software Design Specification/Build Development Testing (Unit, System) Functional Testing (OQ)
  • 12. August 5, 2015 Proprietary and Confidential - 12 - Risk Assessment Types System Categorization Based on type of system: custom development, configured product (COTS), turnkey COTS, layered product, embedded software, smart devices, etc. Determine which validation process applies (validation / qualification / verification) Risk Profile (High-Level) Based on the regulatory, operational and business risks associated with the system (e.g., GxP applicability, privacy requirements, SOX applicability, and business complexity and criticality) Define the overall validation strategy and required deliverables Functional Risk Assessment Based on operational and regulatory risk Determine requirements for negative and boundary testing in OQ Determine which processes to test in PQ The table below describes the three levels of categorization and risk assessment that should be followed for computer system applications.
  • 13. August 5, 2015 Proprietary and Confidential - 13 - Data modification Regulatory un-preparedness Data loss Lack of traceability Mis-use of system Data accuracy Incorrect process - system Incorrect process - people Data falsification System unavailability Risk Priority-before Revised Risk-after mitigation Lowest risk at outer edge Highest in the center System Risk Profile
  • 14. August 5, 2015 Proprietary and Confidential - 14 - Lean Risk-Based CSV Avoid the mechanical and rigid CSV. Lean, risk-based CSV should be supported by the appropriate organization, people, methodology, process, execution, and tools.  Organization – clear governance, roles, responsibilities, and authorities; that facilitates a true risk based approach and ensures consistent interpretation of regulatory requirements.  People – fully trained competent individuals with uniform interpretation throughout the corporation and trained business owners.  Methodology – single, fully matured set of standards with integrated risk analysis and enhanced risk-based approach that goes beyond functional risk evaluation.  Process / Execution – flexible process that follows a risk-based plan.  Tools – templates, guidance documents and quality reviews are consistent and targeted to drive value.
  • 15. August 5, 2015 Proprietary and Confidential - 15 -August 5, 2015 Proprietary and Confidential - 15 - Case Study
  • 16. August 5, 2015 Proprietary and Confidential - 16 - Real Life Scenario – the Problem  A company planned a move to a new location.  They planned to move the whole infrastructure as is.  There will be no new equipment, software, or configuration, besides new network layouts inside the building and new connections to the outside (e.g., power, network, and phone lines).  Initial validation discussions focused on how much IQ, OQ, and PQ.  Some insisted that all are required; some felt that PQ (user acceptance) is not required; and some suggested partial IQ, OQ, and PQ.  The discussions focused on standard validation phases and deliverables, rather than risks and mitigations.  The team was focused on the artifacts, not on quality objectives.
  • 17. August 5, 2015 Proprietary and Confidential - 17 - Real Life Scenario – the Approach  Shifted the focus from artifacts to risk management  Created a list of bullets that describe what can go wrong with the data center move – incorrect assembly – hardware components break or get lost – faulty network wiring – wireless network unreliable – incorrect network configuration – unstable power supply – physical security issues – other transport, assembly, and location-related risks
  • 18. August 5, 2015 Proprietary and Confidential - 18 - Real Life Scenario – the Approach  Identified risk mitigation actions – reduce the impact – reduce the likelihood – or allow early detection  Mitigation actions included – configuration documentation activities – inventory of parts – labeling wires and components – writing assembly scripts – testing connectivity – verifying that systems and applications start correctly – printing – verifying power supply
  • 19. August 5, 2015 Proprietary and Confidential - 19 - Real Life Scenario – the Approach  The proposed activities were focused on risk mitigation and quality and compliance objectives, not driven by a list of deliverables.  The last step was mapping the activities and documentation to applicable system lifecycle phases and deliverables.
  • 20. August 5, 2015 Proprietary and Confidential - 20 - Benefits  Clarity on how to manage risk  Effective Data Center Move Quality Plan  Mitigation to reduce potential operational, regulatory, and business risks  Quality Plan ensured that activities and documentation met applicable company standards  Management was able to evaluate real risks and actions  The approach did not cut corners and sacrifice quality, but increased quality and compliance  Avoided allocating costly resources to low-value tasks
  • 21. August 5, 2015 Proprietary and Confidential - 21 - Next Steps  Start with an overall strategy that takes into consideration short term and long term investments, risks, required controls, and benefits.  The plan and investment in a compliant environment must consider an evolutionary process which will allow the technology, controls, validation approaches, and training to be tested and refined.  Create a list of “risks” for your new environment. Identify which of the “risks” are:  True risks to the integrity, quality, reliability, or availability of the data  Compliance risks  Gaps from current expectations, but not risks
  • 22. August 5, 2015 Proprietary and Confidential - 22 - Next Steps  Adjust your Quality System, including system lifecycle and computer system validation policies, procedures, work instruction, guidelines, and templates to ensure that they can be followed when systems are implemented in a new environment.  Work with Compliance Subject Matter Experts to drive a true risk-based approach.  Work with your internal stakeholders to ensure that the approach is acceptable and defendable.  Follow Life Sciences industry trends with regard to utilizing new technologies in regulated environments. Monitor agency activities, statements, and regulatory actions in order to understand their interpretation and expectations.
  • 23. August 5, 2015 Proprietary and Confidential - 23 - Conclusion  Taking a fresh look at a risk-based approach to CSV would be very useful in dealing with today’s dynamics due to new technologies, software and service delivery models, and frequent organizational changes.
  • 24. August 5, 2015 Proprietary and Confidential - 24 - THANK YOU! www.igate.com For additional information or questions, please contact us by email arik.gorban@igate.com