Trad ECM is so out-of-touch

reality_check_xlarge

Traditional, legacy ECM platforms like Documentum, FileNet and OpenText are not ready for this new world. Those technologies were architected in a time when users and content stayed behind the firewall, on servers and PCs.

So starts paragraph two of Alfresco’s whitepaper “Next-Generation ECM”. This, and a recent post by Laurence Hart in which he says “Records Management as we know it is dead and it has dragged Enterprise Content Management (ECM) down with it.”, piqued my interest.

Preceding all this was a promotional email from Alfresco’s Melissa Meinhart: “4 reasons why Traditional ECM is dead“. Her reasons were:

  1. Users are demanding support for their new tablet and mobile devices, new remote working styles and new cloud apps. You aren’t going to change the users. You must change your approach to ECM.
  2. It’s not just users who are different today: the enterprise is different, too. A new, more expansive view of the enterprise requires a new approach to ECM… an approach that recognizes that modern enterprises are not bound by the firewall.
  3. Social content is now also enterprise content. Today’s enterprise content is driven by mobile devices and the fact that photos, videos and comment threads help companies get real work done faster. The context of the content — who posted it, at what time, in what circumstances and their opinion of the content — is now central to that content’s value.
  4. Traditional ECM vendors are failing at addressing the new realities of the IT infrastructure. ECM technology built for the new enterprise needs to span from traditional on-premise deployments, to virtualized private cloud deployments to full-fledged public-cloud SaaS deployments — and everything in between. And it needs to keep everything, and everyone, secure and in sync — no matter where users or content resides.

This got me thinking… My current role has me working with clients to help them create intranets that are “social”. Ones that foster richer collaboration, and interaction.

Customers are focusing more on this “visible” part of the social collaborative experience, along with the “content management” part that goes with it. In this case, I am talking about the content that is surfaced on the Intranet pages.

Those areas that come under the heading of “Information Management”, such as Records Management, or Enterprise Content Management (ECM), are “roadmap” items. Things that the customer knows are important, but that they also realise, needs more extensive analysis, and planning.

This awareness, by companies, that a well-thought out ECM system is a necessity, is truly excellent. But Alfresco’s white paper raises some good points…users are, more and more, disconnected from the Enterprise. They work anywhere, at any time, on any device. And there are still concerns (rightly, or wrongly) about content “in the cloud”.

Another excellent point that the white paper makes is something that I have had many long discussions on, at my current place of employment (and which is worthy of a separate blog post). This is with regards to the social content, and conversations, that are now trying to be fostered (see the above paragraphs). These often contain valuable tacit knowledge, or are artefacts that companies don’t want to lose.

Traditional ECM is not sufficiently capable of accommodating this new user behaviour, the extended enterprise, or social content. And even Microsoft’s SharePoint, now considered one of the latest members of the “ECM club”, is lacking.

Naturally, Alfresco’s white paper is a pitch for its own product. I do not have a problem with that. They raise some valid points, and their solution looks like it could have potential. I do want to look into it further though, and assess whether their solution is the “one”.

If you want to read about their offering that they claim meets the challenges of the new ways of working, as well as some other great insight to this area by, refer to the links below.

Related Post

Productivity, Gamification and SharePoint 2013 – slidedeck from Christian Buckley

Christian’s slidedeck on productivity and gamification is certainly worth highlighting…

[slideshare id=17396175&doc=productivitygamificationandsharepoint2013-130320010919-phpapp01]

  • Just what is Gamification and could it work for you? (kirstymarrins.wordpress.com)
  • Can gamification lead to business success? (abc.net.au)
  • Good Gamification Isn’t Child’s Play (pharmexec.com)

 

Related Post

“User Adoption Strategies” – Second Wave People

I finally got a chance today to start reading Michael Sampson’s book User Adoption Strategies – 2nd Ed.

I concentrated on Chapter 1. It was incredibly educational. In fact, I read it twice. In this chapter, amongst other things, Michael introduced the concept of First Wave People, and Second Wave People.

The best way of summing up the difference between these two types of people is by using a quote from Michael’s book:

A first wave person is attracted to the “what” of new technology, while second wave people focus on the “why”.

That one sentence captures it exactly. Michael also points out that these two types of people have different perceptions of reward. For the First Wave people, getting to use new tools is reward enough, but second Wave people have to understand where and how the new tools will improve their current work.

I’m looking forward to Chapter 2 tomorrow…

Related Post

I agree…technology does not encourage user adoption

Michael Sampson recently commented on a statement that SharePoint 2013 had an increased focus on encouraging user adoption.

Michael rightly points out that:

“improvements in features may reduce barriers to usability, but the encouragement of user adoption per se is up to people in the organization who are introducing SharePoint. SharePoint”

 

I wholeheartedly agree with Michael on this. Bells and whistles (aka features) can seem to be enticing to new users, but without strong top-down enthusiasm for a product/way of working, with a real business application, the chances of user adoption are considerably less.

In his post Michael also mentions his collaboration strategy book, and his user adoption book. I will be open here – I have not read them…yet.

However I know what I’ll be asking Santa for this Christmas year.

  • Increasing SharePoint User Adoption with Easy to Understand Training (arnoldit.com)
  • Putting Social to Work (blogs.technet.com)
  • We Need More SharePoint Business Bloggers (veroniquepalmer.wordpress.com)

 

Related Post

SharePoint and 5 Reasons

iDatix have recently posted an article on their web site titled “5 Reasons you are getting Shortchanged by SharePoint“. In it they raise some interesting points regarding some of the shortcomings of SharePoint.

Click here to see what they say…

Related Post

Realizing True Records Management with Microsoft SharePoint 2010 – the Webinar

I’ve just signed up for a webinar that KnowledgeLake are holding entitled “Realizing True Records Management with Microsoft SharePoint 2010“. 

KnowledgeLake were gold sponsors at the SharePoint Best Practices conference that I went to in London earlier this year, and, I have to say, it was a top-notch event. I had visited KnowledgeLake’s booth and I’m curious about how good their product actually is.

So, it was with interest that I read the “Reasons I should attend“. These included the following:

  • LEARN how records management on SharePoint 2010 can lower cost and risk through transparent application of compliance policies and consistent disposition of content
  • DISCOVER why SharePoint will succeed in records management where other ECM platforms have failed
  • WATCH the demonstration of a document lifecycle in SharePoint: the capturing of paper and electronic files including email, application of metadata and classification criteria, search, retrieval, viewing and application of record declaration
  • RECOGNISE how to outline an enterprise approach for the implementation of SharePoint 2010 records management
  • HEAR the customer case study by MOEITS and how they are using SharePoint. The solution saved the union nearly $1 million and realised a return from their investment in four months.
  • CONTRIBUTE to the Question and Answer session

Now, the first reason seems to be pretty standard when describing the virtues of any content management system. As is a demonstration, as well as hearing a customer case study..(Just change the name of the ECM system.)

What really grabbed me by the short and curlies was the second reason “Discover why SharePoint will succeed in records management where other ECM platforms have failed“. Now, this is interesting…I want to hear about this secret sauce that McSharePoint has.

Reason 4 is also one that got my attention. Here the phrase “enterprise approach” really stood out. I’ve been involved with SharePoint since 2007, and, coming from an ECM background, it was very evident to me that SharePoint 2010 is now being hawked as a bigger beast. And this is not only in the “functionality” of SharePoint 2010, but also in other ways. There are more “enterprise-level” whitepapers out now, and the official Microsoft SharePoint training is focusing more on the “business-side” rather than just pure technology.

I’ve registered for the webinar. I’ll be taking notes, and will try and report back on my findings.

Reference Links

  • Realizing True Records Management with Microsoft SharePoint 2010
  • KnowledgeLake
  • European SharePoint Best Practices Conference 2011

Related Post

In SharePoint, where the heck do I fit in? ECM specialists in SharePoint

I’ve been very aware of something for awhile now…and that is “I don’t know where I fit in”. However, it wasn’t until recently when I read Nick Inglis’ blog post that I really came to realise that my “problem” is actually not an uncommon one.

In his post Nick comments that when he’s speaking at a SharePoint event, he often gets categorized under “Other“.

This is because (as he states) the SharePoint world doesn’t quite have a place for those who do work with SharePoint but in an ECM/ERM/Governance capacity.

The Salem Consulting Group have made a list of “plausible” SharePoint roles. I have listed them below, and have added a quick description in between parentheses. These include:

  • SharePoint Strategist (Complete business, and application knowledge. Has vision)
  • SharePoint Practice Lead (Subject Matter Expert with technical, consulting & strategic skills)
  • SharePoint Solutions Architect (Can translate Business requests into technical SharePoint solution)
  • SharePoint Technical Architect (senior) (Deepest technical understanding of SharePoint)
  • SharePoint Architect (Focused on the design, build, and configuration of the SharePoint platform and solution from a purely technical viewpoint)
  • SharePoint Infrastructure Architect (Responsible for designing and building multi-farm enterprise SharePoint architectures.)
  • SharePoint Search Architect (Familiar with taxonomies, folksonomies, etc. Can design & configure federated search solutions.)
  • SharePoint Information Architect (Has the knowledge/experience to design and build logical information frameworks)
  • SharePoint Farm Administrator (Manages the day to day administration of SharePoint.)
  • SharePoint Administrator (Looks after site collections, etc)
  • SharePoint Developer (A range of developer skills including .NET, C#, C++, Jquery and a wide range of other languages.)
  • Infopath and Workflow Designer/Administrator (Customer facing, and familiar with Infopath & Designer)
  • SharePoint User Interface Designer (Graphic designer for SharePoint who can create the user interface designs.)
  • SharePoint Business Analyst (Can interpret business requirements and offer a solution using the standard SharePoint services and features.)
  • SharePoint Programme/Project Manager (Project Management skills as well as fundamental technical understanding of SharePoint.)
  • SharePoint DBA (SQL) (Know how to manage the SharePoint SQL databases.)
  • Active Directory Administrator (Can set up the overarching security architecture).
  • SharePoint Workflow Specialist (For when using 3rd party tools for workflow.)
  • SharePoint BI Analyst/Architect/Administrator (Someone with specialist SharePoint BI skills include cube analysis etc etc)
  • SharePoint Integrator (Able to integrate SharePoint with other systems -SAP, Documentum, etc.)
  • SharePoint Mobile Specialist (Deep knowledge of Groove (2007) and SharePoint workspaces (2010) including the management and relay servers.)
  • SharePoint Trainer/Instructor
  • SharePoint User Adoption Specialist (Involved with the strategies of how to get the users to use the SharePoint solutions).

(Note – The original post (authored by Ian McNeice) from Salem offers a more detailed description of these roles. The link is at the end of this post.

In Nick’s post, he describes an “Information Professional“.

These are the people that have been busy developing models of governance … and have been driving forward the conversation about how SharePoint can be used as a “proper” ECM (and yes, maybe even ERM) system.

Looking at Ian’s list, I think the closest role that matches this is the “Information Architect”. This is the person who insists on maintaining a correct classifications, taxonomies, etc while has expertise in document management, version control techniques, data retention polices, publication and archiving practices.

Being prompted by Nick’s post, and then looking through Ian’s post has certainly help me better “label” myself.

Prior to this, even though I have worked in the Document Management field for over 10 years, I could never find a way of describing my skill set to a “SharePointy” (is that what you call a SharePoint fan?). I can set up, and administer SharePoint sites. I can design user interfaces. I can set up farms, as well as write kick-ass documentation. But I could do more than that.

Thanks to Nick and Ian, I’m going to go and update my LinkedIn profile.

Excellent References

  • Nick’s Post “Excluding the Information Professional in SharePoint“
  • Ian’s Post “The Key Skill Roles of SharePoint“

Related Post

FirstDoc, FirstPoint, NextDocs – a “rough notes” comparison

21 CFR 11 Compliance evaluationA reader has recently asked if I had any information on the differences between FirstDoc, FirstPoint and NextDocs.

To do a full feature-for-feature comparison of all the solutions is not something that I can easily do.  However I have been able to get my hands on some great documentation, and can put together a “rough notes” comparison of the three solutions with regards to the core system, and how each solution complies with 21 CFR Part 11.

Note – this is version 2 of this post. After publishing the initial version, one of the vendors was able to provide me with a later version of their compliance statements. The table below has been updated as well as the Comparison PDF that can be downloaded. This is marked as Version 2. The link in the references still links back to the original compliance statement.

Important Note 1:

The FDA regulation, 21 CFR Part 11, is often update and modified. The documentation that I was able to find from CSC, and NextDocs appears to have been created at different times. As a result – I found some “discrepancies” between them. Sometimes the wording in the material I had, didn’t match the current version of the regulations. However, the “intent” is still the same.

Important Note 2:

I do not claim to be an expert in 21 CFR 11. Nor do I claim to be an expert in each of the different platforms/applications described in this post. I will list my references at the bottom this, but I make 2 recommendations:

  1. 21 CFR Part 11 can be interpreted in slightly different ways. Discuss with your internal QAV people what the expectations are.
  2. Make contact with the vendors in question to really determine whether their application fits your requirements.


21 CFR Part 11

To get read what is specifically contained in 21 CFR Part 11, click on this link. This will open the FDA’s “CFR – Code of Federal Regulations Title 21” site.

Product Comparison

Below I have listed each vendors response to each of the regulations outlined in 21 CFR 11.

This was compiled using information that can be found on the Internet. (I include reference links at the bottom of this post, as well as in the PDF.)

However, as mentioned – this is intended merely as a guideline. I encourage you to contact each of the vendors directly to get an updated statements of compliance, as well as information on server configuration/sizing & prerequisite software.

(Note to vendors – if you feel that there are errors, please let me know in the comments, and I will make the necessary corrections).

You can also click HERE to download a PDF version.

FirstDoc, SPX, FirstPoint & NextDocs

Subpart B – Electronic Records
§ 11.10 CONTROLS FOR CLOSED SYSTEMS

21 CRFR 11 Requirement FirstDoc FirstPoint NextDocs
(a) Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records. FirstDocis developed in accordance with the CSC LSQMSadvantage™, an ISO 9001:2000 certified Quality Management System.QMSadvantage and FirstDoc have been audited by many pharmaceutical clients. As part of a formal vendor audit, CSC can provide evidence that FirstDoc is developed and tested in accordance with QMSadvantage.FirstDoc has been validated by many clients. CSC offers a validation package (consisting of validation plan, traceability matrix, and IQ/OQ/PQ protocol templates and OQ protocols) with each release of the FDRD, FDQ&M, and FDTMF products. FirstPoint is developed in accordance with the CSC LS QMSadvantage™, an ISO 9001:2000 certified Quality Management System. QMSadvantage™ has been audited by many pharmaceutical clients. As part of a formal vendor audit, CSC can provide evidence that FirstPoint is developed and tested in accordance with QMSadvantage™.FirstPoint is “validation ready” for its clients upon completion of installation and configuration. Full IQ, OQ validation scripts, a PQ template and supporting services available from CSC for interested clients. Validation is ultimately the responsibility of the client as validation can only be performed in the environment in which the software will be used, and against specifications defined by system users.NextDocs offers a validation toolkit to streamline the validation process.The toolkit includes a sample validation master plan and traceability matrix, ready-to-run scripts for IQ and OQ, summary report templates, and sample PQ scripts.NextDocs also has standard professional services packages that include assistance with validation planning, PQ script preparation, and managing PQ script execution and documentation activities.
(b) The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency. Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records. Documentum will satisfy this requirement in conjunction with a company’s records management policy. Features of Documentum that support generation of accurate and complete copies in human readable form include the generation of PDF renditions and the ability to view and print these renditions in accordance with a system’s defined security rules.Additional support for this requirement is provided by FirstDoc’s automatic PDF rendition generation feature. Each time the content of a document is modified and the modifications checked in, FirstDoc generates a PDF rendition from an approved rendition generation station if the format supports transformation to PDF. Automatic transformation to PDF ensures that all documents will be readable in the foreseeable future. FirstPoint satisfies thisrequirement by managingaccurate and complete copies of files in human readable form with the tight integration with the Microsoft Office Suite of products andthe generation of PDF renditions and the system generated and maintained metadata. The system also provides human readable audit trails and reports. The ability to view and print these files and associated metadatais managedin accordance with a system’s defined security rules.All relevant recordsare maintained in their native file format within a robust MS SQL database and MS SharePoint environment. FirstPoint generates a PDF rendition from an approved rendition generation station, if the format supports transformation to PDF. Automatic transformation to PDF ensures that all documents will be readable into the foreseeable future. Actual generation of records is a client responsibility. NextDocs facilitates generating copies of records by:

  • Viewing records in native electronic format with any computer running one of several supported browsers.
  • Allowing records to be exported by dragging and dropping to any desired file system location
  • Providing sophisticated controlled, uncontrolled and clean copy printing capabilities

 

(c) Protection of records to enable their accurate and ready retrieval throughout the records retention period.
  • Documents may be retained in the system throughout their retention period, or an archiving process developed to store them outside the system. Documentum’s built-in archiving capability can be used to migrate content offline while maintaining metadata in the docbase.
  • FirstDoc uses Documentum’s robust security, which limits the capability for modifying and deleting records to designated users. FirstDoc automatically applies security to Approved documents that prevents them from being deleted or modified.
  • The FirstDoc product also includes an optional Records Management module which implements retention policies and allows deletion of records which have reached the end of their retention periods in accordance with a standard process.
Documentsmay be retained in the system throughout their retention periodthrough the use of a built-inlifecycle management system.FirstPoint applies robust security across the entirelifecycle, which prevents and limits approved or historical records from being deleted or modified except by specifically designated users. A document restore feature is available to the system administrator that allows for the retrieval of deleted records.All FirstPoint content is retained for retrieval until some business rule criteria has been meet to trigger the destruction. Records retention fun includes the ability to purge specific cycles of minor or major versions at the Library Level and purge working comments and draft comments after a specified retention period. NextDocs systems automatically “lock down” official versions of documents so that they cannot be deleted or modified without following system configurable change control procedures.
(d) Limiting system access to authorized individuals.
  • The underlying Documentum application implements a secure username and encrypted password (generally the network password) to limit access to authorized individuals.
  • FirstDoc augments Documentum security by providing automatic application of a client’s defined security scheme. Users cannot modify security outside of the rules defined by the client.
  • FirstPoint provides a secure username and encrypted password for all users in addition to the network access/password system.
  • FirstPoint augments the SharePoint basic Library level security by allowing permission sets to be applied based on any metadata in the system. This allows for content to have a more granular security model based on role, site, project, product etc, and allows for confidential documents to have a restricted access permission set.
  • FirstPoint also provides application level rights to system and business administration function such as setting up workflow and other business rules templates.
In general, an SOP is needed to define the roles and responsibilities for the administration and maintenance of the groups and users for the system and/or network permissions. Access to NextDocscan be controlled by configuration. Securitycan be configured to use Active Directory or Active Directory Lightweight Directory Services accounts or accounts created within SharePoint. Internal users with on-premises deploymentscan access NextDocs applications through single sign-on without requiringadditional system login unless performing a signature related action in the system.Alternatively, if a client’s Part 11 interpretation requires explicit sign-onto access the system, single sign-oncan be disabled. Internal users with hosted deployments access NextDocs applications by providing a user name and password.External users access NextDocs applications by providing a user name and password. Depending on a client’s security set-up, Virtual Private Network (VPN) access may be required as well.
(e) Use of secure, computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record changes shall not obscure previously recorded information. Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying.
  • FirstDoc uses the Documentum audit trail capability augmented by audit trail entries produced for custom FirstDoc events. Example events include checkin, save, destroy, status change and user acknowledgements, such as review and approval outcome — including electronic signature. Since the audit trail must be maintained for the life of the record, Documentum’s Purge Audit Trail capability should not be used unless the audit trail has been migrated offline as controlled by a client’s SOP. Note: This assumes that the approved record is the electronic record. Audit trail entries for draft, minor versions of records can be deleted using the FirstDoc purge minor version functionality if the clients’ policies dictate.
  • FirstDoc provides thecapability for authorized users to change document metadata on approved records. In this case, an audit trail entry captures the previously recorded values so they are not obscured.
    • SharePoint records all events that occur on documents, the time and date of the and the username of individual (or system account) performing the action.
    • FirstPoint also provides a preconfigured, system generated audit trail report for each document that records the date/time of all critical events that occur during the entire of the document or record from creation, review and approval.
      The username of the individual (or system account) who invoked each action during the history of the document is also shown in the audit trail report.
      Information pertaining to previous document will continue to be displayed in the audit trail report, even as new versions of the document are created.
    • The audit trail report is presented as a single viewable and printable file.
    • The audit trail report is systematically generated, and cannot be overwritten or otherwise modified by any user.
NextDocs records:

  • Record modification events including check-in and check-out.
  • Move, copy, delete and undelete events.
  • Electronic/Digital Signature events.
  • Lifecycle promotions and demotions
  • Workflow events
  • Permission changes
  • Record viewing (configurable).

Audit trail entries include event, user name and server-based time/date stamp. Local time/date stamps can also be configured if desired.

Audit trail records are retained indefinitely unless manually purged from the system.

NextDocs also provides access to and copying of the audit trail. The audit trail can be saved to Excel with a single click for advanced sorting, filtering and analysis.

(f) Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate. These checksare implemented within a number of system functions. They include client-defined control over:

  1. Enforcing the use of approved templates only in creating documents
  2. Limiting property values to predefined dictionary lists wherever possible
  3. Requiring entry of mandatory attributes
  4. Enforcing storage in a pre-defined hierarchy (cabinet/folder structure)
  5. Enforcing a defined document lifecycle and approval process
  6. Ensuring that all required electronic signatures are obtained (if electronic signatures are used)
These checks areimplemented within a number of system functions. They include client control over:

  • The use of approved templates in creating documents/records.
  • Predefined metadata dictionary lists which structure dependent valid choices.
  • Enforcement of mandatory metadata fields where required.
  • Enforcing a defined document lifecycle requiring a specific, defined review and approval process via document workflow
  • Enforcing the review and approval of the PDF rendition of the document, since that is generally considered to be the approved electronic record
  • Ensuring that all required electronic signatures or electronic approvals are obtained using systematic participant selection and voting rules.

 

These checksare implemented ina number of areas. Some examples include:

  • Ensuring that documents follow a defined lifecycle
  • Ensuring that workflows are used when needed to move a document through its lifecycle
  • Ensuring that documents are properly set up to display digital signatures before they can be signed
  • Ensuring that all required signatures are collected before a document is approved
  • Ensuring that documents meet requirements such as having a valid PDF rendition before becoming approved or effective
  • Ensuring that all required metadata is entered for a document
  • Enforcing the use of approved templates for authoring
  • Limiting pick lists to appropriate values when creating or modifying document properties
(g) Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand. These checksare implemented within a number of system functions. They include client-defined control over authorization for:

  • Document creation
  • Document access (delete, write, read, etc.) (via ACL security)
  • Changing status
  • Initiating and participating in the review and approval process
  • Signing documents (if electronic signatures are used)
  • Establishing document relations including change request relationships
  • Performing various types of business administration functions including dictionary maintenance, training record control, etc.
A series of authority checksare implemented within system functions. They include the following client defined controls:

  • Network access with unique ID and password controlled at the operating system level.
  • The SharePoint permission model controls document security at the Library (a collection of documents) and for draft versus approved documents.
  • FirstPoint enhances this security model which allows additional security layers to be implemented based on document metadata. This is useful for documents required restricted, confidential controls.
  • Documents that are part of a workflow process receive enhanced security in that only those selected participants have access to the in progress document.
  • System configuration, maintenance and other types of business administration functions are accessed only by those individuals with specific access rights.

 

These checksare implemented ina number of areas. Some examples include limiting the following to authorized users:

  • Modifying a document’s content or properties
  • Initiating or participating in workflows
  • Applying digital/electronic signatures
  • Modifying system configurations
  • Generating controlled or uncontrolled copy prints
  • Modifying essential information, such as study investigators
  • Approving requests for system access
(h) Use of device (e.g., terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction. This requirement in general does not apply to FirstDoc since the system does not have any functionality where information is valid only when entered from specific terminals. If a specific client has this requirement, CSC will address the requirement for that client. This requirement in general does FirstPoint since the system does not have any functionality where information is valid only when entered only from specific terminals. If a specific client has this requirement, CSC will address the requirement for that client. This requirement does not apply to NextDocs since the system does not have any functionality where information is valid only when entered from specific terminals.
(i) Determination that persons who develop, maintain, or use electronic record/electronic signature systems have the education, training, and experience to perform their assigned tasks.
  • CSC maintains resumes and training records on all team members.
  • CSC provides training to key client team members including business users, business administrators, and system administrators.
  • Upon request, CSC can provide developer training to non-CSC developers employed by the client.
  • CSC maintains resumes and training records for all its team members.
  • CSC will also help generate training records to track any training it provides to the client’s personnel.
NextDocs maintains resumes and training records s to provide evidence that our employees who develop and deploy our software are trained and qualified to do so.NextDocs also provides client-specific training documentation to help our clients comply with this requirement. We also offer end user training, train-the-trainer training and administrator training.
(j) The establishment of, and adherence to, written policies that hold individuals accountable and responsible for actions initiated under their electronic signatures, in order to deter record and signature falsification. N/A This requirement is not applicable at a system level but requires a procedure to be implemented by the client. Client responsibility
(k) Use ofappropriate controls over systems documentation including:(1) Adequate controls overthe distribution of, access to, and use of documentation for system operation and maintenance.(2) Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation. Electronic audit trail for the appropriate document types must be enabled if documentation is maintained in electronic format.
  • CSC will provide the client copies or access to system documentation corresponding to the licensing agreement and version of the product.
  • CSC maintains a strict version and change control methodology for its product, product related documentation and training materials.

 

NextDocs’s documentationis maintained in our configuration management system and available for review during audits.However, ultimately it is the client’s responsibility to control system documentation in their environment.NextDocs’ release notes describe the names and versions of documentation that apply to each product release. In addition, each client receives documentation specific to their NextDocs implementation.
§ 11.30 Controls for Open Systems. Same as § 11.10 plus document encryption and use of appropriate digital signature standards to ensure, as necessary under the circumstances, record authenticity, integrity, and confidentiality.
  • If the system is judged to be an open system, it would require encryption and digital signature standards. This is not part of FirstDoc and can be contracted as an option if needed.
CSC believes the FirstPoint products are a closed system so section 11.30 is not applicable. NextDocs systems that are hosted may be considered open based on the specific circumstances and the client’s 21 CFR Part 11 interpretation. The use of digital signature is available in all NextDocs products to fulfill the additional requirements imposed on open systems.

Subpart B – Electronic Records
§ 11.70 SIGNATURE/RECORD LINKING

21 CFR 11 Regulation FirstDoc FirstPoint NextDocs
Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means.
  • Signature information is stored as document properties.
  • Signature information is also displayed as non-editable properties on the Properties screen.
  • • Signaturesare removed when a documentis edited, copied, or otherwise modified.
    • Electronic signatures can only be applied to a documentrecord through the administrator-configured workflow process and the proper execution of approval rules.
    • The signature page is fused to the PDF rendition of the document and cannot be excised from the document.
    • Signature information is also retained as non-editable data in the database and is displayed in the document’s audit trail report.
    • When a document is revised or copied, the signature page is removed from the new version of the document.
Signatures are bound directly to a specific version of a document.NextDocs digital signaturesare based on Public Key Infrastructure (PKI) and are a result of a cryptographic operation that guarantees signer authenticity, data integrity and non-repudiation of signed documents. The digital signature cannot be copied, tampered or altered.Digital signatures appearing in a document automatically appear as invalid when the document changes in any way.During change control the signature is removed for the draft version in anticipation of future approval and signing.

Subpart C – Electronic Signatures
§ 11.100 General requirements.

21 CFR 11 Regulation FirstDoc FirstPoint NextDocs
(a) Each electronic signature shall be unique to one individual and shall not be reused by, or reassigned to, anyone else.
  • The client will need an SOP on establishing and maintaining user profiles as applied to the assigning of a unique ID code/password combination to only one individual and maintaining a list of user profile information in perpetuity.
  • Documentum can assist with this via the ability to disable (rather than delete) users who are removed from the system. By leaving the users in the system, but disabling them, re-use of their user IDs will not be possible.
  • The network operating system ensures a unique userid which is used to execute the electronic signature.
    FirstPoint allows the administrator to lockout or disable accounts, as well as delete users from the system.
Since NextDocs is generally implemented such that user credentialsare supplied via Active Directory (or Active Directory Lightweight Directory Services), complianceis built in.Active Directory willensure that a user name cannot be re-used within a given domain, andprovide the ability to disable (rather thandelete) users whoare removed from the system. By maintaining a record ofprevious users, reuse of user IDswill not be possible.NextDocs signatures authenticate the content of documents by attributing the signer to the signed document. Every signer is identified by an issued certificate (or by that of an external trusted entity). This identification is based on the fact that the user is a recognized employee in the organization.
(b) Before an organization establishes, assigns, certifies, or otherwise sanctions an individual’s electronic signature, or any element of such electronic signature, the organization shall verify the identity of the individual. The client will need SOPs on establishing and maintaining user profiles as applied to the verification of a user identity. This requirement needs to be met with a client’s business processes. CSC can help establish work instructions or training procedures to assist with the on-boarding process Client Responsibility
(c) Persons using electronic signatures shall,prior to or at the time of such use, certify to the agency that the electronic signatures in their system, used on or after August 20, 1997,are intendedto be the legally bindingequivalent of traditional handwritten signatures.

  1. The certification shall be submitted in paper form and signed with a traditional handwritten signature, to the Office of Regional Operations (HFC-100), 5600 Fishers Lane, Rockville, MD 20857.
  2. . Persons using electronic signatures shall, upon agency request, provide additional certification or testimony that a specific electronic signature is the legally binding equivalent of the signer’s handwritten signature.

 

  • The client will need to submit a letter to the FDA certifying that they consider electronic signatures are the legally binding equivalent to handwritten signatures.
  • The client will need SOPs on establishing and maintaining user profiles showing that a given individual accepts that the electronic signature is the legally binding equivalent of handwritten signatures.
  • This requirement needs to be met with a client’s business processes.
Client Responsibility

Subpart C – Electronic Signatures
11.200 Electronic signature components and controls.

21 CFR 11 Regulation FirstDoc FirstPoint NextDocs
(a) Electronic signatures that are not based upon biometricsshall:(1) Employ at least two distinct identification components such as an identification code and password.(i) When an individual executes a series of signings during a single, continuous period of controlled system access, the first signing shall be executed using all electronic signature components; subsequent signings shall be executed using at least one electronic signature component that is only executable by, and designed to be used only by, the individual.(ii) When an individual executes one or more signings not performed during a single, continuous period of controlled system access, each signing shall be executed using all of the electronic signature components.

(2) Be used only by their genuine owners; and

(3) Be administered and executed to ensure that attempted use of an individual’s electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals.

NoteContact CSC directly for their comments on how FirstDoc meets this regulation.  FirstPoint incorporates the user’s network account and password for general access to the system, which is also used for electronic signature approval. FirstPoint requires the re-entry of both identification components (user ID and password) each time an electronic signature is executed.. Each time a signature is applied, both a user name and password are required.NextDocs supports a configurable automatic time-out during periods of system inactivity. This time-out will also end a user’s continuous and controlled access to the system.
  • (b) Electronic signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than their genuine owners.
FirstDoc can support the use of biometric solutions through customizations. Customizations for biometrics are not in the scope of this document. FirstPoint can support the  use of biometric solutions through customizations. Customizations for biometrics are not in the scope of this document. NA – Biometrics are not used by NextDocs.

Subpart C – Electronic Signatures
§ 11.300 CONTROLS FOR IDENTIFICATION CODES/PASSWORDS
Persons who use electronic signatures based upon the use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls shall include:

21 CFR 11 Regulation

FirstDoc

FirstPoint

NextDocs

(a) Maintaining the uniqueness of each combined identification code and password, such that no two individuals have the same combination of identification code and password.
  • Documentum and Unix/Windows Server will provide most of this functionality. See Item § 11.10 (a).
  • The client will need an SOP on establishing and maintaining user profiles.
  • The client’s network user authentication methodology provides this functionality.
See item § 11.100 (a).
(b) Ensuring that identification code and password issuances are periodically checked, recalled, or revised (e.g., to cover such events as password aging).
  • Both Trusted Unix and Windows Server can be used to require periodic aging of passwords.
  • The client will need an SOP on establishing and maintaining user profiles.
  • The client’s network user authentication and password encryption methodology provides this function
This is a client responsibility, generally achieved through settings in Active Directory. Windows and Active Directory infrastructure can enforce password policy for complexity and expiration. Windows integrated authentication and Basic authentication can leverage this automatically.
(c) Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls.
  • The client will need an SOP covering loss management for passwords.
  • If devices are used, the client must have an SOP covering loss management.
  • NA
NextDocs does not make use of tokens, cards, and other devices that bear or generate identification code or password information.Windows and Active Directory administrators can deactivate users, change users’ passwords, or require users to change passwords after issuing a temporary password. Windows integrated authentication and Basic authentication can leverage this automatically
(d) Use of transaction safeguards to prevent unauthorized use of passwords and/or identification codes, and to detect and report in an immediate and urgent manner any attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational management.
  • Both Trusted Unix and Windows Server can be used to disable user accounts after a configurable number of unsuccessful attempts.
  • The client will need an SOP containing the procedure for reactivating accounts.
  • The client’s network user authentication methodology provides this functionality.
  • Windows can disable user accounts after a configurable number of unsuccessful attempt
This is a client responsibility, generally achieved through settings in Active Directory.The Microsoft Windows family of products can audit logon changes and failed attempts. Group policy can enforce account lockout policy to help to prevent brute force password guessing. Lockout policy is based on failed attempts for a time window and users can be locked out for specified times before they can attempt again (or not).
(e) Initial and periodic testing of devices, such as tokens or cards, that bear or generate identification code or password information to ensure that they function properly and have not been altered in an unauthorized manner.
  • If such devices are used, the client must have such a policy in place.
  • NA
NextDocs does not make use of tokens, cards, and other devices that bear or generate identification code or password information.


Audit Trail Functionality

Audit Trails is an included feature in FirstDoc. Documentum has its own audit trail capabilities, with FirstDoc adding on to Documentum’s audit trail system. Table 3 discusses the Audit Trails functionality that FirstDoc provides in support of 21 CFR Part 11.

Subpart C – Electronic Signatures
§ 11.10(E),(K)(2) AUDIT TRAIL

21 CFR 11 Regulation FirstDoc FirstPoint NextDocs
(a) Use of secure, computergenerated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record changes shall not obscure previously recorded information. Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying.
  • • FirstDoc uses the Documentum audit trail capability augmented by audit trail entries produced for custom FirstDoc events. Example events include check-in, save, destroy, status change and user acknowledgements, such as review and approval outcome — including electronic signature.
  • • Since the audit trail must be maintained for the life of the record, Documentum’s Purge Audit Trail capability should not be used unless the audit trail has been migrated offline as controlled by a client’s SOP. Note: This assumes that the approved record is the electronic record. Audit trail entries for draft, minor versions of records can be deleted using the FirstDoc purge minor version functionality if the clients’ policies dictate.
  • • FirstDoc provides the capability for authorized users to change document metadata on approved records. In this case, an audit trail entry captures the previously recorded values so they are not obscured.
(b) Use of appropriate controls over systems documentation including: 1. Adequate controls over the distribution of, access to and use of documentation for system operation and maintenance. 2. Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation.
  • • Electronic audit trail for the appropriate document types must be enabled if documentation is maintained in electronic format.

References

CFR – Code of Federal Regulations Title 21
(http://www.accessdata.fda.gov/scripts/cdrh/cfdocs/cfcfr/cfrsearch.cfm?cfrpart=11)

21 CFR Part 11 Compliance Position for FirstDoc Applications
(https://developer-content.emc.com/marketplace/collateral/white_papers/CSC_FirstDoc21CFRComplianceWhitePaper.pdf)

21 CFR Part 11 Compliance Position for FirstPoint
(http://download.microsoft.com/documents/France/Entreprises/2010/CSCFirstPointLivreBlancAnglais.pdf)

21 CFR Part 11 Challenges and Solutions – NextDocs
(http://www.nextdocs.com/en-us/White%20Papers/WhitePaper-21CFR11.pdf)

21CFR11 Comparison of FirstDoc, FirstPoint & NextDocs
(http://markjowen.files.wordpress.com/2011/10/21cfr11_compliance-comparison_v21.pdf)

Related Post

How does FirstDoc “do” 21 CFR Part 11 compliance?

CSC have published (not recently) a whitepaper about the capabilities that FirstDoc products provide for compliance with the FDA’s ruling on Electronic Records and Electronic Signatures (fondly known in the Pharma industry as “21 CFR Part 11”).

The whitepaper is a good one. It starts off with a recap of what is contained in 21 CFR Part 11, and then does an itemised breakdown of the capabilities that the FirstDoc products have to meet the compliance requirements.

You can download it here.

Related Post: FirstDoc, FirstPoint, NextDocs – a “rough notes” comparison

Related Post

Post-move SharePoint site Comparison

Recently I’ve been involved with a client project that included moving some SharePoint sites from one web application to another as well, as moving document libraries from a top site to a sub-site.

While I work at the Business level (business systems analyst role), the move itself was done by client’s IT Infrastructure people. Fortunately they were smart enough to copy the content, instead of moving it. This was a brilliant idea, as it gave us the ability to have the original content still available.

Once the content had been moved the next step was to check that no documents had been missed. Now, the site owner (at the business level) had the best idea of what content would be stored in the doclibs, but as there were 64 of them, (some with 100 documents, many with documents in the thousands), doing a direct comparison was not easy. There was also the fact that the new locations had been “unfrozen” and people were uploading documents.

We investigated various ways to do a comparison. This involved creating special views for the docbases that would include only documents created before the “unfreeze” date, and then doing a screen by screen comparison. This was quickly deemed as not practical, and not handy, and bloody tiring.

Then we tried exporting out the lists from the original location to spreadsheet, and then doing the same with the new location so that each list was in columns next to each other. And then doing a side-by-side comparison. This was definitely more practical, and we thought that it was a plausible solution. Until we discovered that for one of the doclibs there were 900 documents in the old location that were not in the new location.

Fortunately we came across a tool from MetaVis. The application suite of this product included a “Live Compare” feature. With this we were able to easily select one particular site in the left part of the screen, another site in the right screen, and then select the docbases that we wanted to compare. And then after clicking on the “Go and check the differences” button (it was actually titled “Compare Now”), we could see which documents were in the old location, and were not in the new location, and vice versa. This was great! And compared to manually comparing lists, was sooo much easier.

As well as any differences in content in the doclibs, we were also able to see small differences in other configurations. This was very handy.

Now – I know that the main functionality of the MetaVis tool is to do with migration, and architecting, but this “Live Compare” functionality certainly saved us a lot of time and frustration.  

Related Post