Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Safety computer systems products

The computerized systems, both hardware and software, that form part of the GLP study should comply with the requirements of the principles of GLP. This relates to the development, validation, operation and maintenance of the system. Validation means that tests have been carried out to demonstrate that the system is fit for its intended purpose. Like any other validation, this will be the use of objective evidence to confirm that the pre-set requirements for the system have been met. There will be a number of different types of computer system, ranging from personal computers and programmable analytical instruments to a laboratory information management system (LIMS). The extent of validation depends on the impact the system has on product quality, safety and record integrity. A risk-based approach can be used to assess the extent of validation required, focusing effort on critical areas. A computerized analytical system in a QC laboratory requires full validation (equipment qualification) with clear boundaries set on its range of operation because this has a high... [Pg.222]

Computer systems are used worldwide in the pharmaceutical industry and have direct bearing on product quality. The purpose of validation is to demonstrate that the intended product manufactured, packed, or distributed using a computerized controlled system will meet the safety, efficacy, and potency requirements per the individual monograph. [Pg.13]

Each phase of the SLC must be controlled to maximize the probability that a finished system meets all quality, regulatory, safety, and specification requirements. If an SLC approach is applied properly, no additional work will be required to validate a system. For each SLC period and event, computer systems validation requires that the development processes are documented work products. As explained in Chapter 2, phase gate verification activities performed during each event may be a perfect place to review and quantify the quality of all products needed to support the next phase. [Pg.38]

Computer systems used to control, monitor, or record functions that may be critical to the safety of a product should be checked for accuracy at intervals of sufficient frequency to provide assurance that the system is under control. If part of a computerized system that controls a function critical to the safety of the product is found not to be accurate, then the safety of the product back to the last known date that the equipment was accurate must be determined. [Pg.126]

Operational checks are normally presenting process control computer systems. These systems may contain code that is part of the master production record. At the system level, the purpose of operational checks is to execute algorithms, sequencing of operations, and safety-related functions as required in the applicable customer specification. Inspections and testing are fundamental processes to be performed during the validation of critical system sequences. In addition, an ongoing program must be established to frequently verify that critical operations occur in the proper sequence. [Pg.137]

During product research, production, and control of FDA regulated products, documentary evidence must be retained for a certain period, which prove the safety and efficacy of the product. When a computer system is to be retired from active use, the data from that system must be archived. Some regulations which cover FDA regulated products, and which require records to be retained, are listed in Table E-l. [Pg.230]

Over the last decade or so there have been many commercial DBMS products for managing safety data. Some have survived the rapid rate of change in computer systems and the competition. [Pg.552]

The user and the environment comprise the final level of the system interaction. The level of assurance for protection and safety on system level depends on the implementation by the manufacturer/supplier and also on the actions of the end user. This part of system level safety is about understanding the intended use of a product, and mitigating reasonable and foreseeable misuse that may occur. IEEE PI625, the Standard for Rechargeable Batteries for Portable Computing, was the first standard to encompass all levels of the battery manufacturing process and include the customer experience. [Pg.413]

The computer system requirements define, as a minimum, the functional and non-functional properties of the computer system that are necessary and sufficient to meet the safety requirements for the plant that have been defined at a higher design level. The specification of computer system requirements is a representation of the necessary behaviour of the computer system. Precise defiiution of the interfaces to the operator, to the maintainer and to the external systems is an integral part of the product provided as the output of this phase. At this stage, the definition of interfaces is limited to the functional and non-functional properties of these interfaces then-design or implementation may be as yet undetermined. [Pg.25]

Implementing a plan to keep information secure in schools is a balancing act for educators. Educators must evaluate the effectiveness of safety measures without discernible loss of productivity. Providing information safety is contingent upon educators understanding the environment, risks, and vulnerabilities of technology. Because of the breadth of the issues and complexity of the environment, there is no more valid approach to achieving an information-secure environment in schools than to promote secure, safe, and ethically sound informational practices by students, faculty, and staff. A school must have both policies and procedures to provide for authentication, firewalls, and virus protection on its computer systems. [Pg.80]

Orlov VV, Vassiliev PM, Derbisher VE (1999) Computer system for estimation of carcinogenic risk of chemical production. In Proceeding of the 4th Russian scientific and practical conference with international participation Novelties in Envionmentalism and Safety of Living , Saint Petersburg, 16-18 June 1999, p 212... [Pg.427]

Level 3 Is entirely a safety system when the process is out of control. It will rely on hard-wired trips that shut the plant down safely and abandon production. The hard-wired trips work independently of the computer system. [Pg.848]

The assessment of the contribution of a product to the fire severity and the resulting hazard to people and property combines appropriate product flammabihty data, descriptions of the building and occupants, and computer software that includes the dynamics and chemistry of fires. This type of assessment offers benefits not available from stand-alone test methods quantitative appraisal of the incremental impact on fire safety of changes in a product appraisal of the use of a given material in a number of products and appraisal of the differing impacts of a product in different buildings and occupancies. One method, HAZARD I (11), has been used to determine that several commonly used fire-retardant—polymer systems reduced the overall fire hazard compared to similar nonfire retarded formulations (12). [Pg.451]

In order to reflect these lead times, the concept of a timestamp is introduced. Timestamp is used in computer science documenting the system time when a certain event or transaction occurs e.g. for logging events (N.N. 2007). In the context of future inventory value planning, the time-stamp marks the period, when the first raw material has reached a certain stage in the value chain network included into a specific product. In the example illustrated in fig. 57, the raw material is processed in the same period to be converted into product 1. Therefore, all four value chain steps indexed from one to four occur in the same period and have the same time-stamp one. Conversion into product 2, however, requires additional time caused by production lead times, safety inventory and/or transportation time, that the steps indexed with five and six have a time stamp of two. The timestamp reflects that the inventory value of product 2 is not based on the raw material costs from the same period but based on the raw material costs from the previous period in order to reflect the lead time. Consequently, value chain indices and timestamps are defined for all steps and can cover multiple periods reflecting that raw materials in a global complex multi-stage value chain network can take several months, until they are sold as part of a finished product to the market. [Pg.152]


See other pages where Safety computer systems products is mentioned: [Pg.107]    [Pg.5]    [Pg.22]    [Pg.28]    [Pg.10]    [Pg.11]    [Pg.58]    [Pg.130]    [Pg.370]    [Pg.933]    [Pg.938]    [Pg.2421]    [Pg.181]    [Pg.372]    [Pg.2402]    [Pg.523]    [Pg.263]    [Pg.309]    [Pg.92]    [Pg.54]    [Pg.20]    [Pg.315]    [Pg.341]    [Pg.984]    [Pg.203]    [Pg.225]    [Pg.323]    [Pg.252]    [Pg.65]    [Pg.65]    [Pg.202]    [Pg.284]    [Pg.249]    [Pg.2576]    [Pg.35]    [Pg.34]   
See also in sourсe #XX -- [ Pg.553 ]




SEARCH



Computer systems

Product systems

Production system

Production systems Products

Safety computer systems

System safety products

© 2024 chempedia.info