Eres Annex 11 Eu GMP Siemens
Eres Annex 11 Eu GMP Siemens
Eres Annex 11 Eu GMP Siemens
Product Information
Electronic Records /
Electronic Signatures (ERES)
01/2017
A5E40688601-AA
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will be
used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property
damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions. Qualified
personnel are those who, based on their training and experience, are capable of identifying risks and avoiding
potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software described.
Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in
this publication is reviewed regularly and any necessary corrections are included in subsequent editions.
1 Introduction...................................................................................................................................................7
2 The Requirements in Short...........................................................................................................................9
3 Meeting the Requirements with SIMATIC IT eBR......................................................................................11
3.1 Lifecycle and Validation of Computerized Systems...............................................................11
3.2 Suppliers and Service Providers............................................................................................11
3.3 Data Integrity..........................................................................................................................11
3.4 Audit Trail...............................................................................................................................13
3.5 System Access, Identification Codes and Passwords...........................................................14
3.6 Electronic Signature...............................................................................................................17
4 Evaluation List for SIMATIC IT eBR...........................................................................................................19
4.1 Lifecycle and Validation of Computerized Systems...............................................................19
4.2 Suppliers and Service Providers............................................................................................21
4.3 Data Integrity..........................................................................................................................21
4.4 Audit Trail, Change Control Support......................................................................................23
4.5 System Access, Identification Codes and Passwords...........................................................24
4.6 Electronic Signature...............................................................................................................25
4.7 Open Systems........................................................................................................................27
Requirement Description
Lifecycle and Validation of Computerized systems used as a part of GMP-related activities must
Computerized Systems be validated. The validation process should be defined using a risk-
based approach. It should cover all relevant steps of the lifecycle and
must provide appropriate documented evidence.
The system's functionality should be traceable throughout the lifecycle
by being documented in specifications or a system description.
A formal change control procedure as well as an incident management
should be established. Periodic evaluation should confirm that the vali‐
dated state of the system is being maintained.
Suppliers and Service Provid‐ Since competency and reliability of suppliers and service providers are
ers considered key factors, the supplier assessment should be decided on
a risk-based approach. Formal agreements should exist between the
regulated user and these third parties, including clear responsibilities
of the third party.
Data Integrity Under the requirements of both regulations, electronic records and
electronic signatures must be as reliable and trustworthy as paper re‐
cords.
The system must provide the ability to discern altered records. Built-in
checks for the correct and secure handling of data should be provided
for manually entered data as well as for data being electronically ex‐
changed with other systems.
The system's ability to generate accurate and complete copies is es‐
sential for the use of the electronic records for regulated purposes, as
well as the accessibility, readability, and integrity of archived data
throughout the retention period.
Requirement Description
Audit Trail, Change Control Besides recording changes to the system as defined in the lifecycle,
Support both regulations require that changes on GMP-relevant data are being
recorded.
Such an audit trail should include information on the change (before /
after data), the identity of the operator, a time stamp, as well as the
reason for the change.
System Access, Identifica‐ Access to the system must be limited to authorized individuals. Attention
tion Codes and Passwords should be paid to password security. Changes on the configuration of
user access management should be recorded.
Periodic reviews should ensure the validity of identification codes. Pro‐
cedures should exist for recalling access rights if a person leaves and
for loss management.
Special consideration should be given to the use of devices that bear
or generate identification code or password information.
Electronic Signature Regulations consider electronic signatures being legally binding and
generally equivalent to handwritten signatures executed on paper.
Beyond requirements on identification codes and passwords as stated
above, electronic signatures must be unique to an individual. They must
be linked to their respective electronic record and not be copied or oth‐
erwise being altered.
Open Systems Open systems might require additional controls or measures to ensure
data integrity and confidentiality.
Data storage
All data is stored in an Oracle database. As described in the "Security recommendation
document" it is strongly recommended to activate the advanced security functionality during
installation of the database. Encryption of the database and the connection between server
and client will therefore be enabled.
It is also possible to link external data, such as pdf files containing material certificates, to a
data set. The responsibility for the integrity of all linked documents is in the regulated user.
Although SIMATIC IT eBR can support the user by individually identifying each attached file
and generating a checksum in order to detect any alteration to these documents. If an alteration
is detected, the system will notify the user and display an error message.
Archiving
SIMATIC IT eBR provides a configurable and scalable archiving function. Messages and
measured values are stored continuously to local SIMATIC IT eBR archives. These locally
stored data can be transferred automatically to long-term archives. Archived data can be
retrieved within the entire, configured retention period.
Data can also be moved from the archive database to the export database, which is being
used as an interface to third party archiving tools.
Audit trail
SIMATIC IT eBR supports the requirement for audit trail of GMP relevant operations by
recording such actions appropriately (who, what, when, and optionally why) and it provides
adequate system security for such electronic records (e.g. access control). The GMP relevant
data is defined by the regulated company based on the applicable regulatory requirements.
All audit trails can either be printed on paper or be exported in an electronical format.
Operator actions
All changes and inputs of relevant data entered by the operator during operation must be
recorded in an audit trail.
Therefore operator actions performed in SIMATIC IT eBR are being recorded in an audit trail
containing information like old value, new value, user ID, date and time stamp, operation and
optionally comments.
● Automatic Lock after a configurable idle time of the keyboard and mouse or if the application
is running during the idle time as a background task
● Log functions for actions related to access security, such as logon, manual and automatic
logoff, input of incorrect user ID or password, user put into not allowed status after several
attempts to enter an incorrect password, and password change by user
● Concurrent access in order to enter records is being prohibited by the System
SIMATIC IT eBR meets the requirements regarding access security in combination with
procedural controls, such as those for “specifying the responsibility and access authorization
of the system users”.
In addition, users must be assigned specific access rights at operating system level to prevent
unauthorized access to the directory structure of the SIMATIC IT eBR system programs and
unintended manipulation.
The electronic signature is being executed in a separate dialog in which the user has to sign
electronically by confirming the intended action with entering his password. Subsequently the
electronic signature is saved in the audit trail along with the user name, time stamp, and the
action performed. Also failed attempts to perform an electronic signature is saved in the audit
trail. A comment can be configured as optional or mandatory for each action.