Agilent Audit Trail Software 914942 PDF
Agilent Audit Trail Software 914942 PDF
Please note that Varian, Inc. is now part of Agilent Varian, Inc.
Technologies. For more information, go to 2700 Mitchell Drive
www.agilent.com/chem. Walnut Creek, CA 94598-1675/USA
Varian Workstation
Access Control and Audit Trail Software
Manual Outline
This manual is divided into 7 sections:
Section 1 is an overview of the manual. It also provides an outline of what the Access Control and
Audit Trail software system administrator should do to get the system running correctly.
Section 2 is a description of the factory validation test plan that was used to validate the Access
Control and Audit Trail software. (The detailed test plan is in Appendix 1.) The core workstation
software including data handling and instrument control for both chromatography and mass
spectrometry has been validated previously.
Section 3 is a description of how to validate the software on-site. This includes a validation program
that checks each file for changes from the files that were shipped from Varian Inc. There are also
some suggested tests that can be done in the field to perform a limited validation on the product. A
“mini” test plan is detailed in Appendix 2.
Section 4 is a description of how the Access Control and Audit Trail software helps the user meet
the requirements in 21 CFR 11 regulations. A detailed comparison of the functionality of the software
to the individual clauses is given in Appendix 3. This table can be used to demonstrate how this
software addresses the regulations.
Section 5 contains material that should be written into Standard Operating Procedures (SOPs).
These SOPs should standardize the operation of the Access Control and Audit Trail software, as well
as how new users are entered and user information updated.
Section 6 contains course material and certification tests that can be used as a self-learning
program which a workstation administrator can take in order to learn how the system functions. This
can also be used by a trained Varian service representative to teach users how to act as workstation
administrators for the Access Control and Audit Trail software. The certification tests and answers
are in Appendix 4.
Section 7 is a step-by-step procedure for getting started with the Access Control and Audit Trail
software. This takes the user through the initial configuration of a single or multi-workstation system
and the entry of all of the relevant data for workstations, instruments, users, groups, and projects.
Appendix 5 contains forms to gather the required information.
This manual, the Setup and Documentation manual, should be used as a step-by-step guide for
getting started with the use of this software option.
The Access Control and Audit Trail Software Operation manual should be used as a reference
manual. It describes what each entry means and what the legal inputs are for each entry. If you are
uncertain about an entry while going through this manual, please refer to the Operation manual for
more information. In addition to detailed information about individual entries, the Operation manual
contains the following information:
1. An explanation of the software itself, how it is organized, and how to use it. This information is
used as part of the self-learning course that is contained in this manual for the Access Control
and Audit Trail software.
3. A brief comparison of the Star and MS workstation software that explains how they are similar,
how they are different, and how this relates to the Access Control and Audit Trail software.
The Varian workstation software has a validate program that verifies that the checksum of each
executable file of the workstation matches the checksum of what was tested in the factory. Each
software version has its own unique list of checksums. These checksums are included in a file
installed with the workstation. Once the software is installed and any time afterwards, run the
validate program to check the software (the Validate Installed Files function is available from the
‘About box’ in all workstation applications, and from the workstation menu under Program Files).
The workstation software itself has procedures, methods and test files to validate its data handling
and calculation algorithms. The algorithms used for all calculations in Star software are detailed in
the Regulatory Compliance manual on the Star CD. These should be used if it is necessary to
validate the calculation software on-site.
Because the Access Control and Audit Trail option for Varian workstation software does not contain
any specific data manipulation calculations, it should not be necessary to validate this software at the
customer’s site. If the customer feels that it is necessary to do some testing on-site, some of the
procedures described in the factory validation test plan can be used. However, all of the tests should
not be used, as this would be very time consuming. Appendix 2 has a list of the sections of the
factory test plan that might be used to do a shortened file validation procedure.
Policies
The Access Control and Audit Trail software requires that certain policies be set for compliance with
21 CFR 11 regulations. These policies should be documented in one or more laboratory SOPs so
that software functionality is consistent even when different individuals act as administrators. The
policies that should be set in SOPs are listed below with explanations.
When the system is first installed, and periodically as individuals come to work in the lab, the system
administrator will have to add people to the system. The regulation states that the administrator
cannot know both the user’s login name and password. However, because each person must be
clearly identified, the administrator will have to know the user’s login name. Therefore, their
password must be unknown to the administrator.
There are two ways to do this. One is to create a user name and a standard password. This will
always be the same initial password. The user will then be told to go to a workstation, login with their
new login name and password, and then change their password. This should be done immediately.
This would be good for the initial configuration of the system.
Alternatively, if the new user were present while the administrator was entering them into the security
database, they could enter their own password on the Users information page. This is more efficient
when new people are being added to an existing system.
When you first log on to the administration software, a default login (Admin) and password (Chrom)
are used. That login name cannot be deleted from the system. It is always there as a protection in
case the administrator is locked out of the system. However, the default password should not be left
as-is because the system will not be secure. The password for the default login should be changed
after the first administrator is logged in and has a password. This can be changed to anything that
follows the password rules. The password should be written down and secured in a safe location so
that, if it has to be used, it is available.
If dialog boxes are open when you log out, it is possible for someone else to add or modify the
information. You should set a lab SOP that states to close all open dialog boxes.
The most significant changes to the operation of the workstation software when it is used with the
Access Control and Audit Trail Software are contained in the Security Administration program. For
the users of the workstation, these changes are minimal. Their main interaction with the new
software will be logging in, working with the method and data file embedded versions, and dealing
with private locks. In order to learn to work with these features, they should review the following
sections in the Operation manual:
1. Method File Audit Trail
2. Data File Audit Trail
3. Controlling Access to the Workstation Software
Anyone who will act as an administrator of the Access Control and Audit Trail software will need
more comprehensive training. Among other things, a workstation administrator will have to learn how
to create and modify the security database, how to archive audit logs, how to create new users,
groups, workstations, projects and reasons, and how to clear alerts.
In order to gain this understanding, the workstation administrator should take a course either from a
Varian representative trained in the software or through the self-learning course listed below. The
self-learning course focuses on reading the Operation manual and taking tests on the material. It
culminates in the initial preparation for configuring the system for operation and then logging on for
the first time. A course from a Varian representative will follow the same approach. The advantage of
taking the course from a Varian representative is that the user will have the opportunity to ask
questions about the material.
Note: The self-learning course requires that someone other than the person taking the course
administer and grade the tests. Because the tests are multiple choice and the answers
are given in Appendix 6, the person administering the course does not have to be
knowledgeable about the product.
1. Make copies of all the tests in Appendix 6 so that the originals are available for
subsequent training courses.
2. Read the assigned sections of the manual.
3. Take the test listed in Appendix 4 for that section.
There is a series of forms in Appendix 5 to help you organize the information needed to set up the
Security Administration program and security database. One type of form will be printouts of actual
screens that have been enlarged and modified so that you can hand enter information directly into
them. When you enter the information into the system, you can read it directly from the form. An
example of this is shown in the figure below:
Another type of form is a table form. This type of form is used when it is necessary to make multiple
entries into a section of the software. There are several examples of these in the Appendix.
DO NOT WRITE DIRECTLY ON THE ORIGINAL FORMS. MAKE ENOUGH COPIES OF THESE
FORMS SO THAT YOU CAN ENTER ALL OF THE INFORMATION INITIALLY NEEDED FOR THE
SYSTEM.
Steps 2 through 11 are decisions that you will want to make BEFORE you enter anything in the
security administration software and security database on the workstation. Steps 12 to 25 are the
steps that you will take to enter the data that you have created. The order of deciding on the data is
different than the order that you will use to enter it into the security server.
Step 1: Take the “Access Control and Audit Trail Software” course. This can either be from the
Varian customer support representative who installs your system or through the self-
teaching course described in section 7 of this manual. Take all of the tests and have
them graded. If you answer at least 80% of the questions correctly, you will be ready to
configure the system.
Part 2: Entering Information into the Security Database through the Security
Administration Software
Once you have completed all of the steps for the initial entry of information into the security
database, you are ready to begin entering information. The first to do is log in and create yourself as
an administrator user. You then will log out and log back in with your own identity. In this way, the
audit trail for the administration software will correctly identify who made the changes to the security
database.
Step 12: You should go to the workstation that will be used to hold the security database and log
onto the security administration software using the default login name (admin) and the
default password (chrom).
Step 13: Go to the Users page and create yourself as a user, enter your password twice, your full
name, and give yourself administrator rights. Save this new user and enter an
appropriate reason. Close the security administration software.
Step 14: On the workstation, log in using your own identification and password. The first thing you
should do is to add any reasons that you had decided to add, especially if you want to
use a particular reason while you are initially building the security database. Go to the
Reasons page and add the Reasons you added on Form E.
Step 15: On the same page as the Reasons, create the projects that you had previously entered
on Form D. You will have to enter a reason for each project.
MEMORANDUM
TO: Distribution
FROM: Gary Burce
Overview
Software testing for Star 6.0 will focus on the sections of the code that have changed from Star 5.52.
Most of the changes are in the area of access control and audit trails. The actual testing is divided into
three parts, user entry testing, operational testing and reliability testing.
In user entry testing, all of the possible entries the can be made to the software will be tested. Most of
them will be in the Security Administration section of the software. A wide range of entries will be tested
with a focus on the boundary conditions. Where entries interact, their interaction will be tested. (For
example, if the security server requires that 10 characters be present in all password, the system will be
checked to make sure that no newly entered passwords can contain less than 10 characters.) The
persistence of all entries will be tested.
In operational testing, the newly added functions of the Star version 6.0 will be tested. This will include
checking to see that access control is working properly, that audit trails are correctly created and that
changes to files are correct while the content of previous versions are preserved. This will also involve
testing the ancillary functions such as the version comparing software and the audit trail display and
archiving software.
In reliability testing, Star 6.0 with the security and access control operating will be tested with all of the
other modules running in automation to prove the reliability.
Star 6.0 will be tested and supported using Windows 2000 and Windows NT service pack 6. If possible,
minimal testing will be done with Windows NT service pack 4 and Windows 98 although Windows 98 will
not support security. Operation with Windows XP will not be tested at this time.
Adobe Acrobat 5.0 will be run at the same time as Star 6.0 in all systems used for testing to simulate how
customers will do electronic signatures. Acrobat 4.0 will not be tested.
1. Part, or all of the test plan, will be performed on each release of the software before the final
release of software.
2. The part of the test plan used will depend on the individual features available in the software and
what has been previously tested.
3. All defects, change requests, comments and observations about the software will be entered into
the Tracker database for 21 CFR 11.
4. The change control board will evaluate each entry into Tracker for its seriousness and assign it a
P1, P2, or P3 status with P1 meaning “must fix before shipment”, P2 meaning “desirable to fix but
not required” and P3 meaning “under consideration for changing in future versions of the
software”.
5. When a release candidate is created, all previously found defects listed in Tracker as P1 will be
rechecked whether they have been previously listed as repaired or not. In addition, everything in
this test plan will be checked on the release candidate. A release candidate will be approved only
when all of the test plan is complete and all of the P1 defects have been cleared.
6. When testing a release candidate, all of the entries in this test plan will be signed off and dated by
the evaluator, either electronically or manually. A copy of this final test plan is stored in the
product documentation for at least 5 years after product obsolescence per CSB procedure.
7. When a release candidate is approved, all P2 issues deemed important by the change control
board will be discussed in the release notes.
8. The basic functions of the workstation software that have not changed from the previous version
will not be explicitly checked. They will be tested to some extent while running the reliability
testing as described below. The core Star and MS workstation software is tested separately from
this test plan.
The administration security server is the major change that has extensive user inputs. The user inputs
associated with this software will be checked as a separate part of the test plan. All of the other new
features have minimal user input changes. These will be checked as part of the operational testing.
Software version_______________
Software version_______________
Data And
Results
Make sure user has
View Data And
(Check) NA NA appropriate rights in
Results
rights check software.
Recalc Data Make sure user has
And Save (Check) NA NA appropriate rights in
Results rights check software.
Perform Batch Make sure user has
Recalc And (Check) NA NA appropriate rights in
Save Results rights check software.
Methods
Make sure user has
View Methods (Check) NA NA appropriate rights in
rights check software.
Make sure user has
Modify Methods (Check) NA NA appropriate rights in
rights check software.
Make sure user has
Delete Methods (Check) NA NA appropriate rights in
rights check software.
Check that this Rights
MS Instruments Category is present only
for an MS Workstation
Make sure user has
Autotune an
(Check) NA NA appropriate rights in
MS
rights check software.
Make sure user has
Manually Tune
(Check) NA NA appropriate rights in
an MS
rights check software.
Make sure user has
Execute a 1200
(Check) NA NA appropriate rights in
Macro
rights check software.
Make sure user has
Edit a 1200
(Check) NA NA appropriate rights in
Macro
rights check software.
Instruments
Change And Make sure user has
Configure (Check) NA NA appropriate rights in
Instruments rights check software.
Make sure user has
Run Without
(Check) NA NA appropriate rights in
Standards
rights check software.
Make sure user has
Run With
(Check) NA NA appropriate rights in
Standards
rights check software.
Make sure no rights are
Clear All Click NA NA
displayed.
Make sure that the Groups page entries are not discarded when the application is exited. Pass
Software version_______________
Make sure that the Workstations page entries are not discarded when the application is exited. Pass
Software version_______________
Software version_______________
Make sure that the Projects page entries are not discarded when the application is exited. Pass
Software version_______________
Make sure that the Rights page entries are not discarded when the application is exited. Pass
Make sure that the Rights for any individual are correct and can be printed. Pass
Software version_______________
Operational testing will be done on both Windows NT, 2000, and XP. The most recent versions of these
operating systems should be used. There are no requirements for the system to have instruments
attached to it during this testing.
The operation will be checked while someone is changing rights on the security server.
Software version_______________
With the rights to recalculate and save results but not to do batch
reprocessing
Log into Interactive Graphics and try to recalculate results Pass
Log into Interactive Graphics, display several chromatograms and try to Pass
recalculate all of them
Log into Report and Custom Report writer and view a chromatogram. Pass
Log into PolyView, Aurora, and Star Finder Pass
Log into batch printing and try to recalculate a group of .RUN files Fail
Log into System Control and try to recalculate data through a sequence Fail
Software version_______________
With the rights to recalculate and save results but not to do batch
reprocessing
Log into MS Data Review and try to recalculate and save the active Pass
chromatogram
Log into MS Data Review, do manual recalculations, and save them Pass
Log into MS Data Review and try to reprocess a recalc list Fail
Log into System Control and try to recalculate data through a sequence Fail
Log into Std and Custom MS Reports and do everything Pass
Software version_______________
Software version_______________
Software version_______________
Software version_______________
The administration security audit log records all of the actions that an administrator makes using the
administration security server software. It also records any alerts such as the repeated failure of a login or
the powering down of the PC where the security database is located. These tests will check the following:
1. Check to see that all entries and modifications made to the security database are correctly
logged.
2. Check to see that alarm conditions are properly logged and that an administrator is informed
when an alarm occurs.
3. Check to see that the information in the security server can be printed out correctly.
4. Check to see that the log can be archived and that a new log is automatically created in the
correct manner.
Run this test on the security server both on the network and on the local PC
Alarm conditions
Create alarm conditions and make sure that they are accurately Pass
recorded in the log
Make sure that the alarms can be cleared from the log maintenance Pass
screen
Software version_______________
2. Check to see that administrators can access the security database from different workstations.
3. Check to see that administrators can work on the same database at the same time safely.
4. Check to see that alarms will be displayed to any administrator who logs onto the network no
matter where the alert was generated.
Software version_______________
The system log is a log that reflects what was done on the entire workstation. This includes things like
who logged into which application and when, what they did in that application and when they logged out.
A system log is automatically generated on each workstation when the Access Control and Tracking
Software is first started. It is continually maintained with no intervention from the user. Message logs are
referenced and stored with the system log. After either the size of the system log or the number of days
that the system log is active exceeds the limits, it is automatically archived and a new one is created. The
last entry in the old system log and the first entry in the new system log will refer to each other, thus
maintaining the continuity of the audit. During the evaluation, the following will be tested:
1. Check that the appropriate entries are put into the system log.
2. Check that the appropriate message logs are referenced in the system log.
3. Check that the message log cannot be overwritten.
4. Check that the system log can be archived and a new one started in an appropriate fashion.
5. Check that the system log can be displayed correctly.
System and Message Log Test Expected Pass
Result Date
Name
Saving information in the system log
After doing a detailed set of operations, make sure that the system log Pass
reflects all of these actions
After running 2 or more automation sequences using different login identities, Pass
and some manual operations using a third login identity, make sure that all
activities are stored in the message log correctly
Make sure that the correct message logs are referenced in the system log Pass
Preserving the message log
Make sure that the message logs are not over written when a new automation Pass
is started
Make sure that a new message log is started when a new automation is Pass
started
Displaying and archiving the system log
Make sure that the active system log can be displayed Pass
Make sure that the message log can be accessed from the system log and Pass
from the log viewer
Make sure that when the system log is automatically archived, a new one is Pass
created and the appropriate messages put as the last entry of the old and the
first entry of the new one
Make sure that an archived system log can be displayed and searched Pass
Software version_______________
The ability to have internal versions of a method has been added to the workstation software. These
internal versions allow changes to be made to a method without completely obscuring the original
method. The evaluation will test the accuracy and readability of the versioning system by doing the
following:
1. Check to see that changes to a method are kept in the newest version of the method.
2. Check to see the older versions of the method can be accessed and run.
3. Check to make sure that the compare software automatically highlights the method changes.
4. Check to make sure that a method can be saved to a new name and have the correct version
saved with no other versions present.
5. Check to make sure that the password protection for a method functions correctly.
Software version_______________
Recalculation of results can be done in several different ways. When results are recalculated, the
previous results must be available for review and print, and a reason for the new results calculation must
be present. During the evaluation, the following will be checked:
1. Check to see that the changes to the data file are properly recorded.
3. Check to see that the software can save a large number of versions.
4. Check to see that you cannot save results without giving a reason for making the changes.
5. Check to see that you can abandon making changes without any changes being made.
Software version_______________
Software version_______________
The Macros specific to the 1200 instrument now contain an audit trail like the data files and methods.
During the evaluation, the following will be checked:
1. Check to see that the changes to the PML file are properly recorded.
3. Check to see that the software can save a large number of versions.
4. Check to see that you cannot save results without giving a reason for making the changes.
5. Check to see that you can abandon making changes without any changes being made.
PML Versioning Test Expected Pass
Result Date
To be done from an account with the right to modify PMLs Name
Open the Editor from Tools->PML Editor… in the 1200 Control Window Pass
Create a New PML containing “Line1”;cr; and save it with rev info Pass
Add lines “Line2”;cr; through “Line10”;cr; saving it each time with Pass
revision info
Print the PML and verify that its contents are correct Pass
Print the PML Version Info and verify that the revisions are properly Pass
documented
Exercise the Open Version command and check that you can retrieve an Pass
older version of the PML
Check that you are prompted to save changes if you attempt to exit Pass
without changes
Check that electing to not save changes preserves the currently saved Pass
file.
Software version_______________
The Rights check part of the test plan (above) tests most of the individual and group rights. However,
System Control has a number of specific interactions that should be specifically tested. This part of the
evaluation will test the following:
1. Check to make sure that rights are apportioned to each instrument correctly when multiple
instruments are being run at the same time.
2. Check to make sure that changes made to an instrument’s run parameters in System Control are
NOT entered into the method.
3. Check to make sure that a user cannot significantly alter the operation of an instrument.
Software version_______________
The Varian workstations can accommodate several different operations on one workstation at the same
time. Although only 1 person at a time can be logged into a workstation, they can start automated actions
and then log out. This allows another individual to log in and perform tasks while the original tasks are
continuing. When one person is logged in and they have started a process, they can make sure that no
one else can interact with that operation. This is called a private lock. When an operation is private
locked, only the person who has locked it and someone authorized to open private locks can open it.
When a private lock is opened it becomes a public lock. A public lock can be opened by anyone with the
rights to that application. Also, when someone leaves the workstation unattended, the system will
automatically public lock. During the evaluation, the following will be checked:
1. Check to see that a public lock is created when an application times out.
2. Check to see that a private lock can be created by the user.
3. Check to see that the private lock status monitor correctly reflects that locked state.
4. Check to see whether a private lock can be opened only by someone who has the right to open
private locks.
5. Check to see that someone who can open a private lock cannot access the applications unless
they have the rights to use that application.
Private Lock Test Expected Pass
Result Date
Name
Creating a private lock
Make sure that a user can private lock the system using the lower tool Pass
bar icon
In multi-instrument workstations, make sure that each of the instruments Pass
in System Control can be private locked and unlocked independently
Make sure that if a user tries to log into another application, the system Pass
acts like a public lock (must have a login).
Timeouts
Make sure that all applications create a public lock when they time out Pass
Make sure that anyone can open the public lock (if they have rights on Pass
that application) that was created by a timeout
Make sure that all print commands can print to distiller Pass
Make sure that automated print commands can print to distiller Pass
Software version_______________
Whenever a change is made to a data file, method file, administration file or for many other activities, the
change requires a prompt for a reason.
Software version_______________
2. Check operation of PolyView using appropriate rights including being logged into the project
through which the data was generated.
3. Make sure that the raw data is always saved at least in a backup file.
Note: there are no limitations on the access to Aurora because results cannot be viewed or modified
through Aurora.
Software version_______________
Software version_______________
Configuration to run
Four instruments with AutoSamplers attached to the system. Periodic interactions with the system
through running recalculation in Interactive Graphics, using Adobe Acrobat to sign files, building new
methods and modifying old methods, printing reports, starting a stopping automation, and running the
security server.
Operating systems
Windows NT, 2000, XP. Use the most recent versions of these operating systems.
Software version_______________
As an administrator, after
configuring the system for the
first time, check the Security
Security Audit Log Functions
Audit Log to make sure that the
entries you made are reflected in
the log
After performing the tests on
methods and data files, check
System Log Functions the System Log to make sure
that the entries appropriate to
your testing were entered
11.200(a3) Be administered and executed to ensure that Done through Adobe Acrobat.
attempted use of an individual’s electronic
signature by anyone other than its genuine
owner requires collaboration by two or more
individuals.
11.200(b) Electronic signatures based upon biometrics NA
shall be designed to ensure that they cannot
be used by anyone other than their genuine
owners.
11.300 Controls for identification code/passwords NA
Persons who use electronic signatures based
upon use of identification codes in
combination with passwords shall employ
controls to ensure their security and integrity.
Such controls shall include:
1) Which of the following actions does the right to do system maintenance NOT automatically let you
do?
a) Add or update software in the workstation
b) Add or update users in the administration software
c) Fix a file whose audit trail has been corrupted
d) None of the above
2) If you had five workstations attached to the same network and you wanted to have them all share the
same security database, how many of them would you set to standalone operation?
a) 5
b) 1
c) 0
d) 2
3) When you apply an ID to a workstation that is part of a network, which workstation do you have to
make this input from?
a) The workstation with the security database on its local drive
b) The workstation that needs to have the ID applied to it
c) Any workstation
4) How many projects can be associated with one instrument?
a) 1
b) 4 at most
c) Any number
5) What is the effect of associating a project with a data directory?
a) When you log in with that project, you will ONLY be able to store raw data files in that directory
b) When you log in with that project, you will ONLY be able to store raw data files in that directory
and any subdirectories.
c) When you log in with that project, you will be prompted to store raw data files in that directory but
you will be able to select any directory for actual storage.
6) How many reasons can be entered into the list of reasons?
a) 10
b) An unlimited number
c) 100
d) 10 times the number of projects entered
7) How soon before a password expires will the system start to remind the user to change their
password?
a) 1 day
b) 2 days
c) 5 days
d) 7 days
Test # 1 2 3 4
Question #
1 B B F A
2 B B B C
3 E B C B
4 F C B A
5 B C B C
6 C B B D
7 D C B C
8 C B C B
9 D A D A
10 C B C D
11 B A A B
12 A E A E
13 B A A C
14 B A B C
15 A B B A
Workstation name
Instrument 1 name
Instrument 2 name
Instrument 3 name
Instrument 4 name
Workstation name
Instrument 1 name
Instrument 2 name
Instrument 3 name
Instrument 4 name
Workstation name
Instrument 1 name
Instrument 2 name
Instrument 3 name
Instrument 4 name
Workstation name
Instrument 1 name
Instrument 2 name
Instrument 3 name
Instrument 4 name
Workstation name
Instrument 1 name
Instrument 2 name
Instrument 3 name
Instrument 4 name
Note: Default instrument names are automatically created when a workstation is created. The
default names are of the form (Workstation name)_1 to (Workstation name)_4. If you wish to keep
the default name, enter default in the spaces above.
Note: If all of your workstations are going to operate off of their own security database and server,
you can use the network entries on this form to enter their names.
Project
Instrument
Projects
Instruments
Projects
Instruments
Group
Users
Group
Users
Methods
View
Modify
Delete
MS Instrument
AutoTune an MS
Manually Tune an MS
Exec. 1200MS Macros
Edit 1200MS Macros
Instrument
View Status
Configure
Run without standards
Run with standards
Software development follows the life cycle approach. Market and scientific research
leads to a formal Product Definition. The Product Definition is used to produce System
Functional Requirements and Software Requirement Specifications documents. The Software
Requirement Specifications are then used to design the software. The software is tested against
the Product Definition and the Software Requirement Specifications.
Each product has a formal written Test Plan. The Test Plan identifies specific tests to be
performed and the acceptable results that must be achieved. The Test Plan verifies that the
software performs as defined in the Product Definition, including all algorithms and
computations. All or portions of the Test Plan are executed at various points in the development
process to determine the product's compliance with the Requirements documents. The entire Test
Plan is always executed on the final software version. All significant deviations from the Product
Definition that are found in the final software version are either corrected or are documented in
the Release Notes supplied with the product. The Test Plan and the test results for the final
software version released as the product are maintained in the Quality Documentation archived
for each product.
Varian Chromatography Systems will make its software documentation for Star and
Saturn workstations available for inspection at its Walnut Creek facility as required by
government regulations.
03-914450-00:11 1 of 1