Maintain Data Integrity
Data Integrity App |
The data integrity
threats listed above also highlight an aspect of data security that can help
preserve data integrity. Use the following checklist to preserve data integrity
and minimize risk for your organization:
- Validate Input: When your data set is supplied by a known or unknown source (an end-user, another application, a malicious user, or any number of other sources) you should require input validation. That data should be verified and validated to ensure that the input is accurate.
- Validate Data: It’s
critical to certify that your data processes haven’t been corrupted.
Identify specifications and key attributes that are important to your
organization before you validate the data.
- Remove Duplicate Data: Sensitive
data from a secure database can easily find a home on a document, spreadsheet,
email, or in shared folders where employees without proper access can see
it. It’s prudent to clean up stray data and remove duplicates.
- Backup Data: In
addition to removing duplicates to ensure data security, data backups are
a critical part of the process. Backing up is necessary and goes a long
way to prevent permanent data loss.
How
often should you be backing up? As often as possible. Keep in mind that backups are critical when organizations get
hit with ransom ware attacks. Just make sure that your backups aren’t also
encrypted!
- Access Controls: We’ve
made the case above for input validation, data validation, removing
duplications, and backups – all necessary to preserve data integrity.
Let’s
not rule a few popular data security best practices that can also lend a hand
or two: access controls and an audit trail! Individuals within an
organization without proper access and with malicious intent can do grave harm
to the data.
What’s
worse, an outsider impersonating an insider can also be detrimental.
Implementing a least privilege model – where only users who need access to data
get access – is a very successful form of access control. What’s often
overlooked is physical access to the server.
The
most sensitive servers should be isolated and bolted to the floor or wall. Only
individuals who access should have an access key – ensuring that the keys
to the kingdom are kept secure.
- Always Keep an Audit Trail: Whenever
there is a breach, it’s critical to data integrity to be able to track
down the source. Often referred to as an audit trail, this provides an
organization the breadcrumbs to accurately pin point the source of the
problem.
Typically,
an audit trail has the following:
- Audit trails need to be automatically
generated
- Users should not have access to or the
ability to tamper with the audit trail
- Every event – create, delete, read,
modified – is tracked and recorded
- Every event is also aligned to the
user, so you know who accessed the data
- Every event is time stamped so that
you know when the event took place
“Trust but Verify “ Ronald Reagan
Across the internet, there are millions of resources are available which provide information about Everything.
If you found all content under one roof then it will save your time, effort & you will more concentrated on your important activity.
![]() |
Data Integrity App |
Our Data integrity app will helpful for understanding what Data integrity & CSV really means & How 21 CFR Part 11, EU Annex 11 & other regulatory guidelines affects in pharmaceutical Industry.
- Basic Data Integrity Concepts
- ERES & Its Requirement
- CSV & Its best practices
- Mock Inspection and General Q&A
- Checklist for inspection
- Inspection Readiness
- Useful SOP’s
- Stay Regulatory Compliant.
“Stay One Step Ahead in Pharma IT Compliance”
https://play.google.com/store/apps/details?id=com.innovativeapps.dataintegrity
Try our "Data Integrity" app which helps you to better understand current regulatory agencies thinking on Data Integrity & CSV.
Comments
Post a Comment