FDA requires that all software in computer systems used in GxP activities be validated. The validation of computer system software is completely different from that of device software (embedded software). Verification is much more than testing. It is testing plus design control and configuration management.
How to plan and conduct a risk-based validation will be explained. The overall risk for a computer system is a combination of software complexity and product risk as determined by probability, severity, and detectability rankings. Also involved in the risk evaluation is the requirement for purchased software supplier qualification. You’ll learn how to integrate risk-based supplier evaluation into the validation process. The validation Master plan and System Validation Plans will be explained.
Testing, based on risk, includes requirements validation and IQ, OQ, and PQ. A procedure for each level of complexity and risk will be described.
WHY SHOULD YOU ATTEND?
The validation of computer system software is entirely different from that of device software (embedded software). Attempting to conduct a CSV following device software validation concepts could result in a 483 or rejection of a product approval submission.
LEARNING OBJECTIVES
- How to manage the validation process
- Validation life cycle models and Validation Plan contents
- How do you determine the complexity category of your system based on GAMP 5 principles
- How to evaluate risk level using GAMP 5 modifications the IS14971 procedure
- What level of testing is necessary based on software complexity and risk
- Integrating software supplier evaluation in the validation process
- What documentation is necessary
- How to minimize documentation reduces costs based on risk
- How to plan and conduct IQ, OQ, and PQ
WHO WILL BENEFIT?
- Computer system developers
- Systems development engineers
- Lab Managers and Analysts
- Production Managers
- Engineering managers
- Quality Assurance
- Regulatory Affairs
- Operations
- Engineers
- Quality Engineer
- QA/QC Professionals
- Engineering/Technical Service Professionals
- Consultants
- Operations and Manufacturing
- Compliance Professionals
The validation of computer system software is entirely different from that of device software (embedded software). Attempting to conduct a CSV following device software validation concepts could result in a 483 or rejection of a product approval submission.
- How to manage the validation process
- Validation life cycle models and Validation Plan contents
- How do you determine the complexity category of your system based on GAMP 5 principles
- How to evaluate risk level using GAMP 5 modifications the IS14971 procedure
- What level of testing is necessary based on software complexity and risk
- Integrating software supplier evaluation in the validation process
- What documentation is necessary
- How to minimize documentation reduces costs based on risk
- How to plan and conduct IQ, OQ, and PQ
- Computer system developers
- Systems development engineers
- Lab Managers and Analysts
- Production Managers
- Engineering managers
- Quality Assurance
- Regulatory Affairs
- Operations
- Engineers
- Quality Engineer
- QA/QC Professionals
- Engineering/Technical Service Professionals
- Consultants
- Operations and Manufacturing
- Compliance Professionals
Speaker Profile

Edwin Waldbusser, is a consultant retired from industry after 20 years in management of development of medical devices (5 patents). He has been consulting in the areas of design control, risk analysis and software validation for the past 8 years. Mr. Waldbusser has a BS in Mechanical Engineering and an MBA. He is a Lloyds of London certified ISO 9000 Lead Auditor and a member of the Thomson Reuters Expert Witness network.
Upcoming Webinars


EEO-1 Reporting Deadline is December 5, 2023 – Now is the t…

Conflict Resolution in a Remote Workplace

Strategic Interviewing & Selection: Getting the Right Talen…

Bootcamp for New Managers and Supervisors: Avoid These 7 Mi…

2-Hour Virtual Seminar on How to Conduct an Internal Harass…

Workplace Investigations 101: How to Conduct your Investiga…

Cleanroom, Microbiology and Sterility Assurance Practices f…

Wage And Hour Laws: Ensuring Compliance With The Fair Labor…

Successfully Negotiating the Labor Agreement

5 Key Components of Good Manufacturing Practices to obtain …

How to Manage Conflict in the Workplace

Understanding the incredible uses and fallbacks of ChatGPT

Neutralizing Harassment - How to Promote the Proactive Pers…

Changing Behavior: Why Rewards and Punishments Often Aren't…


Using Better Managerial Decision Making - to get great resu…

Hybrid Workplace: 10 Best Practices to Manage Your Team’s P…

Human Error Reduction Techniques for Floor Supervisors


Excel - Pivot Tables - The Key To Modern Data Analysis and …

Form W-9 Compliance to Avoid Penalties: TIN Verification, B…

Using Stay Interviews To Improve Employee Retention & Engag…

Using High-Performance Coaching for Managers to Address Per…



FDA Audit Best Practices - Do's and Don'ts

FDA Technology Modernization Action Plan (TMAP) and Impact …

Become an excellent Critical Thinker to greatly improve you…

Stay Interviews: A Powerful and Low-Cost Employee Engagemen…


Learn the Do's and Don'ts of Opening Business Bank Accounts

Project Management for HR, Administrative Professionals, an…

Writing Effective 483 and Warning Letter Responses