Computer Systems Validation (CSV) – 3-Day Virtual Boot Camp (Professional Certification Program)
Carolyn Troiano
2020
We have used our real-world experience to design a computer system validation course that not only meets FDA, ICH, and Eudralex expectations for risk-based validation, but also prepares you to implement these practices in your company. The standard operating procedures and validation templates used in class have already been proven at other companies.
We are focused on your comprehension and application of the CSV techniques that will result in efficient, effective, and inspection-ready validation initiatives.ICT133
Exercises: Independent Study
The following exercises will be included in the course content and can be completed at each attendee’s discretion. If completed before the end of the Boot Camp, the attendee may ask questions during any Q&A session. If completed after the Boot Camp, the attendee may ask questions via Compliance Trainings and a response will be sent as quickly as possible. Note that both questions and answers are provided for each exercise.
Exercise 1: Exploring the Regulations using the fda.gov website
Exercise 2: FDA Guidance for ER/ES
Exercise 3: Validation Master Plan (VMP) Writing
Exercise 4: Interviews and URS/FRS Writing
Exercise 5: IQ, OQ, PQ Test Protocol Writing
Exercise 6: RTM Writing
Exercise 7: VSR Writing
Exercise 8: Be the Consultant – Example of a Data Integrity Audit by FDA at a pharmaceutical manufacturer
CSV Final Exam: Completed at the discretion of the attendee. Note that both questions and answers are provided for each exercise. (100 Questions/Answers)
Electronic records and electronic signatures (ER/ES) came into play through guidelines established by FDA in 1997, and disseminated through 21 CFR Part 11. This code describes the basic requirements for validating and documenting ER/ES capability in systems used in an FDA-regulated environment.
In the early 2000s, FDA recognized they could not inspect every computer system at every regulated company and placed the onus on industry to begin assessing all regulated computer systems based on risk. The level of potential risk, should the system fail to operate properly, needed to be the basis for each company’s approach to developing a validation approach and rationale as part of the planning process. System size, complexity, business criticality, GAMP 5 category and risk rating are the five key components for determining the scope and robustness of testing required to ensure data integrity and product safety.
FDA’s recent focus on data integrity during computer system validation inspections and audits has brought this issue to the forefront of importance for compliance of systems used in regulated industries. These include all systems that “touch” product, meaning they are used to create, collect, analyze, manage, transfer and report data regulated by FDA. All structured data, including databases, and unstructured data, including documents, spreadsheets, presentations, and image files, audio and video files, amongst others, must be managed and maintained with integrity throughout their entire life cycle.
We will explore the best practices and strategic approach for evaluating computer systems used in the conduct FDA-regulated activities and determining the level of potential risk, should they fail, on data integrity, process and product quality, and consumer/patient safety. We will walk through the System Development Life Cycle (SDLC) approach to validation, based on risk assessment, and will also discuss 21 CFR Part 11 and the importance of managing electronic records and signatures appropriately.
We will also walk through the entire set of essential policies and procedures, as well as other supporting documentation and activities that must be developed and followed to ensure compliance. We will provide an overview of practices to prepare for an FDA inspection, and will also touch on the importance of auditing vendors of computer system hardware, software, tools and utilities, and services.
Finally, we will provide an overview of industry best practices, with a focus on data integrity and risk assessment that can be leveraged to assist in all your GxP work.
– Discuss the Computer System Validation (CSV) approach based on FDA requirements
– Learn about the System Development Life Cycle (SDLC) approach to validation
– Understand how to comply with key FDA and international CSV regulations and guidance, such as 21 CFR Part 11 and Annex 11
– The purpose and content of each validation deliverable, including the Validation Plan, Requirements Specification, Test Plan, Validation Tests (IQ, OQ, PQ), Requirements Traceability Matrix, Test Summary, and Validation Report, etc.
– Comprehend the risk-based validation techniques and how to leverage these techniques to create efficient yet compliant validation approaches
– Learn appropriate validation strategies for many types of applications, including Cloud/SaaS, COTS, spreadsheets, and custom developed systems
– Become aware of best-practices and inspector expectations for computer system validation and software quality assurance (SQA) programs
– Discuss the best practices for documenting computer system validation efforts, including requirements, design, development, testing and operational maintenance procedures
– Understand how to maintain a system in a validated state through the system’s entire life cycle
– Learn how to assure the integrity of data that supports GxP work
– Discuss the importance of “GxP” documentation that complies with FDA requirements
– Learn about the policies and procedures needed to support your validation process and ongoing maintenance of your systems in a validated state
– Understand the key components of 21 CFR Part 11 compliance for electronic records and signatures
– Know the regulatory influences that lead to FDA’s current thinking at any given time
– Learn how to conduct a risk assessment on computer systems that will provide the basis for developing a validation rationale
– Understand the need to include an assessment of a computer system’s size, complexity, business criticality, GAMP 5 category and risk, should it fail, to develop a cohesive and comprehensive validation rationale
– Learn how to best prepare for an FDA inspection or audit of a GxP computer system
– Understand the importance of performing a thorough vendor audit to ensure oversight to the products and services they deliver
– Finally, understand the industry best practices that will enable you to optimize your approach to validation and compliance, based on risk assessment, to ensure data integrity is maintained throughout the entire data life cycle
– Interactive Q&A Session
– Manage or participate on computer system projects requiring validation
– Create or approve CSV project deliverables, such as requirements documents, validation protocols (IQ, OQ, PQ), Test Plans, and Test Reports.
– Understand the process of computer system validation
– Author, implement, or upgrade CSV policies and procedures that utilize a risk-based approach to meeting the latest regulatory expectations
– Understand the FDA and international regulatory landscape around CSV
This webinar is intended for those involved in planning, execution and support of computer system validation activities, working in the FDA-regulated industries, including pharmaceutical, medical device, biologics, tobacco and tobacco-related products (e-liquids, e-cigarettes, pouch tobacco, cigars, etc.). Functions that are applicable include research and development, manufacturing, Quality Control, distribution, clinical testing and management, sample labeling, adverse events management and post-marketing surveillance.
Examples of who will benefit from this webinar include:
– Information Technology Analysts
– Information Technology Developers and Testers
– QC/QA Managers and Analysts
– Analytical Chemists
– Compliance and Audit Managers
– Laboratory Managers
– Automation Analysts
– Manufacturing Specialists and Managers
– Supply Chain Specialists and Managers
– Regulatory Affairs Specialists
– Regulatory Submissions Specialists
– Clinical Data Analysts
– Clinical Data Managers
– Clinical Trial Sponsors
– Computer System Validation Specialists
– GMP Training Specialists
– Business Stakeholders/Subject Matter Experts
– Business System/Application Testers
This webinar will also benefit any vendors and consultants working in the life sciences industry who are involved in computer system implementation, validation and compliance.

Carolyn Troiano
CSV Consultant
During her career, Carolyn worked directly, or on a consulting basis, for many of the larger pharmaceutical companies in the US and Europe. She developed validation programs and strategies back in the mid-1980s, when the first FDA guidebook was published on the subject, and collaborated with FDA and other industry representatives on 21 CFR Part 11, the FDA’s electronic record/electronic signature regulation.
Carolyn has participated in industry conferences. She is currently active in the PMI, AITP, and RichTech, and volunteers for the PMI’s Educational Fund as a project management instructor for non-profit organizations.
Your registration for the seminar is subject to following terms and conditions. If you need any clarification before registering for this seminar please call us at +91-80-4170-0521 or email us at info@compliancetrainings.in
Payment Policy:
Payment using Credit/Debit Card: Payment is required to be made at least 3 business days prior to the date of the conference. We accept American Express, Visa and MasterCard.
Payment via Bank Transfer: Registrations by Wire transfers are required to be made at least 5 business days before the date of the conference. Payments to be made in full.
Payment by Check: Registrations by Check payments are required to be made at least 10 days before the date of the conference. Your check needs to be cleared before your registration is confirmed. Payments to be made in full. Post-dated checks shall not be accepted.
Customer Support: +91-80-4170-0521
Email: info@compliancetrainings.in
Substitution Policy:
If a registered delegate is unable to attend, substitutions can be made at any time at the prevailing rate. However, it has to be confirmed a day prior, in writing with proper identification of the substitute person you plan to send on your behalf. No show will be charged the complete amount.
On-the-spot Registration:
We discourage onsite registrations, however, if you wish to register onsite, payment to happen through credit card immediately. Conference material will be given on the spot if it is available after distributing to attendees registered in advance. In case it is not available, we will send the material after the conference is over.
Cancellation & Refund Policy:
Written cancellations through email (from the person who has registered for this conference) received at least 10 calendar days prior to the start date of the event will receive a refund – minus a 20% administration fee. No cancellations will be accepted – nor refunds issued – within 10 calendar days before the start date of the event.
On request by email (before the seminar) a credit for the amount paid minus administration fees could be transferred to any future Compliance Trainings event and a credit note will be issued.
Substitutions may be made at any time. No-shows will be charged the full amount.
Compliance Trainings reserves the right to change/modify some topics, material or speakers/instructors without notice.
If an event dates and/or venue is changed/cancelled, registrants are required to opt for alternate dates and/or venue provided by Compliance Trainings.
If an event is cancelled altogether, without alternate dates or venue, Compliance Trainings will issue a full refund.
Compliance Trainings will not be responsible for travel/accommodation or any other costs incurred due to changes/cancellation.
Compliance Trainings reserves the right to change event/seminar dates, venues or cancel altogether. Registrants will be notified by Compliance Trainings in writing as soon as possible.
Compliance Trainings will not be responsible for travel/accommodation or any other costs incurred due to changes/cancellation.
Conference photograph / video:
By registering and attending Compliance Trainings conference, you agree to have your photographs or videos taken at the conference venue and you do not have any objections to Compliance Trainings using these photos and videos for marketing, archiving or any other conference related activities. You agree to release Compliance Trainings from any kind of claims arising out the use of the photographs, including without limitation all claims for compensation, libel, invasion of privacy or violation of copyright ownership.