The following are four steps an inspector should follow to
conduct a successful data integrity audit.
1. Preparing for the inspection
The target for data integrity inspection is to find, should it
exist, data or relevant metadata that may not be apparent to those involved in
the final product disposition decision.
This includes data that has been deleted, reprocessed, injected
as test/trial samples, or resides outside of the review during the final batch
disposition. Using a term borrowed from the technology sector, such data is
referred to as “orphan data.”
A good strategy in preparing for the inspection is to identify
the intersection of “opportunity” and “motivation.” Opportunities that can
allow for breaches in data integrity should be identified review of existing
system controls and requirements designed to prevent and preclude such issues.
Examples of these types of controls include access control, data
management across the data lifecycle, management controls, and definition of
file structure. The latter, plus file naming conventions, are central to data
integrity and must be understood for each system prior to initiation of the
audit.
Motivations to breach data integrity tenets come in a variety of
forms. Broad motivations can result from the firm’s culture, e.g., pressure
from management for fast results or competitive pressure from coworkers.
It’s also not uncommon for the basic foundation of product
manufacturing to lack vigor. For example, many data integrity issues have been
found rooted in inadequate methods that often trace back to poor development
and method transfer.
Identifying and recognizing these potential inadequacies allows auditors to target the audit on a high risk dataset. Good starting places for high risk targets are OOS and stability systems. Look for products with high rates of OOS, particularly those that go to phase II investigations and those which do not conclude in definitive lab error.
Also, recognize highly restrictive stability specifications which may prove to be a challenge for the expiry period established. Once the opportunities have been identified, select a broad dataset over a predetermined timeframe, and subsequently, trace all data generated from the beginning to final reporting. If data integrity breaches exist, this strategy provides the highest probability of finding the breach.
![]() |
Data Integrity App |
2. Executing the inspection
Execution of the inspection is the most important aspect of the
process. Conduct the audit in the most professional manner possible but
remember to facilitate a comfortable environment for those being audited.
Otherwise, they may not feel comfortable providing full disclosure.
The first step after entering the department or area under audit
is to identify the employee hierarchy. Although management should be involved
in the inspection, the majority of time should be spent with frontline
employees.
Look out for managers attempting to provide responses to certain
inspectional questions on behalf of frontline employees. If this becomes an
issue during an inspection, politely request that the employees in question be
given appropriate time to answer the questions pertaining to their work
responsibilities.
By relying on management to provide critical data, the goal of
obtaining the full story may not be achieved since managers may be several
layers removed from the specific process being reviewed.
An inspector must receive complete information in the limited
time provided so that a significant amount of data can be collected and
multiple systems covered. One way to maximize the amount of data collected? By
facilitating an environment of openness during the inspection.
Another strategy involves focusing on those processes which
could most affect the quality of the product or results. This can be identified
relatively quickly through reviewing process flowcharts, identifying critical
process parameters, listing test methods, and/or examining SOPs.
Additionally, the flexibility to change course is critical. It’s
not unheard of during the initial walk-through for an audit team to get a
feeling something is not quite right with a particular operation.
Summary reports are critical to identifying potential trends; however, they should not be solely relied upon to assess the acceptability of any given system. Still, it is critical to review the raw data whenever possible because this is where the most critical cGMP operations take place.
For example, a review of a summary report for all OOS investigations should be used to identify trends and select individual investigations for further review. Once the individual investigations have been received, it is critical to follow the investigation to its source—such as a certain sample set within a specific HPLC system.
It is important to understand the chain of events beginning with the running of a sample set to initiation of an OOS investigation, and, finally, the compilation of a summary report. If any piece of this chain is missing, it introduces a gap in the ability to draw conclusions regarding the department’s adherence to cGMP requirements.
When significant
discrepancies are uncovered, do not criticize the responsible employees or
managers, instead gather as much information as possible without placing
judgment. If excessive workloads led to timesaving non-cGMP practices,
empathize with the frontline employees. After all, this additional root cause
information provides upper management not only with an outline of the problems,
but also potential solutions.
A key component to an audit includes the collection of evidence when objectionable conditions are identified. Often, further investigations will be initiated by persons not directly involved in the audit.
The quality of any resulting investigations, therefore, will often depend on the evidence collected when the issue was first uncovered, e.g., photographs, photocopies, printouts, or electronic copies on removable media.
Evidence also includes information provided verbally by responsible employees. As in a court of law, information provided directly from responsible employees is considered more reliable than hearsay. Again, interviews should not be conducted in a manner that blames on any one person or group of persons responsible for certain objectionable actions or processes, as this limits the ability of the inspection team to gather relevant information and hinders subsequent investigations.
3. Concluding the inspection
When concluding the inspection, document objectionable
conditions found in data integrity controls, oversight and governance, and
outcomes. As previously mentioned, when data integrity breaches are not found,
it cannot be definitively concluded that such breaches do not exist due the
fact that 100% verification is logically impossible.
If conditions exist that show potential opportunities for data integrity breaches
due to inadequate controls and/or inappropriate motivation, then these
conditions should be identified based upon the facts observed. The existence of
such conditions could also be a basis for extending or refocusing the audit to
ensure the evaluation is adequate.
When it comes to orphan data, annotate all findings related to
its discovery, keeping in mind that as the saying goes “absence of evidence is
not evidence of absence.”
If orphan data is found, indicate the type and conditions that
allowed for the existence of such orphan data to occur such as “deleted data as
a result of unrestricted authorizations to modify data,” or “data residing in
electronic system, unreported and undiscovered due to lack of consistent file
naming conventions and review of data in electronic system.”
4. Rectifying the Issues
The existence and impact of orphan data and impact thereof must
be addressed to include the evaluation of such data for OOS results.
Additionally, further action may include reporting through the Field Alert
Reporting (FAR) system or Biological Process Deviation Report (BPDR) and/or recall
assessment.
Retrospective assessment of broader datasets may be appropriate
when conditions are found that allow for additional orphan data; any new orphan
data will need to be evaluated as described above.
Once the data assessment is complete, corrective and
preventative action planning should commence to include consideration for
interim controls. These may be necessary when the longer term technological
solutions leave areas for substantial risk.
Interim controls can include activities such as additional
periodic review of datasets, “four” eyes principals for systems without
adequate audit trails, or review of all reprocessing and/or manual integration
when integration parameters are not adequately controlled by the system.
CAPAs to remediate issues and improve the overall controls of
the systems, interfaces, and oversight should be carefully planned.
Verification of CAPAs is recommended to evaluate effectiveness post
implementation. Mangers should also govern and monitor CAPA plans to ensure
adequate progress and risk management.
A data integrity improvement map is also a useful tool to
illustrate the progression of improvements and controls over the course of
time. Such a tool is helpful to ensure that the full landscape is considered
and carefully managed, and can include the following information for different
points on the timeline: description of controls, limitations, immediate
mitigations, interim controls, planned next steps, and timing.
While data integrity auditing is not easy, it is essential in
the industry’s regulated environment. Every decision in the GxP space rests on
the reliability of data generated. Inspecting of this high risk asset is
critical to business viability, continuity, and competitive advantage.
“Trust but Verify “ Ronald Reagan
Across the internet, there are millions of resources are available which provide information about Everything.
If you found all content under one roof then it will save your time, effort & you will more concentrated on your important activity.
![]() |
Data Integrity App |
Our Data integrity app will helpful for understanding what Data integrity & CSV really means & How 21 CFR Part 11, EU Annex 11 & other regulatory guidelines affects in pharmaceutical Industry.
- Basic Data Integrity Concepts
- ERES & Its Requirement
- CSV & Its best practices
- Mock Inspection and General Q&A
- Checklist for inspection
- Inspection Readiness
- Useful SOP’s
- Stay Regulatory Compliant.
“Stay One Step Ahead in Pharma IT Compliance”
https://play.google.com/store/apps/details?id=com.innovativeapps.dataintegrity
Try our "Data Integrity" app which helps you to better understand current regulatory agencies thinking on Data Integrity & CSV.
Comments
Post a Comment