This set of regulations from the U.S. Food and Drug defines criteria under which electronic records and signatures are considered reliable, trustworthy, and equivalent to their paper equivalents. The entire set of regulations may be found at the FDA website.
In recently released guidelines by the FDA the agency emphesized the importance of Electronic record audit trails during inspections.
At LabLog we have given a lot of consideration to audit trails and we think that we have come up with the best solution for automated management of audit trails.
LabLog uses a two-tier system to capture changes to critical data and log all activity that is performed on our platform.
Set access controls according to your organization’s security posture. LagLog uses role-based access controls so that administrators can limit data access to authorized individuals.
We include built-in compliance roles like reviewer and approver, and administrators can also create custom roles for their teams. Plus, we encrypt all records to give data owners maximum control over distribution and access rights.
Our electronic notebook software prioritizes data security. We provide a full audit trail and full redundancy so that you can be certain that your laboratory complies with all necessary regulations. You can read more about our data security policy here.
Generating time-stamps for creations and edits has never been easier. LagLog automates the secure time-stamp generation process.
Develop In-house Procedures
To protect your networks and the data on them, we suggest conducting a comprehensive risk analysis and then putting policies, procedures, and controls in place to ensure confidentiality, integrity, and availability of your electronic records.
Training and Education
Unfortunately, users are often a major vulnerability. It’s crucial to conduct regular IT security training sessions to raise awareness for those who create and access electronic records.
Limit Systems Access to Authorized Users
Our comprehensive access controls give you the tools you need to give your users the exact amount of privileges that they need to do their jobs. Be sure to monitor access rights to prevent privilege creep.
Create Strong Internal Policies
Your organization should have strong internal policies in place that hold individuals accountable to deter record and signature falsification.