Regulatory compliance with Agilent ICP-MS MassHunter and OpenLAB Server

GLP, GMP, 21CFR Part 11, Part11, Part 11, digital records, esignatures, erecords, lab records, regulatory, regulations

Regulatory compliance with Agilent ICP-MS MassHunter and ...

Printed in the USA, March 3, 2021. 5991-2593EN. System requirements. Agilent OpenLab Server and ECM XT are server-based products that are scalable from ...

ICP-MS-5991-2593EN-openlab whitepaper

安捷伦元素杂质分析工具 | Agilent

ICP-MS-5991-2593EN-openlab whitepaper
White Paper
Meeting Regulatory Compliance Guidelines with Agilent ICP-MS MassHunter and OpenLab Server or ECM XT
Overview
The United States Pharmacopoeia (USP) and the International Council for Harmonisation of Technical Requirements for Pharmaceuticals for Human Use (ICH) are responsible for developing new standards to test for inorganic (elemental) impurities in pharmaceutical products and ingredients: USP General Chapters <232> (Elemental Impurities ­ Limits) and <233> (Elemental Impurities ­ Procedures) and ICH-Q3D were finalized in February 2017 and implemented on 1st January 2018. These guidelines specify maximum daily dose limits for the 24 elements listed in Table 1. ICP-OES and ICP-MS are the reference instrumental techniques for the analysis of Elemental Impurities. ICP-MS is the more suitable technique for analysis of drug products and materials intended for parenteral or inhalational administration, due to the lower regulated limits in such samples.

Table 1. USP <232> and ICH Q3D analytes and permitted daily exposure (PDE) limits for drugs intended for oral administration. PDEs for drugs intended for parenteral or inhalational administration are significantly lower than those for oral drugs. February 2017 final revision.

ICH/USP Class Class 1 Class 2A
Class 2B Class 3

Element
Cd Pb As (inorganic) Hg (inorganic) Co V Ni Tl Au Pd Ir Os Rh Ru Se Ag Pt Li Sb Ba Mo Cu Sn Cr

Oral PDE (g/day) 5 5 15 30 50 100 200 8 100 100 100 100 100 100 150 150 100 550 1200 1400 3000 3000 6000 11000

Apart from basic research and drug discovery, all stages of pharmaceutical product development, from pre-clinical assessment to manufacturing Quality Control, are subject to GxP guidelines. These include regulations for electronic data management as defined in Part 11 in Title 21 of the US Food and Drug Administration's Code of Federal Regulations (21 CFR Part 11), the European equivalent (EU Annex 11), PIC/S GMPs, China GMP and the chapter on computer systems of the Brazilian GMP. The purpose of these regulations is to ensure the security, integrity and traceability of electronic records, which includes data, analytical reports and other records (such as daily performance checks) associated with the operation of an analytical instrument.

Compliance Overview Regulatory compliance is a key aspect of an analytical laboratory's operation in many industries, such as for pharmaceutical manufacturers, where the principles of good manufacturing practice (GMP) apply. The four components of compliance related to analytical instruments are:
­ Design qualification (DQ), manufacturing quality control, lifecycle management and documentation, and installation and operational qualification (IQ/OQ) for analytical instruments and their software
­ Control of user access to the workstation for instrument control and data processing (restricted user logon access with password protection)
­ Electronic records security, integrity and traceability (secure storage, file versioning, audit trail, electronic signatures, and archive/retrieval)
­ Control of system operation, performance verification (PQ), physical access to the laboratory and associated equipment, Standard Operating Procedures, training and records
Compliance for Agilent ICP-MS Systems The first of these compliance components must be demonstrated through the manufacturing quality records and equipment validation certification of the instrument manufacturer. In the case of software, this means that the instrument manufacturer must be able to provide a Declaration of Product Validation, to confirm that their software supports user requirements for certification under 21 CFR 58 (Good Laboratory Practice), 21 CFR 210 (Good Manufacturing Practice for Drugs), or 21 CFR 211 (current Good Manufacturing Practice for finished pharmaceuticals).
Once analytical equipment is delivered to the laboratory, further qualification checks must be made to ensure that the products function as defined by the manufacturer. These IQ/ OQ services should encompass the instrument hardware and all the software required to operate it, and are typically performed by the manufacturer. Further performance checks are typically performed using the methods and samples that will be analyzed routinely, to confirm that system performance meets analytical requirements.
The fourth component requires that the laboratory manager and administrator set up the appropriate controls on laboratory access, and ensure that system suitability tests (SST) and standard operating procedures (SOP) are documented and followed.

2

The remaining two components--system logon access and management of electronic records--are typically addressed by software packages which control and monitor user access to the workstation, and provide an integrated system for handling the data and other electronic records generated during the laboratory's activities. These checks are designed to ensure data integrity and are summarized in the ALCOA+ principles, which apply to any records created under GMP controls. ALCOA refers to the fact that records should be Attributable, Legible, Contemporaneous, Original, and Accurate, while the Plus (ALCOA+) adds Complete, Consistent, Enduring, and Available.

In addition to storing data from ICP-MS, OpenLab Server/ ECM XT stores data from instruments controlled by OpenLab CDS. These instrument types can include Agilent and nonAgilent LCs and GCs and Agilent GC/MS and LC/MS single quadrupole systems. ECM XT can also store and manage data from non Agilent data systems. OpenLab Server/ECM XT can manage data from up to 100 instruments.
In combination with an overall laboratory compliance plan, an ICP-MS MassHunter system with OpenLab Server/ECM XT provides all the technical controls needed to meet 21 CFR Part 11 and Annex 11 requirements.

ICP-MS MassHunter

User Access Control using OLSS

OpenLab Server or ECM XT

+

+

Application software controls the instrument for
data acquisition and (re) processing

UAC/OLSS provides security with configurable, multi-level,
password protected user profiles. Records user logon/ log-off and actions in audit
trail

Securely stores data files, methods, tune, and PDF reports created by ICP-MS
MassHunter workstations. Easy data search and retrieval.

Figure 1. Components for compliant operation with ICP-MS MassHunter, User Access Control/OLSS, and OpenLab Server/ECM XT.

OpenLab Server and ECM XT
OpenLab Server and ECM XT are two closely-related networked solutions for compliant storage of electronic records associated with elemental impurities analysis data acquired with Agilent's ICPMS MassHunter system. ICP-MS MassHunter is the software that controls Agilent's ICP-MS and ICP-QQQ instruments. OpenLab Server and ECM XT share the same core program components and functionality. ECM XT adds support for non-Agilent data systems and provides extended and automated functionality for data reporting and archival. Either version is suitable for integration with supported Agilent ICP-MS MassHunter data systems.
The link between ICP-MS MassHunter and the secure data storage system is configured and activated using ICP-MS MassHunter's optional User Access Control (UAC) module. UAC adds user management and audit trail functionality of OpenLab Shared Services (OLSS).

OpenLAB Server/ECM XT integrates with ICP-MS MassHunter with the optional UAC module with OLSS functionality. Once OpenLab Server or ECM XT is configured and activated, all ICP-MS data and reports are stored during the analytical run in a secure data repository, automatically, without user intervention. Any controlled records generated in ICP-MS MassHunter software--tune reports, methods, batches, data files, and pdf reports are automatically transferred to the OpenLab Server/ECM XT database.
OpenLab Server/ECM XT is part of an industry-leading suite of software products designed to integrate and manage scientific information throughout its lifecycle, across the laboratory and the enterprise. OpenLab Server/ECM XT provides an ideal compliance solution for medium-sized and expanding laboratories and for laboratories that want to secure electronic records from more than one supported instrument. Agilent also offers ICP-MS compliance solutions that are suitable for single-instrument installations (SDA) and global enterprise level organizations (OpenLab ECM).
3

System overview
The components needed for compliant operation of Agilent ICP-MS instruments with OpenLab Server include: ICP-MS MassHunter software, MassHunter User Access Control (UAC) with OpenLab Shared Services (OLSS), and OpenLab Server or OpenLab ECM/XT. Figure 1 illustrates how the components integrate to provide a complete solution.
Integration with OpenLab Server/ECM XT retains the standard ICP-MS MassHunter user interface, so routine operation is not affected, apart from the addition of e-signature capability. The familiar interface also allows data to be easily viewed and downloaded for approval or reprocessing. All raw data, results, methods and reports are kept together, enabling simple access to the original results for auditing throughout the retention period.
Controlled access and audit trail
A key aspect of electronic records management is control of who is able to access the application software, and what actions they are permitted to perform. For Agilent's ICP-MS MassHunter, this control is provided by the UAC module working with OLSS.
Users login to ICP-MS MassHunter with a unique username and password. Multi-level user access rights and audit trail settings that define the functions users can perform are configured by the Laboratory Administrator. An Audit Trail Map (ATM), defined in OLSS, ensures that each user, or group, is assigned to a role that allows only the actions permitted according to their job and training. Each action can also be setup to require user validation by password and reason, and all actions are included in the audit trail. Default ATM settings suitable for a typical laboratory environment are predefined.
As shown in Figure 2, control of user access to the ICP-MS MassHunter workstation and recording of application and workstation audit trails is performed by the ICP-MS MassHunter UAC/OLSS. Users log-on to the ICP-MS MassHunter Workstation and operate the ICP-MS MassHunter software in exactly the same way as a standalone system, within their level of user access rights.

Figure 2. Control of user access to the ICP-MS MassHunter workstation, and recording of application and workstation audit trails are performed by the ICP-MS MassHunter UAC software with OLSS.
Finding and retrieving data Data uploaded to OpenLab Server/ECM XT is securely stored on a suitable server with RAID 1 or RAID 5 architecture (see system requirements on page 12). Data stored on OpenLab Server/ECM XT is easy to find and retrieve using keyword searching (Figure 3). Records uploaded to OpenLab Server/ ECM XT are automatically indexed so individual records or results can be found easily. Query items such as analyst name, sample acquisition date, and instrument name can be used to find and retrieve individual sample results, or all records for an entire batch. Database setup and administration is performed through OpenLab Server/ECM XT Control Panel.

Figure 3. OpenLab Server file retrieval using Advanced Search functions. 4

Meeting the Regulatory Requirements of 21 CFR Part 11 with the Agilent ICP-MS MassHunter software and OpenLab Server or ECM XT
The following tables describe how an ICP-MS MassHunter system with UAC/OLSS and OpenLab Server or ECM XT enables laboratories to meet the requirements set forth in 21 CFR Part 11, EU Annex 11 and other related regulations and guidelines.

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

1. Validation
Part 11 11.10(a) and all other regulations

1.1 Is the system validated to ensure

Yes

accuracy, reliability, consistent intended

performance, and the ability to discern invalid

or altered records?

Annex 11

1.2 Is infrastructure qualified?

N/A

Principle B;

Brazil GMP 577

2. Accurate Copies and Secure Retention and Retrieval of Records

Part 11.10(b)

2.1 Is the system capable of generating

Yes

accurate and complete copies of records in

both human readable and electronic form

suitable for inspection, review, and copying by

the FDA?

Annex 11.8.1; Brazil GMP 583

2.2 Is it possible to obtain clear printed

Yes

copies of electronically stored e-records?

Brazil 585.2
Part 11.10(c): China GMP 163
Annex 11.17 Annex 11.17
Annex 11.7.1; Brazil GMP 584

2.3 Are there controls to make sure that the Yes data backup, retrieving and maintenance process is duly carried out?
2.4 Does the system protect records to enable Yes their accurate and ready retrieval throughout the records retention period?

2.5 Are data checked during the archiving

N/A

period for accessibility, readability and

integrity?

2.6 If relevant changes are made to the

Yes

system (e.g. computer equipment or

programs), is then the ability to retrieve the

data ensured and tested?

2.7 Are data secured by both physical and

Yes

electronic means against damage?

Agilent has extensively validated the performance of its systems, including ICPMS MassHunter and OpenLab Server/ECM XT, with tests written specifically to evaluate accuracy, reliability and consistent performance. OpenLab Server/ECM XT maintains revisions of files as they are modified or altered. The solution also records any and all changes made to the system through computer generated audit trails. Agilent recommends making use of Installation Qualification and Operation Qualification (IQ/OQ) service to validate the on-site system.
User responsibility.
Raw data, metadata and result data generated by ICP-MS MassHunter software are stored and managed in OpenLab Server/ECM XT. The result set that holds all this information can be loaded at any time to the hard disk of a client PC as a copy of the original data for review. ICP-MS MassHunter software is required to read the electronic format. ICP-MS MassHunter reports (e.g. tuning reports and concentration data reports), representing the human-readable form of electronic records, can be stored as PDF files which can be printed or made available for review with a PDF viewer without the source application installed on the client machine. These reports can include all data and audit trails.
ICP-MS MassHunter software is required to read the electronic format files. ICP-MS MassHunter reports (e.g. tuning reports and concentration data reports) representing the human-readable form of electronic records can be stored as PDF files which can be printed or made available for review with a PDF viewer without the source application installed on the client machine. These reports can include all data and audit trails.
ICP-MS MassHunter combined with User Access Control/OLSS software and OpenLab Server/ECM XT has the capability to backup and retrieve electronic records. It is the user responsibility to ensure such processes are carried out in compliance with the user organization's policy
When the compliance software is activated, all regulated, process-related records are automatically stored in the secure OpenLab Server/ECM XT database. Data secured within the database resides on a protected server. Regardless of the physical location of the data, it remains searchable and retrievable to all users with appropriate privileges.
Functions to check stored data periodically are provided, but using them is the user responsibility.
Revised software is tested for consistent operation and backward compatibility prior to release. Following installation of a new or updated revision, system revalidation can be offered as a service delivered by Agilent.
OpenLab Server/ECM XT provides security for electronic records to protect against accidental or malicious damage, and the remote storage (on the server) provides some physical protection. Physical protection of the server (and lab PC), data backup and archival processes are the responsibility of the user organization.

5

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

Clinical Computer Guide F2; FDA Q&As

2.8 Are there controls implemented that allow Yes the reconstruction of the electronic source/ raw documentation for FDA's review of the (clinical) study and laboratory test results?

Clinical Computer Guide F2; FDA Q&As

2.9 Does the information provided to FDA

N/A

fully describe and explain how source/raw

data were obtained and managed, and how

electronic records were used to capture data?

Annex 11.7.1; China GMP 163; Brazil GMP 585; Part 211, 68 b

2.10 Does the system allow performing

Yes

regular back-ups of all relevant data?

Annex 11.7.2; China GMP 163; Brazil GMP 585; Part 211, 68 b

2.11 Is the integrity and accuracy of backup N/A data and the ability to restore the data checked during validation and monitored periodically?

Clinical Computer Guide E 2.12 Are procedures and controls put in place Yes to prevent the altering, browsing, querying, or reporting of data via external software applications that do not enter through the protective system software?

Clinical Computer Guide F 2.13 Are there controls implemented to

Yes

prevent, detect, and mitigate effects of

computer viruses, worms, or other potentially

harmful software code on study data and

software?

3. Authorized Access to Systems, Functions, and Data

Part 11.10(d); China GMP 183 163; Brazil GMP 579; ICH Q7.5.43

3.1 Is system access limited to authorized

Yes

persons?

Several Warning Letters

3.2 Is each user clearly identified, e.g., through Yes their own user ID and Password?

Clinical Computer Guide 4 3.3 Are there controls to maintain a

Yes

cumulative record that indicates, for any point

in time, the names of authorized personnel,

their titles, and a description of their access

privileges?

4. Electronic Audit Trail

Part 11.10(e); China GMP 163

4.1 Is there a secure, computer-generated,

Yes

time-stamped audit trail to independently

record the date and time of operator entries

and actions that create, modify, or delete

electronic records?

FDA 21 CFF 58.130 e;

4.2 Does the audit trail record who has made Yes

Clinical Computer Guide 2; which changes, when and why?

Clinical Source Data 3

The functionality of the electronic records version control and the change information contained in the audit trail files allow the reconstruction of the original electronic record information.
This information is available from the system, but providing it to the FDA is a user responsibility.
Tools to support regular backup are provided, but implementation of a data backup system (beyond the remote storage of e-records in the OpenLAB Server system) is the responsibility of the user organization. Management (e.g. backup scheduling) is also the responsibility of the user organization. Functions to check backed up and restored data are provided, but using them is the user responsibility.
Data is not visible or editable from the lab PC without going through the protective system software. The data viewer of OpenLab Server/ECM XT is also protected via the OpenLab client logon.
Agilent has implemented controls designed to keep malicious code from being introduced into a regulated customer's systems via any software purchased from Agilent. Physical protection of the computer system from malware (e.g. preventing direct internet connection, and the connection of infected removable storage devices) is the responsibility of the user organization.
All workstation, file and software functionality access is controlled by privileges and roles assigned to individual users or groups of users. The system administrator assigns the appropriate level of access to the authorized users or groups. Each user is identified by a unique user ID and password combination. Access to the ICP-MS MassHunter workstation, ICP-MS MassHunter application software, and OpenLab Server/ECM XT requires entry of these unique identification components: user ID and password. The system uses a user ID and password combination unique to each user in its electronic signature capability. User IDs are required to be unique and must not be reused or reassigned to another individual. This is the responsibility of the organization that implements and uses the system. OLSS User Management and Windows User Account Management functionality includes this information. Maintenance of a cumulative record would be the responsibility of the user organization.
All actions related to creating, modifying or deleting electronic records are recorded in a secure, computer-generated, time-stamped audit trail. The audit trail lists all modifications, date and time of the change, the user ID and reason for the change, if applicable. Entries in the audit trails cannot be switched off, altered or deleted by any user. ICP-MS MassHunter UAC/OLSS software automatically generates time-stamped audit trails as a part of electronic records to maintain a complete and accurate history of acquisition and analysis operations. OpenLab Server/ECM XT secures the MassHunter audit trails; in addition it also generates audit trails for any updates on ICP-MS batches. The audit trail entries contain the name of the user, the date and time, and the reason associated with the signing (if the audit trail map settings specify that a reason is required for the action that triggered the audit trail entry).

6

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

Annex 11, 8.2

4.3 Can the system generate printouts

Yes

indicating if any of the e-records has been

changed since the original entry?

FDA GMP Part 211.194 8b 4.4 Does the audit trail include any

Yes

modifications of an established method

employed in testing?

FDA GMP Part 211.194 8b 4.5 Do such records include the reason for the Yes modification?

FDA Warning Letter

4.6 Is the audit trail function configured to be Yes always on and can it not be switched off by system users?

Annex 11, 9

4.7 Is audit trail available to a generally

Yes

intelligible form for regular review?

Implicitly required by

4.8 Can audit trail contents be configured

Yes

Annex 11, warning letters such that only relevant activities are recorded

(and frequently requested for realistic and meaningful review of audit

by customers)

trail information?

Part 11.10(e)

4.9 Is previously recorded information left

Yes

unchanged when records are changed?

Part 11.10(e)

4.10 Is audit trail documentation retained for a Yes period at least as long as that required for the subject electronic record?

Part 11.10(e)

4.11 Is audit trail available for review and

Yes

copying by the FDA?

Annex 11, 8.1

4.12 Is it possible to obtain clear printed

Yes

copies of electronically stored e-records (e.g.,

e-audit trail?)

5. Operational and Device Checks

Part 11.10(f)

5.1 Are there operational system checks to

Yes

enforce permitted sequencing of steps and

events, if required?

Part 11.10(g); Part 211, 68 b
Annex 11, 12.4

5.2 Are there authority checks to ensure

Yes

that only authorized individuals can use the

system, electronically sign a record, access

the operation or computer system input or

output device, alter a record, or perform the

operation at hand?

5.3 Is the system designed to record the

Yes

identity of operators entering, changing,

confirming or deleting data including date

and time?

This information is available for method settings via the previous and new values that are recorded in the audit trail entry. Change flags are not supported directly in the ICP-MS MassHunter reports that are transferred to OpenLAB Server, but Agilent OpenLab Server/ECM XT provides version control for records, so version numbers can be used to identify records that have been altered or updated since the original entry. Any change to any method, whether an established method or not, is recorded in the audit trail.
The reason for any change to a method is recorded if "reason" is selected for that action in the audit trail map. The audit trail function can only be switched off (or privileges modified) by a user with appropriate administrator rights.
The audit trail can be viewed in a tabular format that is easily intelligible.
The audit trail content is not directly user configurable, as all user actions are recorded. However, a filter function is available to allow entries to be viewed more easily.
Strict security and revision control of the data generated by the ICP-MS MassHunter system is achieved with automatic storage of the result set or single runs in OpenLab Server/ECM XT after acquisition, automatic reprocessing or any other interactive change. All entries in the ICP-MS MassHunter and OpenLab Server/ECM XT audit trails are non-editable and non-deletable. Even the removal of records from OpenLab Server/ECM XT by an authorized user does not affect existing entries in the audit trail. All audit trail information is stored in the system repository and kept throughout the electronic records retention period. The audit trails are unbreakably linked to the record. System-related activities such as logon events are also unbreakably linked to the system. Audit trails can be viewed through ICP-MS MassHunter software or the OpenLab Server/ECM XT user interfaces. Audit trails and selected entries can be copied or printed using the report function. Electronically sorted records including audit trail entries can be printed directly, or copied to printable format
In all functions, when a sequencing of events is required, system checks enforce it. For example, a method cannot be applied to data until the method has been validated for completeness. Users are prompted with an error message when steps are performed out of sequence. Users cannot gain access to the system for acquisition, data processing or review without a valid user name and password. Once logged in, the user's access to files and software functionality (including but not limited to signing a file, inputting values, or altering a record) are determined by their assigned privileges in UAC/OLSS.
ICP-MS MassHunter UAC/OLSS and OpenLab Server/ECM XT record this information for actions performed within the application software. For system actions (such as changing the date/time setting), the Windows system event log records the information.

7

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

Part 11.10(h)
Part 11.10(i); China GMP 18; Brazil 571

5.4 Does the system allow to use device

Yes

checks to determine, as appropriate, the

validity of the source of data input or

operational instruction?

5.5 Is there documented evidence that

Yes

persons who develop, maintain, or use

electronic record/electronic signature

systems have the education, training, and

experience to perform their assigned tasks?

Part 11.10(j)

5.6 Is there a written policy that hold

N/A

individuals accountable and responsible

for actions initiated under their electronic

signatures, in order to determine record and

signature falsification?

Implied requirement of

5.7 Have employees been trained on this

N/A

Part 11 11.10(j)

procedure?

Part 11.10(k); China GMP 161

5.8 Are there appropriate controls over

N/A

systems documentation including:(1)

Adequate controls over the distribution of,

access to, and use of documentation for

system operation and maintenance?

Part 11.10(i)

5.9 Are there revision and change control

Yes

procedures to maintain an audit trail that

documents time-sequenced development and

modification of systems documentation?

6. Data Integrity, Date and Time Accuracy

Annex 11.5

6.1 Do computerized systems exchanging

Yes

data electronically with other systems include

appropriate built-in checks for the correct and

secure entry and processing of data?

Annex 11-6; Brazil GMP 580; ICHQ7-5.45
Clinical Computer Guide D.3

6.2 Is there an additional check on the

Yes

accuracy of the data? (This check may be

done by a second operator or by validated

electronic means.)

6.3 Are controls established to ensure that the Yes system's date and time are correct?

Clinical Computer Guide D.3

6.4 Can date or time only be changed by

Yes

authorized personnel, and is such personnel

notified if a system date or time discrepancy

is detected?

Clinical Computer Guide 6.5 Are time stamps with a clear

Yes

D.3

understanding of the time zone reference

used implemented for systems that span

different time zones?

Device identity in the form, of the instrument serial number is transferred from the ICP-MS instrument to the ICP-MS MassHunter software automatically. The serial number can be displayed on software, and it is recorded in the data file. In addition, the source computer name is recorded for files that are uploaded to OpenLab Server/ECM XT from ICP-MS MassHunter software. Prior to data transfer, a device "handshake" confirms the correct link between ICP-MS and application host computer. Agilent company policies prohibit disclosure of personal training records. Audits can confirm existence of the training program. Materials can state that "Agilent personnel are trained..." Records of the educational and employment history of Agilent Technologies employees are verified and kept with personnel records. End users of ICP-MS MassHunter software with OpenLab Server/ECM XT are also required to have records of education, training and/or experience with the system at the customer location. Agilent provides a basic familiarization during the installation of the product for system users. Additional system training is available from Agilent. User responsibility.
User responsibility.
User responsibility.
Agilent's quality and product life cycle processes include formal written revision and change control procedures for system documentation. All controlled document revisions are time stamped and audit-trailed.
The Agilent ICP-MS MassHunter OpenLab Server/ECM XT system does not exchange data electronically with other systems, apart from connections made to networks or remote drives implemented by the user organization. Data exchanged within the ICP-MS MassHunter OpenLab Server/ECM XT environment includes appropriate checks for correct and secure entry. Data accuracy is usually confirmed through the use of appropriate quality control checks, as defined by the user organization. Additional checks can be used, such as reporting confirmatory results for qualifier isotopes. Further checks - such as review by a second operator - are the responsibility of the user organization. Date and Time is verified during system setup and qualification. The date/time recorded by ICP-MS MassHunter is taken from the operating system, domain controller, or time server (if connected to LAN/WAN). It is the responsibility of the user organization to maintain the correct date and time on the PC system clock. Any change to system date/time is recorded in the system audit trail. The date and time settings of the ICP-MS MassHunter workstation PC and OpenLab Server/ECM XT are only accessible to users with appropriate logon credentials. No external monitoring of system date/time is performed, so confirmation of accurate date/time settings would be the responsibility of the user organization. Time stamps in normal MassHunter reports show local time, but the audit trail records both local time and difference from UTC, so true times can be referenced and compared for systems that span different timezones.

8

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

7. Control for Open Systems (Only applicable for open systems)

Part 11.3

7.1 Are there procedures and controls

N/A

designed to ensure the authenticity, integrity,

and, as appropriate, the confidentiality of

electronic records from the point of their

creation to the point of their receipt?

The system is not designed to operate as an open system.

Part 11.3

7.2 Are there additional measures such as

N/A

document encryption and use of appropriate

digital signature standards to ensure, as

necessary under the circumstances, record

authenticity, integrity, and confidentiality?

The system is not designed to operate as an open system.

8. Electronic Signatures ­ Signature Manifestation and Signature/Record Linking

Annex 11.14; ICH Q7.6.18

8.1 When electronic signatures are used, do Yes they have the same impact as hand-written signatures within the boundaries of the company? Are they permanently linked to their respective record? Do they include the time and date that they were applied?

The use and impact of e-signatures within the company is the responsibility of the user organization. Electronic signatures are permanently linked to their respective records, and do include the date/time (and reason, if required) they were applied.

Part 11.50 (a)

8.2 Do signed electronic records contain

Yes

information associated with the signing that

clearly indicates all of the following:

(1) The printed name of the signer?

(2) The date and time when the signature was

executed? And

(3) The meaning (such as review, approval,

responsibility, or authorship) associated with

the signature?

Electronic records contain the name of the user, the date and time, and the reason associated with the signing (if reason is selected in the Audit Trail Map).

Part 11.50 (b)

8.3 Are the items identified in paragraphs (a) Yes (1), (a)(2), and (a)(3) of this section subject to the same controls as for electronic records and are they included as part of any human readable form of the electronic record (such as electronic display or printout)?

Electronic signatures applied in ICP-MS MassHunter software are subject to the same controls as for electronic records, and are included in reports that are viewable on the application screen and in printed reports. Electronic signatures applied to ICP-MS MassHunter files in OpenLab Server/ECM XT are viewable in its details web page and in the file properties dialog box.

Part 11.7

8.4 Are electronic signatures and handwritten Yes signatures linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means?

ICP-MS MassHunter files can be electronically signed in ICP-MS MassHunter software and in OpenLab Server/ECM XT. The electronic signature is unbreakably linked to the file. The system does not recognize signatures (e.g. hand-written) that are applied outside its own electronic signature plug-ins.

Part 11 Preamble section 8.5 Is there a user-specific automatic

Yes

124

inactivity disconnect measure that would

``de-log'' the user if no entries or actions were

taken within a fixed short timeframe?

A time-based system lock can be applied to ICP-MS MassHunter. This lock requires the re-entry of a valid user's logon credentials to unlock the system computer.

9. Electronic Signatures General Requirements and Signature Components and Controls

Part 11.100(a)

9.1 Is each electronic signature unique to one Yes individual and not reused by, or reassigned to, anyone else?

The system uses a user ID and password combination unique to each user in its electronic signature capability. User IDs are required to be unique and must not be reused or reassigned to another individual. Management of this process is the responsibility of the organization that implements and uses the system.

Part 11.100(b)

9.2 Does the organization verify the identity N/A of the individual before the organization establishes, assigns, certifies, or otherwise sanctions an individual's electronic signature, or any element of such electronic signature?

User responsibility

9

Part 11 or Others Part 11.100 (c)
Part 11.100 (c) Part 11.200(a) (1) Part 11.200(a) (1) (i) Part 11.200(a) (1) (i)
Part 11.200(a) (1) (ii) Part 11.200(a) (2)
Part 11.200(a) (3) Part 11.200(b)

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

9.3 Are persons using electronic signatures, N/A prior to or at the time of such use, certified to the agency that the electronic signatures in their system, used on or after August 20, 1997, are intended to be the legally binding equivalent of traditional handwritten signatures?

9.4 Do persons using electronic signatures,

N/A

upon agency request provide additional

certification or testimony that a specific

electronic signature is the legally binding

equivalent of the signer's handwritten

signature?

9.5 Do electronic signatures that are not

Yes

based upon biometrics employ at least two

distinct identification components such as an

identification code and password?

9.6 When an individual executes a series of

Yes

signings during a single, continuous period

of controlled system access, is the first

signing executed using all electronic signature

components?

9.7 When an individual executes a series of

Yes

signings during a single, continuous period

of controlled system access, are subsequent

signings executed using at least one

electronic signature component that is only

executable by, and designed to be used only

by, the individual?

9.8 When an individual executes one or more Yes signings not performed during a single, continuous period of controlled system access, is each signing executed using all of the electronic signature components?

9.9 Are controls in place to ensure that

Yes

electronic signatures that are not based upon

biometrics are used only by their genuine

owners?

9.10 Are the electronic signatures be

Yes

administered and executed to ensure that

attempted use of an individual's electronic

signature by anyone other than its genuine

owner requires collaboration of two or more

individuals?

9.11 Are electronic signatures based upon

N/A

biometrics designed to ensure that they

cannot be used by anyone other than their

genuine owners?

User responsibility.
User responsibility.
The electronic signature tools require two distinct identification components prior to applying signatures on files: A unique user ID and password.
Users normally electronically sign each record individually, but this is configurable to suit the user organization. A configurable "grace period" is provided to allow users to apply one signature to a series of actions within one continuous period of controlled access. For the initial electronic signature, the user has to enter two distinct identification components: A unique user ID, and password. Users usually electronically sign each record individually, but this is configurable to suit the user organization. During the grace period for one continuous period of controlled access, the user does not need to enter their unique user ID and password. If the grace period is set to "0", the user must enter their user ID, and password, for each subsequent action.
Users need to electronically sign each record individually. For each electronic signature, the user has to enter two distinct identification components: A unique user ID, and password.
The system can be configured such that an administrator can assign an initial password to a user for a new account or forgotten password, but the user is required to change that password on their first login. In this manner, the user ID and password combination is known only to the individual. The system also does not allow two users to have the same user ID / password combination. It is the responsibility of the organization to make sure that user IDs and passwords are used by genuine owners only and are not shared. Both user IDs and passwords are kept unique to users. The system administrator only knows user IDs when setting up users. At each user's first logon, they must define their unique password which is only known to them. Thus attempted use of an individual's electronic signature by others requires active collaboration with the purpose of sharing passwords.
Electronic signatures used with ICP-MS MassHunter and OpenLab Server/ECM XT are not based upon biometrics.

10

Part 11 or Others

Requirements

Yes/No If yes, how, specifically, is the requirement satisfied, or if no, what is the recommendation to customers?

10. Controls for Identification Codes and Passwords

Part 11.300(a)

10.1 Are controls in place to maintain the

Yes

uniqueness of each combined identification

code and password, such that no two

individuals have the same combination of

identification code and password?

Part 11.300(b)

10.2 Are controls in place to ensure that

Yes

identification code and password issuance

are periodically checked, recalled, or revised

(e.g., to cover such events as password

aging)?

Part 11.300(c)

10.3 Are there procedures to electronically

N/A

deauthorize lost, stolen, missing, or otherwise

potentially compromised tokens, cards,

and other devices that bear or generate

identification code or password information,

and to issue temporary or permanent

replacements using suitable, rigorous

controls?

Part 11.300(d)

10.4 Are there transaction safeguards in place Yes to prevent unauthorized use of passwords and/or identification codes, and to detect and report in an immediate and urgent manner any attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational management?

Part 11.300(e)

10.5 Are there controls for initial and periodic N/A testing of devices, such as tokens or cards, that bear or generate identification code or password information to ensure that they function properly and have not been altered in an unauthorized manner?

11. System Development and Support

Annex 11 4.5; Brazil GMP 577; GAMP

11.1 Has the software or system been

Yes

developed in accordance with an appropriate

quality management system?

Brazil GMP 589 ICHQ10, 2.7 c ICHQ10, 2.7 c

11.2 Is there a formal agreement in case

N/A

of the software supplier subcontracts

software and maintenance services. Does

the agreement include the contractor's

responsibilities?

11.3 For outsourced (development and

N/A

support) activities, is there a written

agreement between the contract giver and

contract acceptor?

11.4 Are the responsibilities and

N/A

communication processes for quality related

activities of the involved parties (contractors)

defined?

Identity management is performed in Windows User Account manager and OLSS control panel which does not allow two individuals to have the same user ID/ password combination.
Using Windows domain authentication, password renewal intervals can be configured in the OLSS password policy setup. The administrator can define a time frame in which passwords are periodically revised, automatically. Users are prevented from reusing passwords.
Agilent ICP-MS MassHunter UAC/OLSS does not use tokens, cards, or other devices, to generate ID codes or passwords.
The OLSS security policy can be configured so that a user defined number of unauthorized access attempts locks out the user account and this can be communicated to a system administrator. The system audit trail documents general events such as logon attempts to the computer as well as application or user changes, in the system log as a central audit repository for all security information. This includes the system and computer ID along with the operator name and application identification, allowing for an immediate check of the potential security leak. Agilent ICP-MS MassHunter UAC/OLSS does not use tokens, cards, or other devices, to generate ID codes or passwords.
Agilent maintains and can provide documented evidence that ICP-MS MassHunter, UAC/OLSS, and OpenLab Server/ECM XT software is developed under the Quality Management System defined in Agilent LSCA Product Lifecycle Revision and ISO QMS certification, together with the documentation for and described in the tests performed during product testing and Qualification Services. Agilent ICP-MS MassHunter software is not developed or supported using subcontractors.
Agilent ICP-MS MassHunter software is not developed or supported using subcontractors.
Agilent ICP-MS MassHunter software is not developed or supported using subcontractors.

11 Descriptions taken from 21 CFR Part 11: www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=11

System requirements
Agilent OpenLab Server and ECM XT are server-based products that are scalable from a single to 100-concurrent-instrument implementation. Various server configurations are supported, from all-in-one, to flexible, multi-server, installations. The server hardware requirements for an all-in-one (single server) system are shown below. This configuration is suitable for installations where up to 60 concurrent instrument connections will be used, with data capacity of approximately 800 MB per day. Instruments operating with Agilent ICP-MS MassHunter or Agilent OpenLab CDS are supported. The recommended server specifications for up to two ICP-MS systems are shown in the table below. OpenLab Server/ECM XT requires a database backend and supports either PostgreSQL or Microsoft SQL Server 2012 SP2.

OpenLab Server/ECM XT All-in-one server configuration

Hardware Processor RAM Disk (OS and Software) Disk (Data)* Network Operating System

Minimum Specification 2 GHz or Higher (Intel Xeon Quad Core) 48 GB 2x (600 GB 15 K rpm RAID 1) 5x (1TB 7.2 K rpm RAID 5) 1G Windows 2016 or 2019

*Data disk space is estimated based on 4 years of usage with 300 logical instruments. The actual disk space needs to be adjusted based on planned usage pattern.

www.agilent.com/chem
DE44243.0468287037
This information is subject to change without notice.
© Agilent Technologies, Inc. 2021 Printed in the USA, March 3, 2021 5991-2593EN


Adobe PDF Library 15.0 Adobe InDesign 16.0 (Windows)