13430 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration 21 CFR Part 11 [Docket No. 92N–0251] RIN 0910–AA29 Electronic Records; Electronic Signatures AGENCY: Food and Drug Administration, HHS. ACTION: Final rule. SUMMARY: The Food and Drug Administration (FDA) is issuing regulations that provide criteria for acceptance by FDA, under certain circumstances, of electronic records, electronic signatures, and handwritten signatures executed to electronic records as equivalent to paper records and handwritten signatures executed on paper. These regulations, which apply to all FDA program areas, are intended to permit the widest possible use of electronic technology, compatible with FDA’s responsibility to promote and protect public health. The use of electronic records as well as their submission to FDA is voluntary. Elsewhere in this issue of the Federal Register, FDA is publishing a document providing information concerning submissions that the agency is prepared to accept electronically . DATES: Effective August 20, 1997. Submit written comments on the information collection provisions of this final rule by May 19, 1997. ADDRESSES: Submit written comments on the information collection provisions of this final rule to the Dockets Management Branch (HFA–305), Food and Drug Administration, 12420 Parklawn Dr., rm. 1–23, Rockville, MD 20857. The final rule is also available electronically via Internet: http:// www.fda.gov. FOR FURTHER INFORMATION CONTACT: Paul J. Motise, Center for Drug Evaluation and Research (HFD– 325), Food and Drug Administration, 7520 Standish Pl., Rockville, MD 20855, 301–594– 1089. E-mail address via Internet: Motise@CDER.FDA.GOV, or Tom M. Chin, Division of Compliance Policy (HFC–230), Food and Drug Administration, 5600 Fishers Lane, Rockville, MD 20857, 301–827– 0410. E-mail address via Internet: TChin@FDAEM.SSW.DHHS.GOV SUPPLEMENTARY INFORMATION: I. Background In 1991, members of the pharmaceutical industry met with the agency to determine how they could accommodate paperless record systems under the current good manufacturing practice (CGMP) regulations in parts 210 and 211 (21 CFR parts 210 and 211). FDA created a Task Force on Electronic Identification/Signatures to develop a uniform approach by which the agency could accept electronic signatures and records in all program areas. In a February 24, 1992, report, a task force subgroup, the Electronic Identification/ Signature Working Group, recommended publication of an advance notice of proposed rulemaking (ANPRM) to obtain public comment on the issues involved. In the Federal Register of July 21, 1992 (57 FR 32185), FDA published the ANPRM, which stated that the agency was considering the use of electronic identification/signatures, and requested comments on a number of related topics and concerns. FDA received 53 comments on the ANPRM. In the Federal Register of August 31, 1994 (59 FR 45160), the agency published a proposed rule that incorporated many of the comments to the ANPRM, and requested that comments on the proposed regulation be submitted by November 29, 1994. A complete discussion of the options considered by FDA and other background information on the agency’s policy on electronic records and electronic signatures can be found in the ANPRM and the proposed rule. FDA received 49 comments on the proposed rule. The commenters represented a broad spectrum of interested parties: Human and veterinary pharmaceutical companies as well as biological products, medical device, and food interest groups, including 11 trade associations, 25 manufacturers, and 1 Federal agency. II. Highlights of the Final Rule The final rule provides criteria under which FDA will consider electronic records to be equivalent to paper records, and electronic signatures equivalent to traditional handwritten signatures. Part 11 (21 CFR part 11) applies to any paper records required by statute or agency regulations and supersedes any existing paper record requirements by providing that electronic records may be used in lieu of paper records. Electronic signatures which meet the requirements of the rule will be considered to be equivalent to full handwritten signatures, initials, and other general signings required by agency regulations. Section 11.2 provides that records may be maintained in electronic form and electronic signatures may be used in lieu of traditional signatures. Records and signatures submitted to the agency may be presented in an electronic form provided the requirements of part 11 are met and the records have been identified in a public docket as the type of submission the agency accepts in an electronic form. Unless records are identified in this docket as appropriate for electronic submission, only paper records will be regarded as official submissions. Section 11.3 defines terms used in part 11, including the terms: Biometrics, closed system, open system, digital signature, electronic record, electronic signature, and handwritten signature. Section 11.10 describes controls for closed systems, systems to which access is controlled by persons responsible for the content of electronic records on that system. These controls include measures designed to ensure the integrity of system operations and information stored in the system. Such measures include: (1) Validation; (2) the ability to generate accurate and complete copies of records; (3) archival protection of records; (4) use of computer-generated, time-stamped audit trails; (5) use of appropriate controls over systems documentation; and (6) a determination that persons who develop, maintain, or use electronic records and signature systems have the education, training, and experience to perform their assigned tasks. Section 11.10 also addresses the security of closed systems and requires that: (1) System access be limited to authorized individuals; (2) operational system checks be used to enforce permitted sequencing of steps and events as appropriate; (3) authority checks be used to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform operations; (4) device (e.g., terminal) checks be used to determine the validity of the source of data input or operation instruction; and (5) written policies be established and adhered to holding individuals accountable and responsible for actions initiated under their electronic signatures, so as to deter record and signature falsification. Section 11.30 sets forth controls for open systems, including the controls required for closed systems in § 11.10 and additional measures such as document encryption and use of appropriate digital signature standards 13431Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations to ensure record authenticity, integrity, and confidentiality. Section 11.50 requires signature manifestations to contain information associated with the signing of electronic records. This information must include the printed name of the signer, the date and time when the signature was executed, and the meaning (such as review, approval, responsibility, and authorship) associated with the signature. In addition, this information is subject to the same controls as for electronic records and must be included in any human readable forms of the electronic record (such as electronic display or printout). Under § 11.70, electronic signatures and handwritten signatures executed to electronic records must be linked to their respective records so that signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means. Under the general requirements for electronic signatures, at § 11.100, each electronic signature must be unique to one individual and must not be reused by, or reassigned to, anyone else. Before an organization establishes, assigns, certifies, or otherwise sanctions an individual’s electronic signature, the organization shall verify the identity of the individual. Section 11.200 provides that electronic signatures not based on biometrics must employ at least two distinct identification components such as an identification code and password. In addition, when an individual executes a series of signings during a single period of controlled system access, the first signing must be executed using all electronic signature components and the subsequent signings must be executed using at least one component designed to be used only by that individual. When an individual executes one or more signings not performed during a single period of controlled system access, each signing must be executed using all of the electronic signature components. Electronic signatures not based on biometrics are also required to be used only by their genuine owners and administered and executed to ensure that attempted use of an individual’s electronic signature by anyone else requires the collaboration of two or more individuals. This would make it more difficult for anyone to forge an electronic signature. Electronic signatures based upon biometrics must be designed to ensure that such signatures cannot be used by anyone other than the genuine owners. Under § 11.300, electronic signatures based upon use of identification codes in combination with passwords must employ controls to ensure security and integrity. The controls must include the following provisions: (1) The uniqueness of each combined identification code and password must be maintained in such a way that no two individuals have the same combination of identification code and password; (2) persons using identification codes and/ or passwords must ensure that they are periodically recalled or revised; (3) loss management procedures must be followed to deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification codes or password information; (4) transaction safeguards must be used to prevent unauthorized use of passwords and/or identification codes, and to detect and report any attempt to misuse such codes; (5) devices that bear or generate identification codes or password information, such as tokens or cards, must be tested initially and periodically to ensure that they function properly and have not been altered in an unauthorized manner. III. Comments on the Proposed Rule A. General Comments 1. Many comments expressed general support for the proposed rule. Noting that the proposal’s regulatory approach incorporated several suggestions submitted by industry in comments on the ANPRM, a number of comments stated that the proposal is a good example of agency and industry cooperation in resolving technical issues. Several comments also noted that both industry and the agency can realize significant benefits by using electronic records and electronic signatures, such as increasing the speed of information exchange, cost savings from the reduced need for storage space, reduced errors, data integration/trending, product improvement, manufacturing process streamlining, improved process control, reduced vulnerability of electronic signatures to fraud and abuse, and job creation in industries involved in electronic record and electronic signature technologies. One comment noted that, when part 11 controls are satisfied, electronic signatures and electronic records have advantages over paper systems, advantages that include: (1) Having automated databases that enable more advanced searches of information, thus obviating the need for manual searches of paper records; (2) permitting information to be viewed from multiple perspectives; (3) permitting determination of trends, patterns, and behaviors; and (4) avoiding initial and subsequent document misfiling that may result from human error. There were several comments on the general scope and effect of proposed part 11. These comments noted that the final regulations will be viewed as a standard by other Government agencies, and may strongly influence the direction of electronic record and electronic signature technologies. One comment said that FDA’s position on electronic signatures/electronic records is one of the most pressing issues for the pharmaceutical industry and has a significant impact on the industry’s future competitiveness. Another comment said that the rule constitutes an important milestone along the Nation’s information superhighway. FDA believes that the extensive industry input and collaboration that went into formulating the final rule is representative of a productive partnership that will facilitate the use of advanced technologies. The agency acknowledges the potential benefits to be gained by electronic record/ electronic signature systems. The agency expects that the magnitude of these benefits should significantly outweigh the costs of making these systems, through compliance with part 11, reliable, trustworthy, and compatible with FDA’s responsibility to promote and protect public health. The agency is aware of the potential impact of the rule, especially regarding the need to accommodate and encourage new technologies while maintaining the agency’s ability to carry out its mandate to protect public health. The agency is also aware that other Federal agencies share the same concerns and are addressing the same issues as FDA; the agency has held informal discussions with other Federal agencies and participated in several interagency groups on electronic records/electronic signatures and information technology issues. FDA looks forward to exchanging information and experience with other agencies for mutual benefit and to promote a consistent Federal policy on electronic records and signatures. The agency also notes that benefits, such as the ones listed by the comments, will help to offset any system modification costs that persons may incur to achieve compliance with part 11. B. Regulations Versus Guidelines 2. Several comments addressed whether the agency’s policy on electronic signatures and electronic records should be issued as a regulation 13432 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations or recommended in a guideline. Most comments supported a regulation, citing the need for a practical and workable approach for criteria to ensure that records can be stored in electronic form and are reliable, trustworthy, secure, accurate, confidential, and authentic. One comment specifically supported a single regulation covering all FDA- regulated products to ensure consistent requirements across all product lines. Two comments asserted that the agency should only issue guidelines or ‘‘make the regulations voluntary.’’ One of these comments said that by issuing regulations, the agency is shifting from creating tools to enhance communication (technological quality) to creating tools for enforcement (compliance quality). The agency remains convinced, as expressed in the preamble to the proposed rule (59 FR 45160 at 45165), that a policy statement, inspection guide, or other guidance would be an inappropriate means for enunciating a comprehensive policy on electronic signatures and records. FDA has concluded that regulations are necessary to establish uniform, enforceable, baseline standards for accepting electronic signatures and records. The agency believes, however, that supplemental guidance documents would be useful to address controls in greater detail than would be appropriate for regulations. Accordingly, the agency anticipates issuing supplemental guidance as needed and will afford all interested parties the opportunity to comment on the guidance documents. The need for regulations is underscored by several opinions expressed in the comments. For example, one comment asserted that it should be acceptable for supervisors to remove the signatures of their subordinates from signed records and replace them with their own signatures. Although the agency does not object to the use of a supervisor’s signature to endorse or confirm a subordinate’s actions, removal of an original signature is an action the agency views as falsification. Several comments also argued that an electronic signature should consist of only a password, that passwords need not be unique, that it is acceptable for people to use passwords associated with their personal lives (like the names of their children or their pets), and that passwords need only be changed every 2 years. FDA believes that such procedures would greatly increase the possibility that a password could be compromised and the chance that any resulting impersonation and/or falsification would continue for a long time. Therefore, an enforceable regulation describing the acceptable characteristics of an electronic signature appears necessary. C. Flexibility and Specificity 3. Several comments addressed the flexibility and specificity of the proposed rule. The comments contended that agency acceptance of electronic records systems should not be based on any particular technology, but rather on the adequacy of the system controls under which they are created and managed. Some comments claimed that the proposed rule was overly prescriptive and that it should not specify the mechanisms to be used, but rather only require owners/users to design appropriate safeguards and validate them to reasonably ensure electronic signature integrity and authenticity. One comment commended the agency for giving industry the freedom to choose from a variety of electronic signature technologies, while another urged that the final rule be more specific in detailing software requirements for electronic records and electronic notebooks in research and testing laboratories. The agency believes that the provisions of the final rule afford firms considerable flexibility while providing a baseline level of confidence that records maintained in accordance with the rule will be of high integrity. For example, the regulation permits a wide variety of existing and emerging electronic signature technologies, from use of identification codes in conjunction with manually entered passwords to more sophisticated biometric systems that may necessitate additional hardware and software. While requiring electronic signatures to be linked to their respective electronic records, the final rule affords flexibility in achieving that link through use of any appropriate means, including use of digital signatures and secure relational database references. The final rule accepts a wide variety of electronic record technologies, including those based on optical storage devices. In addition, as discussed in comment 40 of this document, the final rule does not establish numerical standards for levels of security or validation, thus offering firms flexibility in determining what levels are appropriate for their situations. Furthermore, while requiring operational checks, authority checks, and periodic testing of identifying devices, persons have the flexibility of conducting those controls by any suitable method. When the final rule calls for a certain control, such as periodic testing of identification tokens, persons have the option of determining the frequency. D. Controls for Electronic Systems Compared with Paper Systems 4. Two comments stated that any controls that do not apply to paper- based document systems and handwritten signatures should not apply to electronic record and signature systems unless those controls are needed to address an identified unique risk associated with electronic record systems. One comment expressed concern that FDA was establishing a much higher standard for electronic signatures than necessary. In attempting to establish minimum criteria to make electronic signatures and electronic records trustworthy and reliable and compatible with FDA’s responsibility to promote and protect public health (e.g., by hastening the availability of new safe and effective medical products and ensuring the safety of foods), the agency has attempted to draw analogies to handwritten signatures and paper records wherever possible. In doing so, FDA has found that the analogy does not always hold because of the differences between paper and electronic systems. The agency believes some of those differences necessitate controls that will be unique to electronic technology and that must be addressed on their own merits and not evaluated on the basis of their equivalence to controls governing paper documents. The agency found that some of the comments served to illustrate the differences between paper and electronic record technologies and the need to address controls that may not generally be found in paper record systems. For example, several comments pointed out that electronic records built upon information databases, unlike paper records, are actually transient views or representations of information that is dispersed in various parts of the database. (The agency notes that the databases themselves may be geographically dispersed but linked by networks.) The same software that generates representations of database information on a screen can also misrepresent that information, depending upon how the software is written (e.g., how a query is prepared). In addition, database elements can easily be changed at any time to misrepresent information, without evidence that a change was made, and in a manner that destroys the original information. Finally, more people have potential access to electronic record 13433Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations systems than may have access to paper records. Therefore, controls are needed to ensure that representations of database information have been generated in a manner that does not distort data or hide noncompliant or otherwise bad information, and that database elements themselves have not been altered so as to distort truth or falsify a record. Such controls include: (1) Using time- stamped audit trails of information written to the database, where such audit trails are executed objectively and automatically rather than by the person entering the information, and (2) limiting access to the database search software. Absent effective controls, it is very easy to falsify electronic records to render them indistinguishable from original, true records. The traditional paper record, in comparison, is generally a durable unitized representation that is fixed in time and space. Information is recorded directly in a manner that does not require an intermediate means of interpretation. When an incorrect entry is made, the customary method of correcting FDA-related records is to cross out the original entry in a manner that does not obscure the prior data. Although paper records may be falsified, it is relatively difficult (in comparison to falsification of electronic records) to do so in a nondetectable manner. In the case of paper records that have been falsified, a body of evidence exists that can help prove that the records had been changed; comparable methods to detect falsification of electronic records have yet to be fully developed. In addition, there are significant technological differences between traditional handwritten signatures (recorded on paper) and electronic signatures that also require controls unique to electronic technologies. For example, the traditional handwritten signature cannot be readily compromised by being ‘‘loaned’’ or ‘‘lost,’’ whereas an electronic signature based on a password in combination with an identification code can be compromised by being ‘‘loaned’’ or ‘‘lost.’’ By contrast, if one person attempts to write the handwritten signature of another person, the falsification would be difficult to execute and a long-standing body of investigational techniques would be available to detect the falsification. On the other hand, many electronic signatures are relatively easy to falsify and methods of falsification almost impossible to detect. Accordingly, although the agency has attempted to keep controls for electronic record and electronic signatures analogous to traditional paper systems, it finds it necessary to establish certain controls specifically for electronic systems. E. FDA Certification of Electronic Signature Systems 5. One comment requested FDA certification of what it described as a low-cost, biometric-based electronic signature system, one which uses dynamic signature verification with a parameter code recorded on magnetic stripe cards. The agency does not anticipate the need to certify individual electronic signature products. Use of any electronic signature system that complies with the provisions of part 11 would form the basis for agency acceptance of the system regardless of what particular technology or brand is used. This approach is consistent with FDA’s policy in a variety of program areas. The agency, for example, does not certify manufacturing equipment used to make drugs, medical devices, or food. F. Biometric Electronic Signatures 6. One comment addressed the agency’s statement in the proposed rule (59 FR 45160 at 45168) that the owner of a biometric/behavioral link could not lose or give it away. The comment stated that it was possible for an owner to ‘‘lend’’ the link for a file to be opened, as a collaborative fraudulent gesture, or to unwittingly assist a fraudulent colleague in an ‘‘emergency,’’ a situation, the comment said, that was not unknown in the computer industry. The agency acknowledges that such fraudulent activity is possible and that people determined to falsify records may find a means to do so despite whatever technology or preventive measures are in place. The controls in part 11 are intended to deter such actions, make it difficult to execute falsification by mishap or casual misdeed, and to help detect such alterations when they occur (see § 11.10 (introductory paragraph and especially §§ 11.10(j) and 11.200(b)). G. Personnel Integrity 7. A few comments addressed the role of individual honesty and trust in ensuring that electronic records are reliable, trustworthy, and authentic. One comment noted that firms must rely in large measure upon the integrity of their employees. Another said that subpart C of part 11, Electronic Signatures, appears to have been written with the belief that pharmaceutical manufacturers have an incentive to falsify electronic signatures. One comment expressed concern about possible signature falsification when an employee leaves a company to work elsewhere and the employee uses the electronic signature illegally. The agency agrees that the integrity of any electronic signature/electronic record system depends heavily upon the honesty of employees and that most persons are not motivated to falsify records. However, the agency’s experience with various types of records and signature falsification demonstrates that some people do falsify information under certain circumstances. Among those circumstances are situations in which falsifications can be executed with ease and have little likelihood of detection. Part 11 is intended to minimize the opportunities for readily executing falsifications and to maximize the chances of detecting falsifications. Concerning signature falsification by former employees, the agency would expect that upon the departure of an employee, the assigned electronic signature would be ‘‘retired’’ to prevent the former employee from falsely using the signature. H. Security of Industry Electronic Records Submitted to FDA 8. Several comments expressed concern about the security and confidentiality of electronic records submitted to FDA. One suggested that submissions be limited to such read- only formats as CD–ROM with raw data for statistical manipulation provided separately on floppy diskette. One comment suggested that in light of the proposed rule, the agency should review its own internal security procedures. Another addressed electronic records that may be disclosed under the Freedom of Information Act and expressed concern regarding agency deletion of trade secrets. One comment anticipated FDA’s use of open systems to access industry records (such as medical device production and control records) and suggested that such access should be restricted to closed systems. The agency is well aware of its legal obligation to maintain the confidentiality of trade secret information in its possession, and is committed to meet that obligation regardless of the form (paper or electronic) a record takes. The procedures used to ensure confidentiality are consistent with the provisions of part 11. FDA is also examining other controls, such as use of digital signatures, to ensure submission integrity. To permit legitimate changes to be made, the agency does not believe that it is necessary to restrict submissions to those maintained in 13434 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations read-only formats in all cases; each agency receiving unit retains the flexibility to determine whatever format is most suitable. Those intending to submit material are expected to consult with the appropriate agency receiving unit to determine the acceptable formats. Although FDA access to electronic records on open systems maintained by firms is not anticipated in the near future, the agency believes it would be inappropriate to rule out such a procedure. Such access can be a valuable inspection tool and can enhance efficiencies by reducing the time investigators may need to be on site. The agency believes it is important to develop appropriate procedures and security measures in cooperation with industry to ensure that such access does not jeopardize data confidentiality or integrity. I. Effective Date/Grandfathering 9. Several comments addressed the proposed effective date of the final rule, 90 days after publication in the Federal Register, and suggested potential exemptions (grandfathering) for systems now in use. Two comments requested an expedited effective date for the final rule. One comment requested an effective date at least 18 months after publication of the final rule to permit firms to modify and validate their systems. One comment expressed concern about how the rule, in general, will affect current systems, and suggested that the agency permit firms to continue to use existing electronic record systems that otherwise conform to good manufacturing or laboratory practices until these firms make major modifications to those systems or until 5 years have elapsed, whichever comes first. Several other comments requested grandfathering for specific sections of the proposed rule. The agency has carefully considered the comments and suggestions regarding the final rule’s effective date and has concluded that the effective date should be 5 months after date of publication in the Federal Register. The agency wishes to accommodate firms that are prepared now to comply with part 11 or will be prepared soon, so as to encourage and foster new technologies in a manner that ensures that electronic record and electronic signature systems are reliable, trustworthy, and compatible with FDA’s responsibility to promote and protect public health. The agency believes that firms that have consulted with FDA before adopting new electronic record and electronic signature technologies (especially technologies that may impact on the ability of the agency to conduct its work effectively) will need to make few, if any, changes to systems used to maintain records required by FDA. The agency believes that the provisions of part 11 represent minimal standards and that a general exemption for existing systems that do not meet these provisions would be inappropriate and not in the public interest because such systems are likely to generate electronic records and electronic signatures that are unreliable, untrustworthy, and not compatible with FDA’s responsibility to promote and protect public health. Such an exemption might, for example, mean that a firm could: (1) Deny FDA inspectional access to electronic record systems, (2) permit unauthorized access to those systems, (3) permit individuals to share identification codes and passwords, (4) permit systems to go unvalidated, and (5) permit records to be falsified in many ways and in a manner that goes undetected. The agency emphasizes that these regulations do not require, but rather permit, the use of electronic records and signatures. Firms not confident that their electronic systems meet the minimal requirements of these regulations are free to continue to use traditional signatures and paper documents to meet recordkeeping requirements. J. Comments by Electronic Mail (e-mail) and Electronic Distribution of FDA Documents 10. One comment specifically noted that the agency has accepted comments by e-mail and that this provides an additional avenue for public participation in the rulemaking process. Another comment encouraged FDA to expand the use of electronic media to provide information by such open systems as bulletin boards. The agency intends to explore further the possibility of continuing to accept public comments by e-mail and other electronic means. For this current experiment, the agency received only one comment by e-mail. The comment that addressed this issue was, itself, transmitted in a letter. The agency recognizes the benefits of distributing information electronically, has expanded that activity, and intends to continue that expansion. Although only one e-mail comment was received, the agency does not attribute that low number to a lack of ability to send e- mail because the agency received e-mail from 198 persons who requested the text of the proposed rule, including requests from people outside the United States. K. Submissions by Facsimile (Fax) 11. One comment said that part 11 should include a provision for FDA acceptance of submissions by fax, such as import form FDA 2877. The comment noted that the U.S. Customs Service accepts fax signatures on its documents, and claimed that FDA’s insistence on hard copies of form FDA 2877 is an impediment to imports. The agency advises that part 11 permits the unit that handles import form FDA 2877 to accept that record in electronic form when it is prepared logistically to do so. As noted in the discussion on § 11.1(b) in comment 21 of this document, the agency recognizes that faxes can be in paper or electronic form, based on the capabilities of the sender and recipient. L. Blood Bank Issues 12. Two comments addressed blood bank issues in the context of electronic records and electronic signatures and said the agency should clarify that part 11 would permit electronic crossmatching by a central blood center for individual hospitals. One comment stated that remote blood center and transfusion facilities should be permitted to rely on electronically communicated information, such as authorization for labeling/issuing units of blood, and that the electronic signature of the supervisor in the central testing facility releasing the product for labeling and issuance should be sufficient because the proposed rule guards against security and integrity problems. One comment questioned whether, under part 11, electronic signatures would meet the signature requirements for the release of units of blood, and if there would be instances where a full signature would be required instead of a technician’s identification. Another comment asserted that it is important to clarify how the term ‘‘batch’’ will be interpreted under part 11, and suggested that the term used in relation to blood products refers to a series of units of blood having undergone common manufacturing processes and recorded on the same computerized document. The comment contrasted this to FDA’s current view that each unit of blood be considered a batch. The agency advises that part 11 permits release records now in paper form to be in electronic form and traditional handwritten signatures to be electronic signatures. Under part 11, the name of the technician must appear in the record display or printout to clearly identify the technician. The appearance of the technician’s identification code 13435Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations alone would not be sufficient. The agency also advises that the definition of a ‘‘batch’’ for blood or other products is not affected by part 11, which addresses the trustworthiness and reliability of electronic records and electronic signatures, regardless of how a batch, which is the subject of those records and signatures, is defined. M. Regulatory Flexibility Analysis 13. One comment said that, because part 11 will significantly impact a substantial number of small businesses, even though the impact would be beneficial, FDA is required to perform a regulatory flexibility analysis and should publish such an analysis in the Federal Register before a final rule is issued. The comment states that the legislative history of the Regulatory Flexibility Act is clear that, ‘‘significant economic impact,’’ as it appears at 5 U.S.C. 605(b) is neutral with respect to whether such impact is beneficial or adverse. Contrary to the comment’s assertion, the legislative history is not dispositive of this matter. It is well established that the task of statutory construction must begin with the actual language of the statute. (See Bailey v. United States, 116 S. Ct. 595, 597 (1996).) A statutory term must not be construed in isolation; a provision that may seem ambiguous in isolation is often clarified by the remainder of the statute. (See Dept. Of Revenue of Oregon v. ACF Industries, 114 S. Ct. 843, 850 (1994).) Moreover, it is a fundamental canon of statutory construction that identical terms within the same statute must bear the same meaning. (See Reno v. Koray, 115 S. Ct. 2021, 2026 (1995).) In addition to appearing in 5 U.S.C. 605(b), the term ‘‘significant economic impact’’ appears elsewhere in the statute. The legislation is premised upon the congressional finding that alternative regulatory approaches may be available which ‘‘minimize the significant economic impact’’ of rules (5 U.S.C. 601 note). In addition, an initial regulatory flexibility analysis must describe significant regulatory alternatives that ‘‘minimize any significant economic impact’’ (5 U.S.C. 603(c)). Similarly, a final regulatory flexibility analysis must include a description of the steps the agency has taken to ‘‘minimize any significant economic impact’’ (5 U.S.C. 604(a)(5)). The term appeared as one of the elements of a final regulatory flexibility analysis, as originally enacted in 1980. (See Pub. L. No. 96–354, 3(a), 94 Stat. 1164, 1167 (1980) (formerly codified at 5 U.S.C. 604(a)(3)).) In addition, when Congress amended the elements of a final regulatory flexibility analysis in 1996, it re-enacted the term, as set forth above. (See Pub. L. 104–121, 241(b), 110 Stat. 857, 865 (1996) (codified at 5 U.S.C.604(a)(5)).) Unless the purpose of the statute was intended to increase the economic burden of regulations by minimizing positive or beneficial effects, ‘‘significant economic impact’’ cannot include such effects. Because it is beyond dispute that the purpose of the statute is not increasing economic burdens, the plain meaning of ‘‘significant economic impact’’ is clear and necessarily excludes beneficial or positive effects of regulations. Even where there are some limited contrary indications in the statute’s legislative history, it is inappropriate to resort to legislative history to cloud a statutory text that is clear on its face. (See Ratzlaff v. United States, 114 S. Ct. 655, 662 (1994).) Therefore, the agency concludes that a final regulatory flexibility analysis is not required for this regulation or any regulation for which there is no significant adverse economic impact on small entities. Notwithstanding these conclusions, FDA has nonetheless considered the impact of the rule on small entities. (See section XVI. of this document.) N. Terminology 14. One comment addressed the agency’s use of the word ‘‘ensure’’ throughout the rule and argued that the agency should use the word ‘‘assure’’ rather than ‘‘ensure’’ because ‘‘ensure’’ means ‘‘to guarantee or make certain’’ whereas ‘‘assure’’ means ‘‘to make confident.’’ The comment added that ‘‘assure’’ is also more consistent with terminology in other regulations. The agency wishes to emphasize that it does not intend the word ‘‘ensure’’ to represent a guarantee. The agency prefers to use the word ‘‘ensure’’ because it means to make certain. O. General Comments Regarding the Prescription Drug Marketing Act of 1987 (PDMA) 15. Three comments addressed the use of handwritten signatures that are recorded electronically (SRE’s) under part 11 and PDMA. One firm described its delivery information acquisition device and noted its use of time stamps to record when signatures are executed. The comments requested clarification that SRE’s would be acceptable under the PDMA regulations. One comment assumed that subpart C of part 11 (Electronic Signatures) would not apply to SRE’s, noting that it was not practical under PDMA (given the large number of physicians who may be eligible to receive drug product samples) to use such alternatives as identification codes combined with passwords. The agency advises that part 11 applies to handwritten signatures recorded electronically and that such signatures and their corresponding electronic records will be acceptable for purposes of meeting PDMA’s requirements when the provisions of part 11 are met. Although subpart C of part 11 does not apply to handwritten signatures recorded electronically, the agency advises that controls related to electronic records (subpart B), and the general provisions of subpart A, do apply to electronic records in the context of PDMA. The agency emphasizes, however, that part 11 does not restrict PDMA signings to SRE’s, and that organizations retain the option of using electronic signatures in conformance with part 11. Furthermore, the agency believes that the number of people in a given population or organization should not be viewed as an insurmountable obstacle to use of electronic signatures. The agency is aware, for example, of efforts by the American Society of Testing and Materials to develop standards for electronic medical records in which digital signatures could theoretically be used on a large scale. P. Comments on the Unique Nature of Passwords 16. Several comments noted, both generally and with regard to §§ 11.100(a), 11.200(a), and 11.300, that the password in an electronic signature that is composed of a combination of password and identification code is not, and need not be, unique. Two comments added that passwords may be known to system security administrators who assist people who forget passwords and requested that the rule acknowledge that passwords need not be unique. One comment said that the rule should describe how uniqueness is to be determined. The agency acknowledges that when an electronic signature consists of a combined identification code and password, the password need not be unique. It is possible that two persons in the same organization may have the same password. However, the agency believes that where good password practices are implemented, such coincidence would be highly unlikely. As discussed in section XIII. of this document in the context of comments on proposed § 11.300, records are less trustworthy and reliable if it is relatively easy for someone to deduce or execute, by chance, a person’s electronic 13436 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations signature where the identification code of the signature is not confidential and the password is easily guessed. The agency does not believe that revising proposed § 11.100(a) is necessary because what must remain unique is the electronic signature, which, in the case addressed by the comments, consists not of the password alone, but rather the password in combination with an identification code. If the combination is unique, then the electronic signature is unique. The agency does not believe that it is necessary to describe in the regulations the various ways of determining uniqueness or achieving compliance with the requirement. Organizations thereby maintain implementation flexibility. The agency believes that most system administrators or security managers would not need to know passwords to help people who have forgotten their own. This is because most administrators or managers have global computer account privileges to resolve such problems. IV. Scope (§ 11.1) 17. One comment suggested adding a new paragraph to proposed § 11.1 that would exempt computer record maintenance software installed before the effective date of the final rule, and that would exempt electronic records maintained before that date. The comment argued that such exemptions were needed for economic and constitutional reasons because making changes to existing systems would be costly and because the imposition of additional requirements after the fact could be regarded as an ex post facto rule. The comment said firms have been using electronic systems that have demonstrated reliability and security for many years before the agency’s publication of the ANPRM, and that the absence of FDA’s objections in inspectional form FDA 483 was evidence of the agency’s acceptance of the system. As discussed in section III.I. of this document, the agency is opposed to ‘‘grandfathering’’ existing systems because such exemptions may perpetuate environments that provide opportunities for record falsification and impair FDA’s ability to protect and promote public health. However, the agency wishes to avoid any confusion regarding the application of the provisions of part 11 to systems and electronic records in place before the rule’s effective date. Important distinctions need to be made relative to an electronic record’s creation, modification, and maintenance because various portions of part 11 address matters relating to these actions. Those provisions apply depending upon when a given electronic record is created, modified, or maintained. Electronic records created before the effective date of this rule are not covered by part 11 provisions that relate to aspects of the record’s creation, such as the signing of the electronic record. Those records would not, therefore, need to be altered retroactively. Regarding records that were first created before the effective date, part 11 provisions relating to modification of records, such as audit trails for record changes and the requirement that original entries not be obscured, would apply only to those modifications made on or after the rule’s effective date, not to modifications made earlier. Likewise, maintenance provisions of part 11, such as measures to ensure that electronic records can be retrieved throughout their retention periods, apply to electronic records that are being maintained on or after the rule’s effective date. The hardware and software, as well as operational procedures used on or after the rule’s effective date, to create, modify, or maintain electronic records must comply with the provisions of part 11. The agency does not agree with any suggestion that FDA endorsement or acceptance of an electronic record system can be inferred from the absence of objections in an inspection report. Before this rulemaking, FDA did not have established criteria by which it could determine the reliability and trustworthiness of electronic records and electronic signatures and could not sanction electronic alternatives when regulations called for signatures. A primary reason for issuing part 11 is to develop and codify such criteria. FDA will assess the acceptability of electronic records and electronic signatures created prior to the effective date of part 11 on a case-by-case basis. 18. One comment suggested that proposed § 11.1 exempt production of medical devices and in vitro diagnostic products on the grounds that the subject was already adequately addressed in the medical device CGMP regulations currently in effect in § 820.195 (21 CFR 820.195), and that additional regulations would be confusing and would limit compliance. The agency believes that part 11 complements, and is supportive of, the medical device CGMP regulations and the new medical device quality system regulation, as well as other regulations, and that compliance with one does not confound compliance with others. Before publication of the ANPRM, the agency determined that existing regulations, including the medical device CGMP regulations, did not adequately address electronic records and electronic signatures. That determination was reinforced in the comments to the ANPRM, which focused on the need to identify what makes electronic records reliable, trustworthy, and compatible with FDA’s responsibility to promote and protect public health. For example, the provision cited by the comment, § 820.195, states ‘‘When automated data processing is used for manufacturing or quality assurance purposes, adequate checks shall be designed and implemented to prevent inaccurate data output, input, and programming errors.’’ This section does not address the many issues addressed by part 11, such as electronic signatures, record falsification, or FDA access to electronic records. The relationship between the quality system regulation and part 11 is discussed at various points in the preamble to the quality system regulation. 19. One comment asserted that for purposes of PDMA, the scope of proposed part 11 should be limited to require only those controls for assessing signatures in paper-based systems because physicians’ handwritten signatures are executed to electronic records. The comment further asserted that, because drug manufacturers’ representatives carry computers into physicians’ offices (where the physicians then sign sample requests and receipts), only closed system controls should be needed. The agency believes that, for purposes of PDMA, controls needed for electronic records bearing handwritten signatures are no different from controls needed for the same kinds of records and signatures used elsewhere, and that proposed § 11.1 need not make any such distinction. In addition, the agency disagrees with the implication that all PDMA electronic records are, in fact, handled within closed systems. The classification of a system as open or closed in a particular situation depends on what is done in that situation. For example, the agency agrees that a closed system exists where a drug producer’s representative (the person responsible for the content of the electronic record) has control over access to the electronic record system by virtue of possessing the portable computer and controlling who may use the computer to sign electronic records. However, should the firm’s representative transfer copies of those records to a public online service that stores them for the drug firm’s 13437Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations subsequent retrieval, the agency considers such transfer and storage to be within an open system because access to the system holding the records is controlled by the online service, which is not responsible for the record’s content. Activities in the first example would be subject to closed system controls and activities in the second example would be subject to open system controls. 20. One comment urged that proposed § 11.1 contain a clear statement of what precedence certain provisions of part 11 have over other regulations. The agency believes that such statements are found in § 11.1(c): Where electronic signatures and their associated records meet the requirements of this part, the agency will consider the electronic signatures to be equivalent to full handwritten signatures, initials, and other general signings as required under agency regulations unless specifically excepted by regulations * * *. and § 11.1(d) (‘‘Electronic records that meet the requirements of this part may be used in lieu of paper records, in accordance with § 11.2, unless paper records are specifically required.’’). These provisions clearly address the precedence of part 11 and the equivalence of electronic records and electronic signatures. To further clarify the scope of the rule, FDA has revised § 11.1 to apply to electronic records submitted to the agency under requirements of the Federal Food, Drug, and Cosmetic Act (the act) and the Public Health Service Act (the PHS Act). This clarifies the point that submissions required by these statutes, but not specifically mentioned in the Code of Federal Regulations (CFR), are subject to part 11. 21. Proposed § 11.1(b) stated that the regulations would apply to records in electronic form that are created, modified, maintained, or transmitted, under any records requirements set forth in Chapter I of Title 21. One comment suggested that the word ‘‘transmitted’’ be deleted from proposed § 11.1(b) because the wording would inappropriately apply to paper documents that are transmitted by fax. The comment noted that if the records are in machine readable form before or after transmission, they would still be covered by the revised wording. The agency does not intend part 11 to apply to paper records even if such records are transmitted or received by fax. The agency notes that the records transmitted by fax may be in electronic form at the sender, the recipient, or both. Part 11 would apply whenever the record is in electronic form. To remedy the problem noted by the comment, the agency has added a sentence to § 11.1(b) stating that part 11 does not apply to paper records that are, or have been, transmitted by electronic means. 22. One comment asked whether paper records created by computer would be subject to proposed part 11. The comment cited, as an example, the situation in which a computer system collects toxicology data that are printed out and maintained as ‘‘raw data.’’ Part 11 is intended to apply to systems that create and maintain electronic records under FDA’s requirements in Chapter I of Title 21, even though some of those electronic records may be printed on paper at certain times. The key to determining part 11 applicability, under § 11.1(b), is the nature of the system used to create, modify, and maintain records, as well as the nature of the records themselves. Part 11 is not intended to apply to computer systems that are merely incidental to the creation of paper records that are subsequently maintained in traditional paper-based systems. In such cases, the computer systems would function essentially like manual typewriters or pens and any signatures would be traditional handwritten signatures. Record storage and retrieval would be of the traditional ‘‘file cabinet’’ variety. More importantly, overall reliability, trustworthiness, and FDA’s ability to access the records would derive primarily from well- established and generally accepted procedures and controls for paper records. For example, if a person were to use word processing software to generate a paper submission to FDA, part 11 would not apply to the computer system used to generate the submission, even though, technically speaking, an electronic record was initially created and then printed on paper. When records intended to meet regulatory requirements are in electronic form, part 11 would apply to all the relevant aspects of managing those records (including their creation, signing, modification, storage, access, and retrieval). Thus, the software and hardware used to create records that are retained in electronic form for purposes of meeting the regulations would be subject to part 11. Regarding the comment about ‘‘raw data,’’ the agency notes that specific requirements in existing regulations may affect the particular records at issue, regardless of the form such records take. For example, ‘‘raw data,’’ in the context of the good laboratory practices regulations (21 CFR part 58), include computer printouts from automated instruments as well as the same data recorded on magnetic media. In addition, regulations that cover data acquisition systems generally include requirements intended to ensure the trustworthiness and reliability of the collected data. 23. Several comments on proposed § 11.1(b) suggested that the phrase ‘‘or archived and retrieved’’ be added to paragraph (b) to reflect more accurately a record’s lifecycle. The agency intended that record archiving and retrieval would be part of record maintenance, and therefore already covered by § 11.1(b). However, for added clarity, the agency has revised § 11.1(b) to add ‘‘archived and retrieved.’’ 24. One comment suggested that, in describing what electronic records are within the scope of part 11, proposed § 11.1(b) should be revised by substituting ‘‘processed’’ for ‘‘modified’’ and ‘‘communicated’’ for ‘‘transmitted’’ because ‘‘communicated’’ reflects the fact that the information was dispatched and also received. The comment also suggested substituting ‘‘retained’’ for ‘‘maintained,’’ or adding the word ‘‘retained,’’ because ‘‘maintain’’ does not necessarily convey the retention requirement. The agency disagrees. The word ‘‘modified’’ better describes the agency’s intent regarding changes to a record; the word ‘‘processed’’ does not necessarily infer a change to a record. FDA believes ‘‘transmitted’’ is preferable to ‘‘communicated’’ because ‘‘communicated’’ might infer that controls to ensure integrity and authenticity hinge on whether the intended recipient actually received the record. Also, as discussed in comment 22 of this document, the agency intends for the term ‘‘maintain’’ to include records retention. 25. Two comments suggested that proposed § 11.1(b) explicitly state that part 11 supersedes all references to handwritten signatures in 21 CFR parts 211 through 226 that pertain to a drug, and in 21 CFR parts 600 through 680 that pertain to biological products for human use. The comments stated that the revision should clarify coverage and permit blood centers and transfusion services to take full advantage of electronic systems that provide process controls. The agency does not agree that the revision is necessary because, under § 11.1(b) and (c), part 11 permits electronic records or submissions under all FDA regulations in Chapter I of Title 21 unless specifically excepted by future regulations. 26. Several comments expressed concern that the proposed rule had inappropriately been expanded in scope 13438 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations from the ANPRM to address electronic records as well as electronic signatures. One comment argued that the scope of part 11 should be restricted only to those records that are currently required to be signed, witnessed, or initialed, and that the agency should not require electronic records to contain electronic signatures where the corresponding paper records are not required to be signed. The agency disagrees with the assertion that part 11 should address only electronic signatures and not electronic records for several reasons. First, based on comments on the ANPRM, the agency is convinced that the reliability and trustworthiness of electronic signatures depend in large measure on the reliability and trustworthiness of the underlying electronic records. Second, the agency has concluded that electronic records, like paper records, need to be trustworthy, reliable, and compatible with FDA’s responsibility to promote and protect public health regardless of whether they are signed. In addition, records falsification is an issue with respect to both signed and unsigned records. Therefore, the agency concludes that although the ANPRM focused primarily on electronic signatures, expansion of the subject to electronic records in the proposed rule was fully justified. The agency stresses that part 11 does not require that any given electronic record be signed at all. The requirement that any record bear a signature is contained in the regulation that mandates the basic record itself. Where records are signed, however, by virtue of meeting a signature requirement or otherwise, part 11 addresses controls and procedures intended to help ensure the reliability and trustworthiness of those signatures. 27. Three comments asked if there were any regulations, including CGMP regulations, that might be excepted from part 11 and requested that the agency identify such regulations. FDA, at this time, has not identified any current regulations that are specifically excepted from part 11. However, the agency believes it is prudent to provide for such exceptions should they become necessary in the future. It is possible that, as the agency’s experience with part 11 increases, certain records may need to be limited to paper if there are problems with the electronic versions of such records. 28. One comment requested clarification of the meaning of the term ‘‘general signings’’ in proposed § 11.1(c), and said that the distinction between ‘‘full handwritten’’ signatures and ‘‘initials’’ is unnecessary because handwritten includes initials in all common definitions of handwritten signature. The comment also suggested changing the term ‘‘equivalent’’ to ‘‘at least equivalent’’ because electronic signatures are not precise equivalents of handwritten signatures and computer- based signatures have the potential of being more secure. The agency advises that current regulations that require records to be signed express those requirements in different ways depending upon the agency’s intent and expectations. Some regulations expressly state that records must be signed using ‘‘full handwritten’’ signatures, whereas other regulations state that records must be ‘‘signed or initialed;’’ still other regulations implicitly call for some kind of signing by virtue of requiring record approvals or endorsements. This last broad category is addressed by the term ‘‘general signings’’ in § 11.1(c). Where the language is explicit in the regulations, the means of meeting the requirement are correspondingly precise. Therefore, where a regulation states that a signature must be recorded as ‘‘full handwritten,’’ the use of initials is not an acceptable substitute. Furthermore, under part 11, for an electronic signature to be acceptable in place of any of these signings, the agency only needs to consider them as equivalent; electronic signatures need not be superior to those other signings to be acceptable. 29. Several comments requested clarification of which FDA records are required to be in paper form, and urged the agency to allow and promote the use of electronic records in all cases. One comment suggested that proposed § 11.1(d) be revised to read, in part, ‘‘* * * unless the use of electronic records is specifically prohibited.’’ The agency intends to permit the use of electronic records required to be maintained but not submitted to the agency (as noted in § 11.2(a)) provided that the requirements of part 11 are met and paper records are not specifically required. The agency also wishes to encourage electronic submissions, but is limited by logistic and resource constraints. The agency is unaware of ‘‘maintenance records’’ that are currently explicitly required to be in paper form (explicit mention of paper is generally unnecessary because, at the time most regulations were prepared, only paper-based technologies were in use) but is providing for that possibility in the future. For purposes of part 11, the agency will not consider that a regulation requires ‘‘maintenance’’ records to be in paper form where the regulation is silent on the form the record must take. FDA believes that the comments’ suggested wording does not offer sufficient advantages to adopt the change. However, to enable FDA to accept as many electronic submissions as possible, the agency is amending § 11.1(b) to include those submissions that the act and the PHS Act specifically require, even though such submissions may not be identified in agency regulations. An example of such records is premarket submissions for Class I and Class II medical devices, required by section 510(k) of the act (21 U.S.C. 360(k)). 30. Several comments addressed various aspects of the proposed requirement under § 11.1(e) regarding FDA inspection of electronic record systems. Several comments objected to the proposal as being too broad and going beyond the agency’s legal inspectional authority. One comment stated that access inferred by such inspection may include proprietary financial and sales data to which FDA is not entitled. Another comment suggested adding the word ‘‘authorized’’ before ‘‘inspection.’’ Some comments suggested revising proposed § 11.1(e) to limit FDA inspection only to the electronic records and electronic signatures themselves, thus excluding inspection of hardware and software used to manage those records and signatures. Other comments interpreted proposed § 11.1(e) as requiring them to keep supplanted or retired hardware and software to enable FDA inspection of those outdated systems. The agency advises that FDA inspections under part 11 are subject to the same legal limitations as FDA inspections under other regulations. The agency does not believe it is necessary to restate that limitation by use of the suggested wording. However, within those limitations, it may be necessary to inspect hardware and software used to generate and maintain electronic records to determine if the provisions of part 11 are being met. Inspection of resulting records alone would be insufficient. For example, the agency may need to observe the use and maintenance of tokens or devices that contain or generate identification information. Likewise, to assess the adequacy of systems validation, it is generally necessary to inspect hardware that is being used to determine, among other things, if it matches the system documentation description of such hardware. The agency has concluded that hardware and software used to generate and maintain electronic records and signatures are ‘‘pertinent 13439Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations equipment’’ within the meaning of section 704 of the act (21 U.S.C. 374). The agency does not expect persons to maintain obsolete and supplanted computer systems for the sole purpose of enabling FDA inspection. However, the agency does expect firms to maintain and have available for inspection documentation relevant to those systems, in terms of compliance with part 11, for as long as the electronic records are required by other relevant regulations. Persons should also be mindful of the need to keep appropriate computer systems that are capable of reading electronic records for as long as those records must be retained. In some instances, this may mean retention of otherwise outdated and supplanted systems, especially where the old records cannot be converted to a form readable by the newer systems. In most cases, however, FDA believes that where electronic records are accurately and completely transcribed from one system to another, it would not be necessary to maintain older systems. 31. One comment requested that proposed part 11 be revised to give examples of electronic records subject to FDA inspection, including pharmaceutical and medical device production records, in order to reduce the need for questions. The agency does not believe that it is necessary to include examples of records it might inspect because the addition of such examples might raise questions about the agency’s intent to inspect other records that were not identified. 32. One comment said that the regulation should state that certain security related information, such as private keys attendant to cryptographic implementation, is not intended to be subject to inspection, although procedures related to keeping such keys confidential can be subject to inspection. The agency would not routinely seek to inspect especially sensitive information, such as passwords or private keys, attendant to security systems. However, the agency reserves the right to conduct such inspections, consistent with statutory limitations, to enforce the provisions of the act and related statutes. It may be necessary, for example, in investigating cases of suspected fraud, to access and determine passwords and private keys, in the same manner as the agency may obtain specimens of handwritten signatures (‘‘exemplars’’). Should there be any reservations about such inspections, persons may, of course, change their passwords and private keys after FDA inspection. 33. One comment asked how persons were expected to meet the proposed requirement, under § 11.1(e), that computer systems be readily available for inspection when such systems include geographically dispersed networks. Another comment said FDA investigators should not be permitted to access industry computer systems as part of inspections because investigators would be untrained users. The agency intends to inspect those parts of electronic record or signature systems that have a bearing on the trustworthiness and reliability of electronic records and electronic signatures under part 11. For geographically dispersed systems, inspection at a given location would extend to operations, procedures, and controls at that location, along with interaction of that local system with the wider network. The agency would inspect other locations of the network in a separate but coordinated manner, much the same way the agency currently conducts inspections of firms that have multiple facilities in different parts of the country and outside of the United States. FDA does not believe it is reasonable to rule out computer system access as part of an inspection of electronic record or signature systems. Historically, FDA investigators observe the actions of establishment employees, and (with the cooperation of establishment management) sometimes request that those employees perform some of their assigned tasks to determine the degree of compliance with established requirements. However, there may be times when FDA investigators need to access a system directly. The agency is aware that such access will generally require the cooperation of and, to some degree, instruction by the firms being inspected. As new, complex technologies emerge, FDA will need to develop and implement new inspectional methods in the context of those technologies. V. Implementation (§ 11.2) 34. Proposed § 11.2(a) stated that for ‘‘records required by chapter I of this title to be maintained, but not submitted to the agency, persons may use electronic records/signatures in lieu of paper records/conventional signatures, in whole or in part, * * *.’’ Two comments requested clarification of the term ‘‘conventional signatures.’’ One comment suggested that the term ‘‘traditional signatures’’ be used instead. Another suggested rewording in order to clarify the slash in the phrase ‘‘records/ signatures.’’ The agency advises that the term ‘‘conventional signature’’ means handwritten signature. The agency agrees that the term ‘‘traditional signature’’ is preferable, and has revised § 11.2(a) and (b) accordingly. The agency has also clarified proposed § 11.2(a) by replacing the slash with the word ‘‘or.’’ 35. One comment asked if the term ‘‘persons’’ in proposed § 11.2(b) would include devices because computer systems frequently apply digital time stamps on records automatically, without direct human intervention. The agency advises that the term ‘‘persons’’ excludes devices. The agency does not consider the application of a time stamp to be the application of a signature. 36. Proposed § 11.2(b)(2) provides conditions under which electronic records or signatures could be submitted to the agency in lieu of paper. One condition is that a document, or part of a document, must be identified in a public docket as being the type of submission the agency will accept in electronic form. Two comments addressed the nature of the submissions to the public docket. One comment asked that the agency provide specifics, such as the mechanism for updating the docket and the frequency of such updates. One comment suggested making the docket available to the public by electronic means. Another comment suggested that acceptance procedures be uniform among agency units and that electronic mail be used to hold consultations with the agency. One comment encouraged the agency units receiving the submissions to work closely with regulated industry to ensure that no segment of industry is unduly burdened and that agency guidance is widely accepted. The agency intends to develop efficient electronic records acceptance procedures that afford receiving units sufficient flexibility to deal with submissions according to their capabilities. Although agencywide uniformity is a laudable objective, to attain such flexibility it may be necessary to accommodate some differences among receiving units. The agency considers of primary importance, however, that all part 11 submissions be trustworthy, reliable, and in keeping with FDA regulatory activity. The agency expects to work closely with industry to help ensure that the mechanics and logistics of accepting electronic submissions do not pose any undue burdens. However, the agency expects persons to consult with the 13440 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations intended receiving units on the technical aspects of the submission, such as media, method of transmission, file format, archiving needs, and technical protocols. Such consultations will ensure that submissions are compatible with the receiving units’ capabilities. The agency has revised proposed § 11.2(b)(2) to clarify this expectation. Regarding the public docket, the agency is not at this time establishing a fixed schedule for updating what types of documents are acceptable for submission because the agency expects the docket to change and grow at a rate that cannot be predicted. The agency may, however, establish a schedule for updating the docket in the future. The agency agrees that making the docket available electronically is advisable and will explore this option. Elsewhere in this issue of the Federal Register, FDA is providing further information on this docket. VI. Definitions (§ 11.3) 37. One comment questioned the incorporation in proposed § 11.3(a) of definitions under section 201 of the act (21 U.S.C. 321), noting that other FDA regulations (such as 21 CFR parts 807 and 820) lack such incorporation, and suggested that it be deleted. The agency has retained the incorporation by reference to definitions under section 201 of the act because those definitions are applicable to part 11. 38. One comment suggested adding the following definition for the term ‘‘digital signature:’’ ‘‘data appended to, or a cryptographic transformation of, a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery, e.g., by the recipient.’’ The agency agrees that the term digital signature should be defined and has added new § 11.3(b)(5) to provide a definition for digital signature that is consistent with the Federal Information Processing Standard 186, issued May 19, 1995, and effective December 1, 1995, by the U.S. Department of Commerce, National Institute of Standards and Technology (NIST). Generally, a digital signature is ‘‘an electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified.’’ FDA advises that the set of rules and parameters is established in each digital signature standard. 39. Several comments suggested various modifications of the proposed definition of biometric/behavioral links, and suggested revisions that would exclude typing a password or identification code which, the comments noted, is a repeatable action. The comments suggested that actions be unique and measurable to meet the intent of a biometric method. The agency agrees that the proposed definition of biometric/behavioral links should be revised to clarify the agency’s intent that repetitive actions alone, such as typing an identification code and password, are not considered to be biometric in nature. Because comments also indicated that it would be preferable to simplify the term, the agency is changing the term ‘‘biometric/ behavioral link’’ to ‘‘biometrics.’’ Accordingly, § 11.3(b)(3) defines the term ‘‘biometrics’’ to mean ‘‘a method of verifying an individual’s identity based on measurement of the individual’s physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable.’’ 40. One comment said that the agency should identify what biometric methods are acceptable to verify a person’s identity and what validation acceptance criteria the agency has used to determine that biometric technologies are superior to other methods, such as use of identification codes and passwords. The agency believes that there is a wide variety of acceptable technologies, regardless of whether they are based on biometrics, and regardless of the particular type of biometric mechanism that may be used. Under part 11, electronic signatures that employ at least two distinct identification components such as identification codes and passwords, and electronic signatures based on biometrics are equally acceptable substitutes for traditional handwritten signatures. Furthermore, all electronic record systems are subject to the same requirements of subpart B of part 11 regardless of the electronic signature technology being used. These provisions include requirements for validation. Regarding the comment’s suggestion that FDA apply quantitative acceptance criteria, the agency is not seeking to set specific numerical standards or statistical performance criteria in determining the threshold of acceptability for any type of technology. If such standards were to be set for biometrics-based electronic signatures, similar numerical performance and reliability requirements would have to be applied to other technologies as well. The agency advises, however, that the differences between system controls for biometrics-based electronic signatures and other electronic signatures are a result of the premise that biometrics- based electronic signatures, by their nature, are less prone to be compromised than other methods such as identification codes and passwords. Should it become evident that additional controls are warranted for biometrics-based electronic signatures, the agency will propose to revise part 11 accordingly. 41. Proposed § 11.3(b)(4) defined a closed system as an environment in which there is communication among multiple persons, and where system access is restricted to people who are part of the organization that operates the system. Many comments requested clarification of the term ‘‘organization’’ and stated that the rule should account for persons who, though not strictly employees of the operating organization, are nonetheless obligated to it in some manner, or who would otherwise be granted system access by the operating organization. As examples of such persons, the comments cited outside contractors, suppliers, temporary employees, and consultants. The comments suggested a variety of alternative wording, including a change of emphasis from organizational membership to organizational control over system access. One comment requested clarification of whether the rule intends to address specific disciplines within a company. Based on the comments, the agency has revised the proposed definition of closed system to state ‘‘an environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system.’’ The agency agrees that the most important factor in classifying a system as closed or open is whether the persons responsible for the content of the electronic records control access to the system containing those records. A system is closed if access is controlled by persons responsible for the content of the records. If those persons do not control such access, then the system is open because the records may be read, modified, or compromised by others to the possible detriment of the persons responsible for record content. Hence, those responsible for the records would need to take appropriate additional measures in an open system to protect those records from being read, modified, destroyed, or otherwise compromised by unauthorized and potentially unknown parties. The agency does not believe it is necessary to codify the basis or criteria for authorizing system access, such as existence of a fiduciary 13441Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations responsibility or contractual relationship. By being silent on such criteria, the rule affords maximum flexibility to organizations by permitting them to determine those criteria for themselves. 42. Concerning the proposed definition of closed system, one comment suggested adding the words ‘‘or devices’’ after ‘‘persons’’ because communications may involve nonhuman entities. The agency does not believe it is necessary to adopt the suggested revision because the primary intent of the regulation is to address communication among humans, not devices. 43. One comment suggested defining a closed system in terms of functional characteristics that include physical access control, having professionally written and approved procedures with employees and supervisors trained to follow them, conducting investigations when abnormalities may have occurred, and being under legal obligation to the organization responsible for operating the system. The agency agrees that the functional characteristics cited by the comment are appropriate for a closed system, but has decided that it is unnecessary to include them in the definition. The functional characteristics themselves, however, such as physical access controls, are expressed as requirements elsewhere in part 11. 44. Two comments said that the agency should regard as closed a system in which dial-in access via public phone lines is permitted, but where access is authorized by, and under the control of, the organization that operates the system. The agency advises that dial-in access over public phone lines could be considered part of a closed system where access to the system that holds the electronic records is under the control of the persons responsible for the content of those records. The agency cautions, however, that, where an organization’s electronic records are stored on systems operated by third parties, such as commercial online services, access would be under control of the third parties and the agency would regard such a system as being open. The agency also cautions that, by permitting access to its systems by public phone lines, organizations lose the added security that results from restricting physical access to computer terminal and other input devices. In such cases, the agency believes firms would be prudent to implement additional security measures above and beyond those controls that the organization would use if the access device was within its facility and commensurate with the potential consequences of such unauthorized access. Such additional controls might include, for example, use of input device checks, caller identification checks (phone caller identification), call backs, and security cards. 45. Proposed § 11.3(b)(5) defined electronic record as a document or writing comprised of any combination of text, graphic representation, data, audio information, or video information, that is created, modified, maintained, or transmitted in digital form by a computer or related system. Many comments suggested revising the proposed definition to reflect more accurately the nature of electronic records and how they differ from paper records. Some comments suggested distinguishing between machine readable records and paper records created by machine. Some comments noted that the term ‘‘document or writing’’ is inappropriate for electronic records because electronic records could be any combination of pieces of information assembled (sometimes on a transient basis) from many noncontiguous places, and because the term does not accurately describe such electronic information as raw data or voice mail. Two comments suggested that the agency adopt definitions of electronic record that were established, respectively, by the United Nations Commission on International Trade Law (UNCITRAL) Working Group on Electronic Data Interchange, and the American National Standards Institute/ Institute of Electrical and Electronic Engineers Software Engineering (ANSI/ IEEE) Standard (729–1983). The agency agrees with the suggested revisions and has revised the definition of ‘‘electronic record’’ to emphasize this unique nature and to clarify that the agency does not regard a paper record to be an electronic record simply because it was created by a computer system. The agency has removed ‘‘document or writing’’ from this definition and elsewhere in part 11 for the sake of clarity, simplicity, and consistency. However, the agency believes it is preferable to adapt or modify the words ‘‘document’’ and ‘‘writing’’ to electronic technologies rather than discard them entirely from the lexicon of computer technology. The agency is aware that the terms ‘‘document’’ and ‘‘electronic document’’ are used in contexts that clearly do not intend to describe paper. Therefore, the agency considers the terms ‘‘electronic record’’ and ‘‘electronic document’’ to be generally synonymous and may use the terms ‘‘writing,’’ ‘‘electronic document,’’ or ‘‘document’’ in other publications to describe records in electronic form. The agency believes that such usage is a prudent conservation of language and is consistent with the use of other terms and expressions that have roots in older technologies, but have nonetheless been adapted to newer technologies. Such terms include telephone ‘‘dialing,’’ internal combustion engine ‘‘horse power,’’ electric light luminance expressed as ‘‘foot candles,’’ and (more relevant to computer technology) execution of a ‘‘carriage return.’’ Accordingly, the agency has revised the definition of electronic record to mean ‘‘any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system.’’ 46. Proposed § 11.3(b)(6) defined an electronic signature as the entry in the form of a magnetic impulse or other form of computer data compilation of any symbol or series of symbols, executed, adopted or authorized by a person to be the legally binding equivalent of the person’s handwritten signature. One comment supported the definition as proposed, noting its consistency with dictionary definitions (Random House Dictionary of the English Language, Unabridged Ed. 1983, and American Heritage Dictionary, 1982). Several other comments, however, suggested revisions. One comment suggested replacing ‘‘electronic signature’’ with ‘‘computer based signature,’’ ‘‘authentication,’’ or ‘‘computer based authentication’’ because ‘‘electronic signature’’ is imprecise and lacks clear and recognized meaning in the information security and legal professions. The comment suggested a definition closer to the UNCITRAL draft definition: (1) [a] method used to identify the originator of the data message and to indicate the originator’s approval of the information contained therein; and (2) that method is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all circumstances, including any agreement between the originator and the addressee of the data message. One comment suggested replacing ‘‘electronic signature’’ with ‘‘electronic identification’’ or ‘‘electronic authorization’’ because the terms include many types of technologies that are not easily distinguishable and because the preamble to the proposed rule gave a rationale for using ‘‘electronic signature’’ that was too ‘‘esoteric for practical consideration.’’ 13442 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations The agency disagrees that ‘‘electronic signature’’ as proposed should be replaced with other terms and definitions. As noted in the preamble to the proposed rule, the agency believes that it is vital to retain the word ‘‘signature’’ to maintain the equivalence and significance of various electronic technologies with the traditional handwritten signature. By not using the word ‘‘signature,’’ people may treat the electronic alternatives as less important, less binding, and less in need of controls to prevent falsification. The agency also believes that use of the word signature provides a logical bridge between paper and electronic technologies that facilitates the general transition from paper to electronic environments. The term helps people comply with current FDA regulations that specifically call for signatures. Nor does the agency agree that this reasoning is beyond the reach of practical consideration. The agency declines to accept the suggested UNCITRAL definition because it is too narrow in context in that there is not always a specified message addressee for electronic records required by FDA regulations (e.g., a batch production record does not have a specific ‘‘addressee’’). 47. Concerning the proposed definition of ‘‘electronic signature,’’ other comments suggested deletion of the term ‘‘magnetic impulse’’ to render the term media neutral and thus allow for such alternatives as an optical disk. Comments also suggested that the term ‘‘entry’’ was unclear and recommended its deletion. Two comments suggested revisions that would classify symbols as an electronic signature only when they are committed to permanent storage because not every computer entry is a signature and processing to permanent storage must occur to indicate completion of processing. The agency advises that the proposal did not limit electronic signature recordings to ‘‘magnetic impulse’’ because the proposed definition added, ‘‘or other form of computer data * * *.’’ However, in keeping with the agency’s intent to accept a broad range of technologies, the terms ‘‘magnetic impulse’’ and ‘‘entry’’ have been removed from the proposed definition. The agency believes that recording of computer data to ‘‘permanent’’ storage is not a necessary or warranted qualifier because it is not relevant to the concept of equivalence to a handwritten signature. In addition, use of the qualifier regarding permanent storage could impede detection of falsified records if, for example, the signed falsified record was deleted after a predetermined period (thus, technically not recorded to ‘‘permanent’’ storage). An individual could disavow a signature because the record had ceased to exist. For consistency with the proposed definition of handwritten signature, and to clarify that electronic signatures are those of individual human beings, and not those of organizations (as included in the act’s definition of ‘‘person’’), FDA is changing ‘‘person’’ to ‘‘individual’’ in the final rule. Accordingly, § 11.3(b)(7) defines electronic signature as a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual’s handwritten signature. 48. Proposed § 11.3(b)(7) (redesignated § 11.3(b)(8) in the final rule) defined ‘‘handwritten signature’’ as the name of an individual, handwritten in script by that individual, executed or adopted with the present intention to authenticate a writing in a permanent form. The act of signing with a writing or marking instrument such as a pen or stylus is preserved. The proposed definition also stated that the scripted name, while conventionally applied to paper, may also be applied to other devices which capture the written name. Many comments addressed this proposed definition. Two comments suggested that it be deleted on the grounds it is redundant and that, when handwritten signatures are recorded electronically, the result fits the definition of electronic signature. The agency disagrees that the definition of handwritten signature should be deleted. In stating the criteria under which electronic signatures may be used in place of traditional handwritten signatures, the agency believes it is necessary to define handwritten signature. In addition, the agency believes that it is necessary to distinguish handwritten signatures from electronic signatures because, with handwritten signatures, the traditional act of signing one’s name is preserved. Although the handwritten signature recorded electronically and electronic signatures, as defined in part 11, may both ultimately result in magnetic impulses or other forms of computerized symbol representations, the means of achieving those recordings and, more importantly, the controls needed to ensure their reliability and trustworthiness are quite different. In addition, the agency believes that a definition for handwritten signature is warranted to accommodate persons who wish to implement record systems that are combinations of paper and electronic technologies. 49. Several comments suggested replacing the reference to ‘‘scripted name’’ in the proposed definition of handwritten signature with ‘‘legal mark’’ so as to accommodate individuals who are physically unable to write their names in script. The comments asserted that the term ‘‘legal mark’’ would bring the definition to closer agreement with generally recognized legal interpretations of signature. The agency agrees and has added the term ‘‘legal mark’’ to the definition of handwritten signature. 50. One comment recommended that the regulation state that, when the handwritten signature is not the result of the act of signing with a writing or marking instrument, but is applied to another device that captures the written name, a system should verify that the owner of the signature has authorized the use of the handwritten signature. The agency declines to accept this comment because, if the act of signing or marking is not preserved, the type of signature would not be considered a handwritten signature. The comment appears to be referring to instances in which one person authorizes someone else to use his or her stamp or device. The agency views this as inappropriate when the signed record does not clearly show that the stamp owner did not actually execute the signature. As discussed elsewhere in this preamble, the agency believes that where one person authorizes another to sign a document on his or her behalf, the second person must sign his or her own name (not the name of the first person) along with some notation that, in doing so, he or she is acting in the capacity, or on behalf, of the first person. 51. One comment suggested that where handwritten signatures are captured by devices, there should be a register of manually written signatures to enable comparison for authenticity and the register also include the typed names of individuals. The agency agrees that the practice of establishing a signature register has merit, but does not believe that it is necessary, in light of other part 11 controls. As noted elsewhere in this preamble (in the discussion of proposed § 11.50), the agency agrees that human readable displays of electronic records must display the name of the signer. 52. Several comments suggested various editorial changes to the proposed definition of handwritten signature including: (1) Changing the word ‘‘also’’ in the last sentence to ‘‘alternatively,’’ (2) clarifying the 13443Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations difference between the words ‘‘individual’’ and ‘‘person,’’ (3) deleting the words ‘‘in a permanent form,’’ and (4) changing ‘‘preserved’’ to ‘‘permitted.’’ One comment asserted that the last sentence of the proposed definition was unnecessary. The agency has revised the definition of handwritten signature to clarify its intent and to keep the regulation as flexible as possible. The agency believes that the last sentence of the proposed definition is needed to address devices that capture handwritten signatures. The agency is not adopting the suggestion that the word ‘‘preserved’’ be changed to ‘‘permitted’’ because ‘‘preserved’’ more accurately states the agency’s intent and is a qualifier to help distinguish handwritten signatures from others. The agency advises that the word ‘‘individual’’ is used, rather than ‘‘person,’’ because the act’s definition of person extends beyond individual human beings to companies and partnerships. The agency has retained the term ‘‘permanent’’ to discourage the use of pencils, but recognizes that ‘‘permanent’’ does not mean eternal. 53. One comment asked whether a signature that is first handwritten and then captured electronically (e.g., by scanning) is an electronic signature or a handwritten signature, and asked how a handwritten signature captured electronically (e.g., by using a stylus- sensing pad device) that is affixed to a paper copy of an electronic record would be classified. FDA advises that when the act of signing with a stylus, for example, is preserved, even when applied to an electronic device, the result is a handwritten signature. The subsequent printout of the signature on paper would not change the classification of the original method used to execute the signature. 54. One comment asserted that a handwritten signature recorded electronically should be considered to be an electronic signature, based on the medium used to capture the signature. The comment argued that the word signature should be limited to paper technology. The agency disagrees and believes it is important to classify a signature as handwritten based upon the preserved action of signing with a stylus or other writing instrument. 55. One comment asked if the definition of handwritten signature encompasses handwritten initials. The agency advises that, as revised, the definition of handwritten signature includes handwritten initials if the initials constitute the legal mark executed or adopted with the present intention to authenticate a writing in a permanent form, and where the method of recording such initials involves the act of writing with a pen or stylus. 56. Proposed § 11.3(b)(8) (redesignated as § 11.3(b)(9) in the final rule) defined an open system as an environment in which there is electronic communication among multiple persons, where system access extends to people who are not part of the organization that operates the system. Several comments suggested that, for simplicity, the agency define ‘‘open system’’ as any system that does not meet the definition of a closed system. One comment suggested that the definition be deleted on the grounds it is redundant, and that it is the responsibility of individual firms to take appropriate steps to ensure the validity and security of applications and information, regardless of whether systems are open or closed. Other comments suggested definitions of ‘‘open system’’ that were opposite to what they suggested for a closed system. The agency has revised the definition of open system to mean ‘‘an environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system.’’ The agency believes that, for clarity, the definition should stand on its own rather than as any system that is not closed. The agency rejects the suggestion that the term need not be defined at all because FDA believes that controls for open systems merit distinct provisions in part 11 and defining the term is basic to understanding which requirements apply to a given system. The agency agrees that companies have the responsibility to take steps to ensure the validity and security of their applications and information. However, FDA finds it necessary to establish part 11 as minimal requirements to help ensure that those steps are, in fact, acceptable. VII. Electronic Records—Controls for Closed Systems (§ 11.10) The introductory paragraph of proposed § 11.10 states that: Closed systems used to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine. * * * The rest of the section lists specific procedures and controls. 57. One comment expressed full support for the list of proposed controls, calling them generally appropriate and stated that the agency is correctly accommodating the fluid nature of various electronic record and electronic signature technologies. Another comment, however, suggested that controls should not be implemented at the time electronic records are first created, but rather only after a document is accepted by a company. The agency disagrees with this suggestion. To ignore such controls at a stage before official acceptance risks compromising the record. For example, if ‘‘preacceptance’’ records are signed by technical personnel, it is vital to ensure the integrity of their electronic signatures to prevent record alteration. The need for such integrity is no less important at preacceptance stages than at later stages when managers officially accept the records. The possibility exists that some might seek to disavow, or avoid FDA examination of, pertinent records by declaring they had not been formally ‘‘accepted.’’ In addition, FDA routinely can and does inspect evolving paper documents (e.g., standard operating procedures and validation protocols) even though they have yet to receive a firm’s final acceptance. 58. One comment said proposed § 11.10 contained insufficient requirements for firms to conduct periodic inspection and monitoring of their own systems and procedures to ensure compliance with the regulations. The comment also called for a clear identification of the personnel in a firm who would be responsible for system implementation, operation, change control, and monitoring. The agency does not believe it is necessary at this time to codify a self- auditing requirement, as suggested by the comment. Rather, the agency intends to afford organizations flexibility in establishing their own internal mechanisms to ensure compliance with part 11. Self-audits, however, may be considered as a general control, within the context of the introductory paragraph of § 11.10. The agency encourages firms to conduct such audits periodically as part of an overall approach to ensure compliance with FDA regulations generally. Likewise, the agency does not believe it is necessary or practical to codify which individuals in an organization should be responsible for compliance with various provisions of part 11. However, ultimate responsibility for part 11 will generally rest with persons responsible for electronic record content, just as responsibility for compliance with paper record requirements generally lies with those responsible for the record’s content. 13444 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations 59. Several comments interpreted proposed § 11.10 as applying all procedures and controls to closed systems and suggested revising it to permit firms to apply only those procedures and controls they deem necessary for their own operations, because some requirements are excessive in some cases. The agency advises that, where a given procedure or control is not intended to apply in all cases, the language of the rule so indicates. Specifically, use of operational checks (§ 11.10(f)) and device checks (§ 11.10(h)) is not required in all cases. The remaining requirements do apply in all cases and are, in the agency’s opinion, the minimum needed to ensure the trustworthiness and reliability of electronic record systems. In addition, certain controls that firms deem adequate for their routine internal operations might nonetheless leave records vulnerable to manipulation and, thus, may be incompatible with FDA’s responsibility to protect public health. The suggested revision would effectively permit firms to implement various controls selectively and possibly shield records from FDA, employ unqualified personnel, or permit employees to evade responsibility for fraudulent use of their electronic signatures. The agency believes that the controls in § 11.10 are vital, and notes that almost all of them were suggested by comments on the ANPRM. The agency believes the wording of the regulation nonetheless permits firms maximum flexibility in how to meet those requirements. 60. Two comments suggested that the word ‘‘confidentiality’’ in the introductory paragraph of proposed § 11.10 be deleted because it is unnecessary and inappropriate. The comments stated that firms should determine if certain records need to be confidential, and that as long as records could not be altered or deleted without appropriate authority, it would not matter whether they could read the records. The agency agrees that not all records required by FDA need to be kept confidential within a closed system and has revised the reference in the introductory paragraph of § 11.10 to state ‘‘* * * and, when appropriate, the confidentiality of electronic records.’’ The agency believes, however that the need for retaining the confidentiality of certain records is not diminished because viewers cannot change them. It may be prudent for persons to carefully assess the need for record confidentiality. (See, e.g., 21 CFR 1002.42, Confidentiality of records furnished by dealers and distributors, with respect to certain radiological health products.) In addition, FDA’s obligation to retain the confidentiality of information it receives in some submissions hinges on the degree to which the submitter maintains confidentiality, even within its own organization. (See, e.g., 21 CFR 720.8(b) with respect to cosmetic ingredient information in voluntary filings of cosmetic product ingredient and cosmetic raw material composition statements.) 61. One comment asked if the procedures and controls required by proposed § 11.10 were to be built into software or if they could exist in written form. The agency expects that, by their nature, some procedures and controls, such as use of time-stamped audit trails and operational checks, will be built into hardware and software. Others, such as validation and determination of personnel qualifications, may be implemented in any appropriate manner regardless of whether the mechanisms are driven by, or are external to, software or hardware. To clarify this intent, the agency has revised the introductory paragraph of proposed § 11.10 to read, in part, ‘‘Persons who use closed systems to create, modify * * *.’’ Likewise, for clarity and consistency, the agency is introducing the same phrase, ‘‘persons who use * * *’’ in §§ 11.30 and 11.300. 62. One comment contended that the distinction between open and closed systems should not be predominant because a $100,000 transaction in a closed system should not have fewer controls than a $1 transaction in an open system. The agency believes that, within part 11, firms have the flexibility they need to adjust the extent and stringency of controls based on any factors they choose, including the economic value of the transaction. The agency does not believe it is necessary to modify part 11 at this time so as to add economic criteria. 63. One comment suggested that the reference to repudiation in the introductory paragraph of § 11.10 should be deleted because repudiation can occur at any time in legal proceedings. Another comment, noting that the proposed rule appeared to address only nonrepudiation of a signer, said the rule should address nonrepudiation of record ‘‘genuineness’’ or extend to nonrepudiation of submission, delivery, and receipt. The comment stated that some firms provide nonrepudiation services that can prevent someone from successfully claiming that a record has been altered. In response to the first comment, the agency does not agree that the reference to repudiation should be deleted because reducing the likelihood that someone can readily repudiate an electronic signature as not his or her own, or that the signed record had been altered, is vital to the agency’s basic acceptance of electronic signatures. The agency is aware that the need to deter such repudiation has been addressed in many forums and publications that discuss electronic signatures. Absent adequate controls, FDA believes some people would be more likely to repudiate an electronically-signed record because of the relative ease with which electronic records may be altered and the ease with which one individual could impersonate another. The agency notes, however, that the rule does not call for nonrepudiation as an absolute guarantee, but requires that the signer cannot ‘‘readily’’ repudiate the signature. In response to the second comment, the agency agrees that it is also important to establish nonrepudiation of submission, delivery, and receipt of electronic records, but advises that, for purposes of § 11.10, the agency’s intent is to limit nonrepudiation to the genuineness of the signer’s record. In other words, an individual should not be able to readily say that: (1) He or she did not, in fact, sign the record; (2) a given electronic record containing the individual’s signature was not, in fact, the record that the person signed; or (3) the originally signed electronic record had been altered after having been signed. 64. Proposed § 11.10(a) states that controls for closed systems are to include the validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to conclusively discern invalid or altered records. Many comments objected to this proposed requirement because the word ‘‘conclusively’’ inferred an unreasonably high and unattainable standard, one which is not applied to paper records. The agency intends to apply the same validation concepts and standards to electronic record and electronic signature systems as it does to paper systems. As such, FDA does not intend the word ‘‘conclusively’’ to suggest an unattainable absolute and has, therefore, deleted the word from the final rule. 65. One comment suggested qualifying the proposed validation requirement in § 11.10(a) to state that validation be performed ‘‘where 13445Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations necessary’’ and argued that validation of commercially available software is not necessary because such software has already been thoroughly validated. The comment acknowledged that validation may be required for application programs written by manufacturers and others for special needs. The agency disagrees with the comment’s claim that all commercial software has been validated. The agency believes that commercial availability is no guarantee that software has undergone ‘‘thorough validation’’ and is unaware of any regulatory entity that has jurisdiction over general purpose software producers. The agency notes that, in general, commercial software packages are accompanied not by statements of suitability or compliance with established standards, but rather by disclaimers as to their fitness for use. The agency is aware of the complex and sometimes controversial issues in validating commercial software. However, the need to validate such software is not diminished by the fact that it was not written by those who will use the software. In the future, the agency may provide guidance on validation of commercial software used in electronic record systems. FDA has addressed the matter of software validation in general in such documents as the ‘‘Draft Guideline for the Validation of Blood Establishment Computer Systems,’’ which is available from the Manufacturers Assistance and Communications Staff, Center for Biologics Evaluation and Research (HFM–42), Food and Drug Administration, 1401 Rockville Pike, Rockville, MD 20852–1448, 301–594– 2000. This guideline is also available by sending e-mail to the following Internet address: CBERlINFO@A1.CBER.FDA.GOV). For the purposes of part 11, however, the agency believes it is vital to retain the validation requirement. 66. One comment requested an explanation of what was meant by the phrase ‘‘consistent intended’’ in proposed § 11.10(a) and why ‘‘consistent performance’’ was not used instead. The comment suggested that the rule should distinguish consistent intended performance from well- recognized service ‘‘availability.’’ The agency advises that the phrase ‘‘consistent intended performance’’ relates to the general principle of validation that planned and expected performance is based upon predetermined design specifications (hence, ‘‘intended’’). This concept is in accord with the agency’s 1987 ‘‘Guideline on General Principles of Process Validation,’’ which is available from the Division of Manufacturing and Product Quality, Center for Drug Evaluation and Research (HFD–320), Food and Drug Administration, 7520 Standish Pl., Rockville, MD 20855, 301– 594–0093). This guideline defines validation as establishing documented evidence that provides a high degree of assurance that a specific process will consistently produce a product meeting its predetermined specifications and quality attributes. The agency believes that the comment’s concepts are accommodated by this definition to the extent that system ‘‘availability’’ may be one of the predetermined specifications or quality attributes. 67. One comment said the rule should indicate whether validation of systems does, or should, require any certification or accreditation. The agency believes that although certification or accreditation may be a part of validation of some systems, such certification or accreditation is not necessary in all cases, outside of the context of any such approvals within an organization itself. Therefore, part 11 is silent on the matter. 68. One comment said the rule should clarify whether system validation should be capable of discerning the absence of electronic records, in light of agency concerns about falsification. The comment added that the agency’s concerns regarding invalid or altered records can be mitigated by use of cryptographically enhanced methods, including secure time and date stamping. The agency does not believe that it is necessary at this time to include an explicit requirement that systems be capable of detecting the absence of records. The agency advises that the requirement in § 11.10(e) for audit trails of operator actions would cover those actions intended to delete records. Thus, the agency would expect firms to document such deletions, and would expect the audit trail mechanisms to be included in the validation of the electronic records system. 69. Proposed § 11.10(b) states that controls for closed systems must include the ability to generate true copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency, and that if there were any questions regarding the ability of the agency to perform such review and copying, persons should contact the agency. Several comments objected to the requirement for ‘‘true’’ copies of electronic records. The comments asserted that information in an original record (as may be contained in a database) may be presented in a copy in a different format that may be more usable. The comments concluded that, to generate precise ‘‘true’’ copies of electronic records, firms may have to retain the hardware and software that had been used to create those records in the first place (even when such hardware and software had been replaced by newer systems). The comments pointed out that firms may have to provide FDA with the application logic for ‘‘true’’ copies, and that this may violate copyright provisions. One comment illustrated the difference between ‘‘true’’ copies and other equally reliable, but not exact, copies of electronic records by noting that pages from FDA’s paper publications (such as the CFR and the Compliance Policy Guidance Manual) look quite different from electronic copies posted to FDA’s bulletin board. The comments suggested different wording that would effectively require accurate and complete copies, but not necessarily ‘‘true’’ copies. The agency agrees that providing exact copies of electronic records in the strictest meaning of the word ‘‘true’’ may not always be feasible. The agency nonetheless believes it is vital that copies of electronic records provided to FDA be accurate and complete. Accordingly, in § 11.10(b), ‘‘true’’ has been replaced with ‘‘accurate and complete.’’ The agency expects that this revision should obviate the potential problems noted in the comments. The revision should also reduce the costs of providing copies by making clear that firms need not maintain obsolete equipment in order to make copies that are ‘‘true’’ with respect to format and computer system. 70. Many comments objected to the proposed requirement that systems be capable of generating electronic copies of electronic records for FDA inspection and copying, although they generally agreed that it was appropriate to provide FDA with readable paper copies. Alternative wording was suggested that would make providing electronic copies optional, such that persons could provide FDA with nothing but paper copies if they so wished. The comments argued that providing FDA with electronic copies was unnecessary, unjustified, not practical considering the different types of computer systems that may be in use, and would unfairly limit firms in their selection of hardware and software if they could only use systems that matched FDA’s capabilities (capabilities which, it was argued, would not be uniform throughout the United States). One comment suggested that the rule specify 13446 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations a particular format, such as ASCII, for electronic copies to FDA. The agency disagrees with the assertion that FDA need only be provided with paper copies of electronic records. To operate effectively, the agency must function on the same technological plane as the industries it regulates. Just as firms realize efficiencies and benefits in the use of electronic records, FDA should be able to conduct audits efficiently and thoroughly using the same technology. For example, where firms perform computerized trend analyses of electronic records to improve their processes, FDA should be able to use computerized methods to audit electronic records (on site and off, as necessary) to detect trends, inconsistencies, and potential problem areas. If FDA is restricted to reviewing only paper copies of those records, the results would severely impede its operations. Inspections would take longer to complete, resulting in delays in approvals of new medical products, and expenditure of additional resources both by FDA (in performing the inspections and transcribing paper records to electronic format) and by the inspected firms, which would generate the paper copies and respond to questions during the resulting lengthened inspections. The agency believes that it also may be necessary to require that persons furnish certain electronic copies of electronic records to FDA because paper copies may not be accurate and complete if they lack certain audit trail (metadata) information. Such information may have a direct bearing on record trustworthiness and reliability. These data could include information, for example, on when certain items of electronic mail were sent and received. The agency notes that people who use different computer systems routinely provide each other with electronic copies of electronic records, and there are many current and developing tools to enable such sharing. For example, at a basic level, records may be created in, or transferred to, the ASCII format. Many different commercial programs have the capability to import from, and export to, electronic records having different formats. Firms use electronic data interchange (commonly known as EDI) and agreed upon transaction set formats to enable them to exchange copies of electronic records effectively. Third parties are also developing portable document formats to enable conversion among several diverse formats. Concerning the ability of FDA to handle different formats of electronic records, based upon the emergence of format conversion tools such as those mentioned above, the agency’s experience with electronic submissions such as computer assisted new drug applications (commonly known as CANDA’s), and the agency’s planned Submissions Management and Review Tracking System (commonly known as SMART), FDA is confident that it can work with firms to minimize any formatting difficulties. In addition, substitution of the words ‘‘accurate and complete’’ for ‘‘true,’’ as discussed in comment 69, should make it easier for firms to provide FDA with electronic copies of their electronic records. FDA does not believe it is necessary to specify any particular format in part 11 because it prefers, at this time, to afford industry and the agency more flexibility in deciding which formats meet the capabilities of all parties. Accordingly, the agency has revised proposed § 11.10(b) to read: The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency. Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records. 71. Proposed § 11.10(c) states that procedures and controls for closed systems must include the protection of records to enable their accurate and ready retrieval throughout the records retention period. One firm commented that, because it replaces systems often (about every 3 years), it may have to retain supplanted systems to meet these requirements. Another comment suggested that the rule be modified to require records retention only for as long as ‘‘legally mandated.’’ The agency notes that, as discussed in comment 70 of this document, persons would not necessarily have to retain supplanted hardware and software systems provided they implemented conversion capabilities when switching to replacement technologies. The agency does not believe it is necessary to add the qualifier ‘‘legally mandated’’ because the retention period for a given record will generally be established by the regulation that requires the record. Where the regulations do not specify a given time, the agency would expect firms to establish their own retention periods. Regardless of the basis for the retention period, FDA believes that the requirement that a given electronic record be protected to permit it to be accurately and readily retrieved for as long as it is kept is reasonable and necessary. 72. Proposed § 11.10(e) would require the use of time-stamped audit trails to document record changes, all write-to- file operations, and to independently record the date and time of operator entries and actions. Record changes must not obscure previously recorded information and such audit trail documentation must be retained for a period at least as long as required for the subject electronic documents and must be available for agency review and copying. Many comments objected to the proposed requirement that all write-to- file operations be documented in the audit trail because it is unnecessary to document all such operations. The comments said that this would require audit trails for such automated recordings as those made to internal buffers, data swap files, or temporary files created by word processing programs. The comments suggested revising § 11.10(e) to require audit trails only for operator entries and actions. Other comments suggested that audit trails should cover: (1) Operator data inputs but not actions, (2) only operator changes to records, (3) only critical write-to-file information, (4) operator changes as well as all actions, (5) only new entries, (6) only systems where data can be altered, (7) only information recorded by humans, (8) information recorded by both humans and devices, and (9) only entries made upon adoption of the records as official. One comment said audit trails should not be required for data acquisition systems, while another comment said audit trails are critical for data acquisition systems. It is the agency’s intent that the audit trail provide a record of essentially who did what, wrote what, and when. The write-to-file operations referenced in the proposed rule were not intended to cover the kind of ‘‘background’’ nonhuman recordings the comments identified. The agency considers such operator actions as activating a manufacturing sequence or turning off an alarm to warrant the same audit trail coverage as operator data entries in order to document a thorough history of events and those responsible for such events. Although FDA acknowledges that not every operator ‘‘action,’’ such as switching among screen displays, need be covered by audit trails, the agency is concerned that revising the rule to cover only ‘‘critical’’ operations would result in excluding much information and actions that are necessary to document events thoroughly. 13447Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations The agency believes that, in general, the kinds of operator actions that need to be covered by an audit trail are those important enough to memorialize in the electronic record itself. These are actions which, for the most part, would be recorded in corresponding paper records according to existing recordkeeping requirements. The agency intends that the audit trail capture operator actions (e.g., a command to open a valve) at the time they occur, and operator information (e.g., data entry) at the time the information is saved to the recording media (such as disk or tape), in much the same manner as such actions and information are memorialized on paper. The audit trail need not capture every keystroke and mistake that is held in a temporary buffer before those commitments. For example, where an operator records the lot number of an ingredient by typing the lot number, followed by the ‘‘return key’’ (where pressing the return key would cause the information to be saved to a disk file), the audit trail need not record every ‘‘backspace delete’’ key the operator may have previously pressed to correct a typing error. Subsequent ‘‘saved’’ corrections made after such a commitment, however, must be part of the audit trail. At this time, the agency’s primary concern relates to the integrity of human actions. Should the agency’s experience with part 11 demonstrate a need to require audit trails of device operations and entries, the agency will propose appropriate revisions to these regulations. Accordingly, the agency has revised proposed § 11.10(e) by removing reference to all write-to-file operations and clarifying that the audit trail is to cover operator entries and actions that create, modify, or delete electronic records. 73. A number of comments questioned whether proposed § 11.10(e) mandated that the audit trail be part of the electronic record itself or be kept as a separate record. Some comments interpreted the word ‘‘independently’’ as requiring a separate record. Several comments focused on the question of whether audit trails should be generated manually under operator control or automatically without operator control. One comment suggested a revision that would require audit trails to be generated by computer, because the system, not the operator, should record the audit trail. Other comments said the rule should facilitate date and time recording by software, not operators, and that the qualifier ‘‘securely’’ be added to the language describing the audit trail. One comment, noting that audit trails require validation and qualification to ensure that time stamps are accurate and independent, suggested that audit trails be required only when operator actions are witnessed. The agency advises that audit trail information may be contained as part of the electronic record itself or as a separate record. FDA does not intend to require one method over the other. The word ‘‘independently’’ is intended to require that the audit trail not be under the control of the operator and, to prevent ready alteration, that it be created independently of the operator. To maintain audit trail integrity, the agency believes it is vital that the audit trail be created by the computer system independently of operators. The agency believes it would defeat the purpose of audit trails to permit operators to write or change them. The agency believes that, at this time, the source of such independent audit trails may effectively be within the organization that creates the electronic record. However, the agency is aware of a situation under which time and date stamps are provided by trusted third parties outside of the creating organization. These third parties provide, in effect, a public electronic notary service. FDA will monitor development of such services in light of part 11 to determine if a requirement for such third party services should be included in these regulations. For now, the agency considers the advent of such services as recognition of the need for strict objectivity in recording time and date stamps. The agency disagrees with the premise that only witnessed operator actions need be covered by audit trails because the opportunities for record falsification are not limited to cases where operator actions are witnessed. Also, the need for validating audit trails does not diminish the need for their implementation. FDA agrees with the suggestion that the proposed rule be revised to require a secure audit trail—a concept inherent in having such a control at all. Accordingly, proposed § 11.10(e) has been revised to require use of ‘‘secure, computer-generated’’ audit trails. 74. A few comments objected to the requirement that time be recorded, in addition to dates, and suggested that time be recorded only when necessary and feasible. Other comments specifically supported the requirement for recording time, noting that time stamps make electronic signatures less vulnerable to fraud and abuse. The comments noted that, in any setting, there is a need to identify the date, time, and person responsible for adding to or changing a value. One of the comments suggested that the rule require recording the reason for making changes to electronic records. Other comments implicitly supported recording time. FDA believes that recording time is a critical element in documenting a sequence of events. Within a given day a number of events and operator actions may take place, and without recording time, documentation of those events would be incomplete. For example, without time stamps, it may be nearly impossible to determine such important sequencing as document approvals and revisions and the addition of ingredients in drug production. Thus, the element of time becomes vital to establishing an electronic record’s trustworthiness and reliability. The agency notes that comments on the ANPRM frequently identified use of date/time stamps as an important system control. Time recording, in the agency’s view, can also be an effective deterrent to records falsification. For example, event sequence codes alone would not necessarily document true time in a series of events, making falsification of that sequence easier if time stamps are not used. The agency believes it should be very easy for firms to implement time stamps because there is a clock in every computer and document management software, electronic mail systems and other electronic record/electronic applications, such as digital signature programs, commonly apply date and time stamps. The agency does not intend that new technologies, such as cryptographic technologies, will be needed to comply with this requirement. The agency believes that implementation of time stamps should be feasible in virtually all computer systems because effective computer operations depend upon internal clock or timing mechanisms and, in the agency’s experience, most computer systems are capable of precisely recording such time entries as when records are saved. The agency is implementing the time stamp requirement based on the understanding that all current computers, electronic document software, electronic mail, and related electronic record systems include such technologies. The agency also understands that time stamps are applied automatically by these systems, meaning firms would not have to install additional hardware, software, or incur additional burden to implement this control. In recognition of this, the agency wishes to clarify that a primary intent of this provision is to ensure that people take reasonable measures to 13448 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations ensure that those built in time stamps are accurate and that people do not alter them casually so as to readily mask unauthorized record changes. The agency advises that, although part 11 does not specify the time units (e.g., tenth of a second, or even the second) to be used, the agency expects the unit of time to be meaningful in terms of documenting human actions. The agency does not believe part 11 needs to require recording the reason for record changes because such a requirement, when needed, is already in place in existing regulations that pertain to the records themselves. 75. One comment stated that proposed § 11.10(e) should not require an electronic signature for each write-to- file operation. The agency advises that § 11.10(e) does not require an electronic signature as the means of authenticating each write-to-file operation. The agency expects the audit trail to document who did what and when, documentation that can be recorded without electronic signatures themselves. 76. Several comments, addressing the proposed requirement that record changes not obscure previously recorded information, suggested revising proposed § 11.10(e) to apply only to those entries intended to update previous information. The agency disagrees with the suggested revision because the rewording is too narrow. The agency believes that some record changes may not be ‘‘updates’’ but significant modifications or falsifications disguised as updates. All changes to existing records need to be documented, regardless of the reason, to maintain a complete and accurate history, to document individual responsibility, and to enable detection of record falsifications. 77. Several comments suggested replacing the word ‘‘document’’ with ‘‘record’’ in the phrase ‘‘Such audit trails shall be retained for a period at least as long as required for the subject electronic documents * * *’’ because not all electronic documents are electronic records and because the word document connotes paper. As discussed in section III.D. of this document, the agency equates electronic documents with electronic records, but for consistency, has changed the phrase to read ‘‘Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records * * *.’’ 78. Proposed § 11.10(k)(ii) (§ 11.10(k)(2) in this regulation) addresses electronic audit trails as a systems documentation control. One comment noted that this provision appears to be the same as the audit trail provision of proposed § 11.10(e) and requested clarification. The agency wishes to clarify that the kinds of records subject to audit trails in the two provisions cited by the comment are different. Section 11.10(e) pertains to those records that are required by existing regulations whereas § 11.10(k)(2) covers the system documentation records regarding overall controls (such as access privilege logs, or system operational specification diagrams). Accordingly, the first sentence of § 11.10(e) has been revised to read ‘‘Use of secure, computer- generated, time-stamped audit trails to independently record and date the time of operator entries and actions that create, modify, or delete electronic records.’’ 79. Proposed § 11.10(f) states that procedures and controls for closed systems must include the use of operational checks to enforce permitted sequencing of events, as appropriate. Two comments requested clarification of the agency’s intent regarding operational checks. The agency advises that the purpose of performing operational checks is to ensure that operations (such as manufacturing production steps and signings to indicate initiation or completion of those steps) are not executed outside of the predefined order established by the operating organization. 80. Several comments suggested that, for clarity, the phrase ‘‘operational checks’’ be modified to ‘‘operational system checks.’’ The agency agrees that the added modifier ‘‘system’’ more accurately reflects the agency’s intent that operational checks be performed by the computer systems and has revised proposed § 11.10(f) accordingly. 81. Several comments suggested revising proposed § 11.10(f) to clarify what is to be checked. The comments suggested that ‘‘steps’’ in addition to ‘‘events’’ be checked, only critical steps be checked, and that ‘‘records’’ also be checked. The agency intends the word ‘‘event’’ to include ‘‘steps’’ such as production steps. For clarity, however, the agency has revised proposed § 11.10(f) by adding the word ‘‘steps.’’ The agency does not, however, agree that only critical steps need be subject to operational checks because a given specific step or event may not be critical, yet it may be very important that the step be executed at the proper time relative to other steps or events. The agency does not believe it necessary to add the modifier ‘‘records’’ to proposed § 11.10(f) because creation, deletion, or modification of a record is an event. Should it be necessary to create, delete, or modify records in a particular sequence, operational system checks would ensure that the proper sequence is followed. 82. Proposed § 11.10(g) states that procedures and controls for closed systems must include the use of authority checks to ensure that only authorized individuals use the system, electronically sign a record, access the operation or device, alter a record, or perform the operation at hand. One comment suggested that the requirement for authority checks be qualified with the phrase ‘‘as appropriate,’’ on the basis that it would not be necessary for certain parts of a system, such as those not affecting an electronic record. The comment cited pushing an emergency stop button as an example of an event that would not require an authority check. Another comment suggested deleting the requirement on the basis that some records can be read by all employees in an organization. The agency advises that authority checks, and other controls under § 11.10, are intended to ensure the authenticity, integrity, and confidentiality of electronic records, and to ensure that signers cannot readily repudiate a signed record as not genuine. Functions outside of this context, such as pressing an emergency stop button, would not be covered. However, even in this example, the agency finds it doubtful that a firm would permit anyone, such as a stranger from outside the organization, to enter a facility and press the stop button at will regardless of the existence of an emergency. Thus, there would likely be some generalized authority checks built into the firm’s operations. The agency believes that few organizations freely permit anyone from within or without the operation to use their computer system, electronically sign a record, access workstations, alter records, or perform operations. It is likely that authority checks shape the activities of almost every organization. The nature, scope, and mechanism of performing such checks is up to the operating organization. FDA believes, however, that performing such checks is one of the most fundamental measures to ensure the integrity and trustworthiness of electronic records. Proposed § 11.10(g) does not preclude all employees from being permitted to read certain electronic records. However, the fact that some records may be read by all employees would not 13449Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations justify deleting the requirement for authority checks entirely. The agency believes it is highly unlikely that all of a firm’s employees would have authority to read, write, and sign all of its electronic records. 83. One comment said authority checks are appropriate for document access but not system access, and suggested that the phrase ‘‘access the operation or device’’ be deleted. The comment added, with respect to authority checks on signing records, that in many organizations, more than one individual has the authority to sign documents required under FDA regulations and that such authority should be vested with the individual as designated by the operating organization. Another comment said proposed § 11.10(g) should explicitly require access authority checks and suggested that the phrase ‘‘use the system’’ be changed to ‘‘access and use the system.’’ The comment also asked for clarification of the term ‘‘device.’’ The agency disagrees that authority checks should not be required for system access because, as discussed in comment 82 of this document, it is unlikely that a firm would permit any unauthorized individuals to access its computer systems. System access control is a basic security function because system integrity may be impeached even if the electronic records themselves are not directly accessed. For example, someone could access a system and change password requirements or otherwise override important security measures, enabling individuals to alter electronic records or read information that they were not authorized to see. The agency does not believe it necessary to add the qualifier ‘‘access and’’ because § 11.10(d) already requires that system access be limited to authorized individuals. The agency intends the word ‘‘device’’ to mean a computer system input or output device and has revised proposed § 11.10(g) to clarify this point. Concerning signature authority, FDA advises that the requirement for authority checks in no way limits organizations in authorizing individuals to sign multiple records. Firms may use any appropriate mechanism to implement such checks. Organizations do not have to embed a list of authorized signers in every record to perform authority checks. For example, a record may be linked to an authority code that identifies the title or organizational unit of people who may sign the record. Thus, employees who have that corresponding code, or belong to that unit, would be able to sign the record. Another way to implement controls would be to link a list of authorized records to a given individual, so that the system would permit the individual to sign only records in that list. 84. Two comments addressed authority checks within the context of PDMA and suggested that such checks not be required for drug sample receipt records. The comments said that different individuals may be authorized to accept drug samples at a physician’s office, and that the large number of physicians who would potentially qualify to receive samples would be too great to institute authority checks. The agency advises that authority checks need not be automated and that in the context of PDMA such checks would be as valid for electronic records as they are for paper sample requests because only licensed practitioners or their designees may accept delivery of drug samples. The agency, therefore, acknowledges that many individuals may legally accept samples and, thus, have the authority to sign electronic receipts. However, authority checks for electronic receipts could nonetheless be performed by sample manufacturer representatives by using the same procedures as the representatives use for paper receipts. Accordingly, the agency disagrees with the comment that proposed § 11.10(g) should not apply to PDMA sample receipts. The agency also advises that under PDMA, authority checks would be particularly important in the case of drug sample request records because only licensed practitioners may request drug samples. Accordingly, proposed § 11.10(g) has been revised to read: ‘‘Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand.’’ 85. Proposed § 11.10(h) states that procedures and controls for closed systems must include the use of device (e.g., terminal) location checks to determine, as appropriate, the validity of the source of data input or operational instruction. Several comments objected to this proposed requirement and suggested its deletion because it is: (1) Unnecessary (because the data source is always known by virtue of system design and validation); (2) problematic with respect to mobile devices, such as those connected by modem; (3) too much of a ‘‘how to;’’ (4) not explicit enough to tell firms what to do; (5) unnecessary in the case of PDMA; and (6) technically challenging. One comment stated that a device’s identification, in addition to location, may be important and suggested that the proposed rule be revised to require device identification as well. FDA advises that, by use of the term ‘‘as appropriate,’’ it does not intend to require device checks in all cases. The agency believes that these checks are warranted where only certain devices have been selected as legitimate sources of data input or commands. In such cases, the device checks would be used to determine if the data or command source was authorized. In a network, for example, it may be necessary for security reasons to limit issuance of critical commands to only one authorized workstation. The device check would typically interrogate the source of the command to ensure that only the authorized workstation, and not some other device, was, in fact, issuing the command. The same approach applies for remote sources connected by modem, to the extent that device identity interrogations could be made automatically regardless of where the portable devices were located. To clarify this concept, the agency has removed the word ‘‘location’’ from proposed § 11.10(h). Device checks would be necessary under PDMA when the source of commands or data is relevant to establishing authenticity, such as when licensed practitioners order drug samples directly from the manufacturer or authorized distributor without the intermediary of a sales representative. Device checks may also be useful to firms in documenting and identifying which sales representatives are transmitting drug sample requests from licensed practitioners. FDA believes that, although validation may demonstrate that a given terminal or workstation is technically capable of sending information from one point to another, validation alone would not be expected to address whether or not such device is authorized to do so. 86. Proposed § 11.10(i) states that procedures and controls for closed systems must include confirmation that persons who develop, maintain, or use electronic record or signature systems have the education, training, and experience to perform their assigned tasks. Several comments objected to the word ‘‘confirmation’’ because it is redundant with, or more restrictive than, existing regulations, and suggested alternate wording, such as ‘‘evidence.’’ Two comments interpreted the proposed wording as requiring that checks of personnel qualifications be performed automatically by computer systems that perform database type 13450 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations matches between functions and personnel training records. The agency advises that, although there may be some overlap in proposed § 11.10(i) and other regulations regarding the need for personnel to be properly qualified for their duties, part 11 is specific to functions regarding electronic records, an issue that other regulations may or may not adequately address. Therefore, the agency is retaining the requirement. The agency does not intend to require that the check of personnel qualifications be performed automatically by a computer system itself (although such automation is desirable). The agency has revised the introductory paragraph of § 11.10, as discussed in section VII. of this document, to clarify this point. The agency agrees that another word should be used in place of ‘‘confirmation,’’ and for clarity has selected ‘‘determination.’’ 87. One comment suggested that the word ‘‘training’’ be deleted because it has the same meaning as ‘‘education’’ and ‘‘experience,’’ and objected to the implied requirement for records of employee training. Another comment argued that applying this provision to system developers was irrelevant so long as systems perform as required and have been appropriately validated. The comment suggested revising proposed § 11.10(i) to require employees to be trained only ‘‘as necessary.’’ One comment, noting that training and experience are very important, suggested expanding proposed § 11.10(i) to require appropriate examination and certification of persons who perform certain high-risk, high-trust functions and tasks. The agency regards this requirement as fundamental to the proper operation of a facility. Personnel entrusted with important functions must have sufficient training to do their jobs. In FDA’s view, formal education (e.g., academic studies) and general industry experience would not necessarily prepare someone to begin specific, highly technical tasks at a given firm. Some degree of on-the-job training would be customary and expected. The agency believes that documentation of such training is also customary and not unreasonable. The agency also disagrees with the assertion that personnel qualifications of system developers are irrelevant. The qualifications of personnel who develop systems are relevant to the expected performance of the systems they build and their ability to explain and support these systems. Validation does not lessen the need for personnel to have the education, training, and experience to do their jobs properly. Indeed, it is highly unlikely that poorly qualified developers would be capable of producing a system that could be validated. The agency advises that, although the intent of proposed § 11.10(i) is to address qualifications of those personnel who develop systems within an organization, rather than external ‘‘vendors’’ per se, it is nonetheless vital that vendor personnel are likewise qualified to do their work. The agency agrees that periodic examination or certification of personnel who perform certain critical tasks is desirable. However, the agency does not believe that at this time a specific requirement for such examination and certification is necessary. 88. Proposed § 11.10(j) states that procedures and controls for closed systems must include the establishment of, and adherence to, written policies that hold individuals accountable and liable for actions initiated under their electronic signatures, so as to deter record and signature falsification. Several comments suggested changing the word ‘‘liable’’ to ‘‘responsible’’ because the word ‘‘responsible’’ is broader, more widely understood by employees, more positive and inclusive of elements of honesty and trust, and more supportive of a broad range of disciplinary measures. One comment argued that the requirement would not deter record or signature falsification because employee honesty and integrity cannot be regulated. The agency agrees because, although the words ‘‘responsible’’ and ‘‘liable’’ are generally synonymous, ‘‘responsible’’ is preferable because it is more positive and supportive of a broad range of disciplinary measures. There may be a general perception that electronic records and electronic signatures (particularly identification codes and passwords) are less significant and formal than traditional paper records and handwritten signatures. Individuals may therefore not fully equate the seriousness of electronic record falsification with paper record falsification. Employees need to understand the gravity and consequences of signature or record falsification. Although FDA agrees that employee honesty cannot be ensured by requiring it in a regulation, the presence of strong accountability and responsibility policies is necessary to ensure that employees understand the importance of maintaining the integrity of electronic records and signatures. 89. Several comments expressed concern regarding employee liability for actions taken under their electronic signatures in the event that such signatures are compromised, and requested ‘‘reasonable exceptions.’’ The comments suggested revising proposed § 11.10(j) to hold people accountable only where there has been intentional falsification or corruption of electronic data. The agency considers the compromise of electronic signatures to be a very serious matter, one that should precipitate an appropriate investigation into any causative weaknesses in an organization’s security controls. The agency nonetheless recognizes that where such compromises occur through no fault or knowledge of individual employees, there would be reasonable limits on the extent to which disciplinary action would be taken. However, to maintain emphasis on the seriousness of such security breeches and deter the deliberate fabrication of ‘‘mistakes,’’ the agency believes § 11.10 should not provide for exceptions that may lessen the import of such a fabrication. 90. One comment said the agency should consider the need for criminal law reform because current computer crime laws do not address signatures when unauthorized access or computer use is not an issue. Another comment argued that proposed § 11.10(j) should be expanded beyond ‘‘individual’’ accountability to include business entities. The agency will consider the need for recommending legislative initiatives to address electronic signature falsification in light of the experience it gains with this regulation. The agency does not believe it necessary to address business entity accountability specifically in § 11.10 because the emphasis is on actions and accountability of individuals, and because individuals, rather than business entities, apply signatures. 91. One comment suggested that proposed § 11.10(j) should be deleted because it is unnecessary because individuals are presumably held accountable for actions taken under their authority, and because, in some organizations, individuals frequently delegate authority to sign their names. As discussed in comments 88 to 90 of this document, the agency has concluded that this section is necessary. Furthermore it does not limit delegation of authority as described in the comment. However, where one individual signs his or her name on behalf of someone else, the signature applied should be that of the delegatee, with some notation of that fact, and not the name of the delegator. This is the 13451Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations same procedure commonly used on paper documents, noted as ‘‘X for Y.’’ 92. Proposed § 11.10(k) states that procedures and controls for closed systems must include the use of appropriate systems documentation controls, including: (1) Adequate controls over the distribution, access to, and use of documentation for system operation and maintenance; and (2) records revision and change control procedures to maintain an electronic audit trail that documents time- sequenced development and modification of records. Several comments requested clarification of the type of documents covered by proposed § 11.10(k). One comment noted that this section failed to address controls for record retention. Some comments suggested limiting the scope of systems documentation to application and configurable software, or only to software that could compromise system security or integrity. Other comments suggested that this section should be deleted because some documentation needs wide distribution within an organization, and that it is an onerous burden to control user manuals. The agency advises that § 11.10(k) is intended to apply to systems documentation, namely, records describing how a system operates and is maintained, including standard operating procedures. The agency believes that adequate controls over such documentation are necessary for various reasons. For example, it is important for employees to have correct and updated versions of standard operating and maintenance procedures. If this documentation is not current, errors in procedures and/or maintenance are more likely to occur. Part 11 does not limit an organization’s discretion as to how widely or narrowly any document is to be distributed, and FDA expects that certain documents will, in fact, be widely disseminated. However, some highly sensitive documentation, such as instructions on how to modify system security features, would not routinely be widely distributed. Hence, it is important to control distribution of, access to, and use of such documentation. Although the agency agrees that the most critical types of system documents would be those directly affecting system security and integrity, FDA does not agree that control over system documentation should only extend to security related software or to application or configurable software. Documentation that relates to operating systems, for example, may also have an impact on security and day-to-day operations. The agency does not agree that it is an onerous burden to control documentation that relates to effective operation and security of electronic records systems. Failure to control such documentation, as discussed above, could permit and foster records falsification by making the enabling instructions for these acts readily available to any individual. 93. Concerning the proposed requirement for adequate controls over documentation for system operation and maintenance, one comment suggested that it be deleted because it is under the control of system vendors, rather than operating organizations. Several comments suggested that the proposed provision be deleted because it duplicates § 11.10(e) with respect to audit trails. Some comments also objected to maintaining the change control procedures in electronic form and suggested deleting the word ‘‘electronic’’ from ‘‘electronic audit trails.’’ The agency advises that this section is intended to apply to systems documentation that can be changed by individuals within an organization. If systems documentation can only be changed by a vendor, this provision does not apply to the vendor’s customers. The agency acknowledges that systems documentation may be in paper or electronic form. Where the documentation is in paper form, an audit trail of revisions need not be in electronic form. Where systems documentation is in electronic form, however, the agency intends to require the audit trail also be in electronic form, in accordance with § 11.10(e). The agency acknowledges that, in light of the comments, the proposed rule may not have been clear enough regarding audit trails addressed in § 11.10(k) compared to audit trails addressed in § 11.10(e) and has revised the final rule to clarify this matter. The agency does not agree, however, that the audit trail provisions of § 11.10(e) and (k), as revised, are entirely duplicative. Section 11.10(e) applies to electronic records in general (including systems documentation); § 11.10(k) applies exclusively to systems documentation, regardless of whether such documentation is in paper or electronic form. As revised, § 11.10(k) now reads as follows: (k) Use of appropriate controls over systems documentation including: (1) Adequate controls over the distribution of, access to, and use of documentation for system operation and maintenance. (2) Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation. VIII. Electronic Records—Controls for Open Systems (§ 11.30) Proposed § 11.30 states that: ‘‘Open systems used to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity and confidentiality of electronic records from the point of their creation to the point of their receipt.’’ In addition, § 11.30 states: * * * Such procedures and controls shall include those identified in § 11.10, as appropriate, and such additional measures as document encryption and use of established digital signature standards acceptable to the agency, to ensure, as necessary under the circumstances, record authenticity, integrity, and confidentiality. 94. One comment suggested that the reference to digital signature standards be deleted because the agency should not be setting standards and should not dictate how to ensure record authenticity, integrity, and confidentiality. Other comments requested clarification of the agency’s expectations with regard to digital signatures: (1) The kinds that would be acceptable, (2) the mechanism for announcing which standards were acceptable (and whether that meant FDA would be certifying particular software), and (3) a definition of digital signature. One comment asserted that FDA should accept international standards for digital signatures. Some comments also requested a definition of encryption. One comment encouraged the agency to further define open systems. The agency advises that § 11.30 requires additional controls, beyond those identified in § 11.10, as needed under the circumstances, to ensure record authenticity, integrity, and confidentiality for open systems. Use of digital signatures is one measure that may be used, but is not specifically required. The agency wants to ensure that the digital signature standard used is, in fact, appropriate. Development of digital signature standards is a complex undertaking, one FDA does not expect to be performed by individual firms on an ad hoc basis, and one FDA does not now seek to perform. The agency is nonetheless concerned that such standards be robust and secure. Currently, the agency is aware of two such standards, the RSA (Rivest- Shamir-Adleman), and NIST’s Digital Signature Standard (DSS). The DSS became Federal Information Processing Standard (FIPS) 186 on December 1, 1994. These standards are incorporated in different software programs. The agency does not seek to certify or otherwise approve of such programs, 13452 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations but expects people who use such programs to ensure that they are suitable for their intended use. FDA is aware that NIST provides certifications regarding mathematical conformance to the DSS core algorithms, but does not formally evaluate the broader programs that contain those algorithms. The agency has revised the final rule to clarify its intent that firms retain the flexibility to use any appropriate digital signature as an additional system control for open systems. FDA is also including a definition of digital signature under § 11.3(b)(5). The agency does not believe it necessary to codify the term ‘‘encryption’’ because, unlike the term digital signature, it has been in general use for many years and is generally understood to mean the transforming of a writing into a secret code or cipher. The agency is aware that there are several commercially available software programs that implement both digital signatures and encryption. 95. Two comments noted that use of digital signatures and encryption is not necessary in the context of PDMA, where access to an electronic record is limited once it is signed and stored. One of the comments suggested that proposed § 11.30 be revised to clarify this point. As discussed in comment 94 of this document, use of digital signatures and encryption would be an option when extra measures are necessary under the circumstances. In the case of PDMA records, such measures may be warranted in certain circumstances, and unnecessary in others. For example, if electronic records were to be transmitted by a firm’s representative by way of a public online service to a central location, additional measures would be necessary. On the other hand, where the representative’s records are hand delivered to that location, or transferred by direct connection between the representative and the central location, such additional measures to ensure record authenticity, confidentiality, and integrity may not be necessary. The agency does not believe that it is practical to revise § 11.30 to elaborate on every possible situation in which additional measures would or would not be needed. 96. One comment addressed encryption of submissions to FDA and asked if people making those submissions would have to give the agency the appropriate ‘‘keys’’ and, if so, how the agency would protect the security of such information. The agency intends to develop appropriate procedures regarding the exchange of ‘‘keys’’ attendant to use of encryption and digital signatures, and will protect those keys that must remain confidential, in the same manner as the agency currently protects trade secrets. Where the agency and a submitter agree to use a system that calls for the exchange of secret keys, FDA will work with submitters to achieve mutually agreeable procedures. The agency notes, however, that not all encryption and digital signature systems require that enabling keys be secret. 97. One comment noted that proposed § 11.30 does not mention availability and nonrepudiation and requested clarification of the term ‘‘point of receipt.’’ The comment noted that, where an electronic record is received at a person’s electronic mailbox (which resides on an open system), additional measures may be needed when the record is transferred to the person’s own local computer because such additional transfer entails additional security risks. The comment suggested wording that would extend open system controls to the point where records are ultimately retained. The agency agrees that, in the situation described by the comment, movement of the electronic record from an electronic mailbox to a person’s local computer may necessitate open system controls. However, situations may vary considerably as to the ultimate point of receipt, and FDA believes proposed § 11.30 offers greater flexibility in determining open system controls than revisions suggested by the comment. The agency advises that the concept of nonrepudiation is part of record authenticity and integrity, as already covered by § 11.10(c). Therefore, FDA is not revising § 11.30 as suggested. IX. Electronic Records—Signature Manifestations (§ 11.50) Proposed § 11.50 requires that electronic records that are electronically signed must display in clear text the printed name of the signer, and the date and time when the electronic signature was executed. This section also requires that electronic records clearly indicate the meaning (such as review, approval, responsibility, and authorship) associated with their attendant signatures. 98. Several comments suggested that the information required under proposed § 11.50 need not be contained in the electronic records themselves, but only in the human readable format (screen displays and printouts) of such records. The comments explained that the records themselves need only contain links, such as signature attribute codes, to such information to produce the displays of information required. The comments noted, for example, that, where electronic signatures consist of an identification code in combination with a password, the combined code and password itself would not be part of the display. Some comments suggested that proposed § 11.50 be revised to clarify what items are to be displayed. The agency agrees and has revised proposed § 11.50 accordingly. The intent of this section is to require that human readable forms of signed electronic records, such as computer screen displays and printouts bear: (1) The printed name of the signer (at the time the record is signed as well as whenever the record is read by humans); (2) the date and time of signing; and (3) the meaning of the signature. The agency believes that revised § 11.50 will afford persons the flexibility they need to implement the display of information appropriate for their own electronic records systems, consistent with other system controls in part 11, to ensure record integrity and prevent falsification. 99. One comment stated that the controls in proposed § 11.50 would not protect against inaccurate entries. FDA advises that the purpose of this section is not to protect against inaccurate entries, but to provide unambiguous documentation of the signer, when the signature was executed, and the signature’s meaning. The agency believes that such a record is necessary to document individual responsibility and actions. In a paper environment, the printed name of the individual is generally present in the signed record, frequently part of a traditional ‘‘signature block.’’ In an electronic environment, the person’s name may not be apparent, especially where the signature is based on identification codes combined with passwords. In addition, the meaning of a signature is generally apparent in a paper record by virtue of the context of the record or, more often, explicit phrases such as ‘‘approved by,’’ ‘‘reviewed by,’’ and ‘‘performed by.’’ Thus, the agency believes that for clear documentation purposes it is necessary to carry such meanings into the electronic record environment. 100. One comment suggested that proposed § 11.50 should apply only to those records that are required to be signed, and that the display of the date and time should be performed in a secure manner. The agency intends that this section apply to all signed electronic records regardless of whether other regulations require them to be signed. The agency believes that if it is important enough that a record be signed, human readable 13453Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations displays of such records must include the printed name of the signer, the date and time of signing, and the meaning of the signature. Such information is crucial to the agency’s ability to protect public health. For example, a message from a firm’s management to employees instructing them on a particular course of action may be critical in litigation. This requirement will help ensure clear documentation and deter falsification regardless of whether the signature is electronic or handwritten. The agency agrees that the display of information should be carried out in a secure manner that preserves the integrity of that information. The agency, however, does not believe it is necessary at this time to revise § 11.50 to add specific security measures because other requirements of part 11 have the effect of ensuring appropriate security. Because signing information is important regardless of the type of signature used, the agency has revised § 11.50 to cover all types of signings. 101. Several comments objected to the requirement in proposed § 11.50(a) that the time of signing be displayed in addition to the date on the grounds that such information is: (1) Unnecessary, (2) costly to implement, (3) needed in the electronic record for auditing purposes, but not needed in the display of the record, and (4) only needed in critical applications. Some comments asserted that recording time should be optional. One comment asked whether the time should be local to the signer or to a central network when electronic record systems cross different time zones. The agency believes that it is vital to record the time when a signature is applied. Documenting the time when a signature was applied can be critical to demonstrating that a given record was, or was not, falsified. Regarding systems that may span different time zones, the agency advises that the signer’s local time is the one to be recorded. 102. One comment assumed that a person’s user identification code could be displayed instead of the user’s printed name, along with the date and time of signing. This assumption is incorrect. The agency intends that the printed name of the signer be displayed for purposes of unambiguous documentation and to emphasize the importance of the act of signing to the signer. The agency believes that because an identification code is not an actual name, it would not be a satisfactory substitute. 103. One comment suggested that the word ‘‘printed’’ in the phrase ‘‘printed name’’ be deleted because the word was superfluous. The comment also stated that the rule should state when the clear text must be created or displayed because some computer systems, in the context of electronic data interchange transactions, append digital signatures to records before, or in connection with, communication of the record. The agency disagrees that the word ‘‘printed’’ is superfluous because the intent of this section is to show the name of the person in an unambiguous manner that can be read by anyone. The agency believes that requiring the printed name of the signer instead of codes or other manifestations, more effectively provides clarity. The agency has revised this section to clarify the point at which the signer’s information must be displayed, namely, as part of any human readable form of the electronic record. The revision, in the agency’s view, addresses the comment’s concern regarding the application of digital signatures. The agency advises that under § 11.50, any time after an electronic record has been signed, individuals who see the human readable form of the record will be able to immediately tell who signed the record, when it was signed, and what the signature meant. This includes the signer who, as with a traditional signature to paper, will be able to review the signature instantly. 104. One comment asked if the operator would have to see the meaning of the signature, or if the information had to be stored on the physical electronic record. As discussed in comment 100 of this document, the information required by § 11.50(b) must be displayed in the human readable format of the electronic record. Persons may elect to store that information directly within the electronic record itself, or in logically associated records, as long as such information is displayed any time a person reads the record. 105. One comment noted that proposed § 11.50(b) could be interpreted to require lengthy explanations of the signatures and the credentials of the signers. The comment also stated that this information would more naturally be contained in standard operating procedures, manuals, or accompanying literature than in the electronic records themselves. The agency believes that the comment misinterprets the intent of this provision. Recording the meaning of the signature does not infer that the signer’s credentials or other lengthy explanations be part of that meaning. The statement must merely show what is meant by the act of signing (e.g., review, approval, responsibility, authorship). 106. One comment noted that the meaning of a signature may be included in a (digital signature) public key certificate and asked if this would be acceptable. The comment also noted that the certificate might be easily accessible by a record recipient from either a recognized database or one that might be part of, or associated with, the electronic record itself. The comment further suggested that FDA would benefit from participating in developing rules of practice regarding certificate- based public key cryptography and infrastructure with the Information Security Committee, Section of Science and Technology, of the American Bar Association (ABA). The intent of this provision is to clearly discern the meaning of the signature when the electronic record is displayed in human readable form. The agency does not expect such meaning to be contained in or displayed by a public key certificate because the public key is generally a fixed value associated with an individual. The certificate is used by the recipient to authenticate a digital signature that may have different meanings, depending upon the record being signed. FDA acknowledges that it is possible for someone to establish different public keys, each of which may indicate a different signature meaning. Part 11 would not prohibit multiple ‘‘meaning’’ keys provided the meaning of the signature itself was still clear in the display of the record, a feature that could conceivably be implemented by software. Regarding work of the ABA and other standard-setting organizations, the agency welcomes an open dialog with such organizations, for the mutual benefit of all parties, to establish and facilitate the use of electronic record/ electronic signature technologies. FDA’s participation in any such activities would be in accordance with the agency’s policy on standards stated in the Federal Register of October 11, 1995 (60 FR 53078). Revised § 11.50, signature manifestations, reads as follows: (a) Signed electronic records shall contain information associated with the signing that clearly indicates all of the following: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3) The meaning (such as review, approval, responsibility, or authorship) associated with the signature. (b) The items identified in paragraphs (a)(1), (a)(2), and (a)(3) of this section shall be subject to the same controls as for electronic records and shall be included as part of any human readable form of the electronic record (such as electronic display or printout). 13454 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations X. Electronic Records—Signature/ Record Linking (§ 11.70) 107. Proposed § 11.70 states that electronic signatures and handwritten signatures executed to electronic records must be verifiably bound to their respective records to ensure that signatures could not be excised, copied, or otherwise transferred to falsify another electronic record. Many comments objected to this provision as too prescriptive, unnecessary, unattainable, and excessive in comparison to paper-based records. Some comments asserted that the objectives of the section could be attained through appropriate procedural and administrative controls. The comments also suggested that objectives of the provision could be met by appropriate software (i.e., logical) links between the electronic signatures and electronic records, and that such links are common in systems that use identification codes in combination with passwords. One firm expressed full support for the provision, and noted that its system implements such a feature and that signature-to-record binding is similar to the record-locking provision of the proposed PDMA regulations. The agency did not intend to mandate use of any particular technology by use of the word ‘‘binding.’’ FDA recognizes that, because it is relatively easy to copy an electronic signature to another electronic record and thus compromise or falsify that record, a technology based link is necessary. The agency does not believe that procedural or administrative controls alone are sufficient to ensure that objective because such controls could be more easily circumvented than a straightforward technology based approach. In addition, when electronic records are transferred from one party to another, the procedural controls used by the sender and recipient may be different. This could result in record falsification by signature transfer. The agency agrees that the word ‘‘link’’ would offer persons greater flexibility in implementing the intent of this provision and in associating the names of individuals with their identification codes/passwords without actually recording the passwords themselves in electronic records. The agency has revised proposed § 11.70 to state that signatures shall be linked to their electronic records. 108. Several comments argued that proposed § 11.70 requires absolute protection of electronic records from falsification, an objective that is unrealistic to the extent that determined individuals could falsify records. The agency acknowledges that, despite elaborate system controls, certain determined individuals may find a way to defeat antifalsification measures. FDA will pursue such illegal activities as vigorously as it does falsification of paper records. For purposes of part 11, the agency’s intent is to require measures that prevent electronic records falsification by ordinary means. Therefore, FDA has revised § 11.70 by adding the phrase ‘‘by ordinary means’’ at the end of this section. 109. Several comments suggested changing the phrase ‘‘another electronic record’’ to ‘‘an electronic record’’ to clarify that the antifalsification provision applies to the current record as well as any other record. The agency agrees and has revised § 11.70 accordingly. 110. Two comments argued that signature-to-record binding is unnecessary, in the context of PDMA, beyond the point of record creation (i.e., when records are transmitted to a point of receipt). The comments asserted that persons who might be in a position to separate a signature from a record (for purposes of falsification) are individuals responsible for record integrity and thus unlikely to falsify records. The comments also stated that signature-to- record binding is produced by software coding at the time the record is signed, and suggested that proposed § 11.70 clarify that binding would be necessary only up to the point of actual transmission of the electronic record to a central point of receipt. The agency disagrees with the comment’s premise that the need for binding to prevent falsification depends on the disposition of people to falsify records. The agency believes that reliance on individual tendencies is insufficient insurance against falsification. The agency also notes that in the traditional paper record, the signature remains bound to its corresponding record regardless of where the record may go. 111. One comment suggested that proposed § 11.70 be deleted because it appears to require that all records be kept on inalterable media. The comment also suggested that the phrase ‘‘otherwise transferred’’ be deleted on the basis that it should be permissible for copies of handwritten signatures (recorded electronically) to be made when used, in addition to another unique individual identification mechanism. The agency advises that neither § 11.70, nor other sections in part 11, requires that records be kept on inalterable media. What is required is that whenever revisions to a record are made, the original entries must not be obscured. In addition, this section does not prohibit copies of handwritten signatures recorded electronically from being made for legitimate reasons that do not relate to record falsification. Section 11.70 merely states that such copies must not be made that falsify electronic records. 112. One comment suggested that proposed § 11.70 be revised to require application of response cryptographic methods because only those methods could be used to comply with the regulation. The comment noted that, for certificate based public key cryptographic methods, the agency should address verifiable binding between the signer’s name and public key as well as binding between digital signatures and electronic records. The comment also suggested that the regulation should reference electronic signatures in the context of secure time and date stamping. The agency intends to permit maximum flexibility in how organizations achieve the linking called for in § 11.70, and, as discussed above, has revised the regulation accordingly. Therefore, FDA does not believe that cryptographic and digital signature methods would be the only ways of linking an electronic signature to an electronic document. In fact, one firm commented that its system binds a person’s handwritten signature to an electronic record. The agency agrees that use of digital signatures accomplishes the same objective because, if a digital signature were to be copied from one record to another, the second record would fail the digital signature verification procedure. Furthermore, FDA notes that concerns regarding binding a person’s name with the person’s public key would be addressed in the context of § 11.100(b) because an organization must establish an individual’s identity before assigning or certifying an electronic signature (or any of the electronic signature components). 113. Two comments requested clarification of the types of technologies that could be used to meet the requirements of proposed § 11.70. As discussed in comment 107 of this document, the agency is affording persons maximum flexibility in using any appropriate method to link electronic signatures to their respective electronic records to prevent record falsification. Use of digital signatures is one such method, as is use of software locks to prevent sections of codes 13455Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations representing signatures from being copied or removed. Because this is an area of developing technology, it is likely that other linking methods will emerge. XI. Electronic Signatures—General Requirements (§ 11.100) Proposed § 11.100(a) states that each electronic signature must be unique to one individual and not be reused or reassigned to anyone else. 114. One comment asserted that several people should be permitted to share a common identification code and password where access control is limited to inquiry only. Part 11 does not prohibit the establishment of a common group identification code/password for read only access purposes. However, such commonly shared codes and passwords would not be regarded, and must not be used, as electronic signatures. Shared access to a common database may nonetheless be implemented by granting appropriate common record access privileges to groups of people, each of whom has a unique electronic signature. 115. Several comments said proposed § 11.100(a) should permit identification codes to be reused and reassigned from one employee to another, as long as an audit trail exists to associate an identification code with a given individual at any one time, and different passwords are used. Several comments said the section should indicate if the agency intends to restrict authority delegation by the nonreassignment or nonreuse provision, or by the provision in § 11.200(a)(2) requiring electronic signatures to be used only by their genuine owners. The comments questioned whether reuse means restricting one noncryptographic based signature to only one record and argued that passwords need not be unique if the combined identification code and password are unique to one individual. One comment recommended caution in using the term ‘‘ownership’’ because of possible confusion with intellectual property rights or ownership of the computer systems themselves. The agency advises that, where an electronic signature consists of the combined identification code and password, § 11.100 would not prohibit the reassignment of the identification code provided the combined identification code and password remain unique to prevent record falsification. The agency believes that such reassignments are inadvisable, however, to the extent that they might be combined with an easily guessed password, thus increasing the chances that an individual might assume a signature belonging to someone else. The agency also advises that where people can read identification codes (e.g., printed numbers and letters that are typed at a keyboard or read from a card), the risks of someone obtaining that information as part of a falsification effort would be greatly increased as compared to an identification code that is not in human readable form (one that is, for example, encoded on a ‘‘secure card’’ or other device). Regarding the delegation of authority to use electronic signatures, FDA does not intend to restrict the ability of one individual to sign a record or otherwise act on behalf of another individual. However, the applied electronic signature must be the assignee’s and the record should clearly indicate the capacity in which the person is acting (e.g., on behalf of, or under the authority of, someone else). This is analogous to traditional paper records and handwritten signatures when person ‘‘A’’ signs his or her own name under the signature block of person ‘‘B,’’ with appropriate explanatory notations such as ‘‘for’’ or ‘‘as representative of’’ person B. In such cases, person A does not simply sign the name of person B. The agency expects the same procedure to be used for electronic records and electronic signatures. The agency intends the term ‘‘reuse’’ to refer to an electronic signature used by a different person. The agency does not regard as ‘‘reuse’’ the replicate application of a noncryptographic based electronic signature (such as an identification code and password) to different electronic records. For clarity, FDA has revised the phrase ‘‘not be reused or reassigned to’’ to state ‘‘not be reused by, or reassigned to,’’ in § 11.100(a). The reference in § 11.200(a) to ownership is made in the context of an individual owning or being assigned a particular electronic signature that no other individual may use. FDA believes this is clear and that concerns regarding ownership in the context of intellectual property rights or hardware are misplaced. 116. One comment suggested that proposed § 11.100(a) should accommodate electronic signatures assigned to organizations rather than individuals. The agency advises that, for purposes of part 11, electronic signatures are those of individual human beings and not organizations. For example, FDA does not regard a corporate seal as an individual’s signature. Humans may represent and obligate organizations by signing records, however. For clarification, the agency is substituting the word ‘‘individual’’ for ‘‘person’’ in the definition of electronic signature (§ 11.3(b)(7)) because the broader definition of person within the act includes organizations. 117. Proposed § 11.100(b) states that, before an electronic signature is assigned to a person, the identity of the individual must be verified by the assigning authority. Two comments noted that where people use identification codes in combination with passwords only the identification code portion of the electronic signature is assigned, not the password. Another comment argued that the word ‘‘assigned’’ is inappropriate in the context of electronic signatures based upon public key cryptography because the appropriate authority certifies the bind between the individual’s public key and identity, and not the electronic signature itself. The agency acknowledges that, for certain types of electronic signatures, the authorizing or certifying organization issues or approves only a portion of what eventually becomes an individual’s electronic signature. FDA wishes to accommodate a broad variety of electronic signatures and is therefore revising § 11.100(b) to require that an organization verify the identity of an individual before it establishes, assigns, certifies, or otherwise sanctions an individual’s electronic signature or any element of such electronic signature. 118. One comment suggested that the word ‘‘verified’’ in proposed § 11.100(b) be changed to ‘‘confirmed.’’ Other comments addressed the method of verifying a person’s identity and suggested that the section specify acceptable verification methods, including high level procedures regarding the relative strength of that verification, and the need for personal appearances or supporting documentation such as birth certificates. Two comments said the verification provision should be deleted because normal internal controls are adequate, and that it was impractical for multinational companies whose employees are globally dispersed. The agency does not believe that there is a sufficient difference between ‘‘verified’’ and ‘‘confirmed’’ to warrant a change in this section. Both words indicate that organizations substantiate a person’s identity to prevent impersonations when an electronic signature, or any of its elements, is being established or certified. The agency disagrees with the assertion that this requirement is unnecessary. Without verifying someone’s identity at the outset of establishing or certifying 13456 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations an individual’s electronic signature, or a portion thereof, an imposter might easily access and compromise many records. Moreover, an imposter could continue this activity for a prolonged period of time despite other system controls, with potentially serious consequences. The agency does not believe that the size of an organization, or global dispersion of its employees, is reason to abandon this vital control. Such dispersion may, in fact, make it easier for an impostor to pose as someone else in the absence of such verification. Further, the agency does not accept the implication that multinational firms would not verify the identity of their employees as part of other routine procedures, such as when individuals are first hired. In addition, in cases where an organization is widely dispersed and electronic signatures are established or certified centrally, § 11.100(b) does not prohibit organizations from having their local units perform the verification and relaying this information to the central authority. Similarly, local units may conduct the electronic signature assignment or certification. FDA does not believe it is necessary at this time to specify methods of identity verification and expects that organizations will consider risks attendant to sanctioning an erroneously assigned electronic signature. 119. Proposed § 11.100(c) states that persons using electronic signatures must certify to the agency that their electronic signature system guarantees the authenticity, validity, and binding nature of any electronic signature. Persons utilizing electronic signatures would, upon agency request, provide additional certification or testimony that a specific electronic signature is authentic, valid, and binding. Such certification would be submitted to the FDA district office in which territory the electronic signature system is in use. Many comments objected to the proposed requirement that persons provide FDA with certification regarding their electronic signature systems. The comments asserted that the requirement was: (1) Unprecedented, (2) unrealistic, (3) unnecessary, (4) contradictory to the principles and intent of system validation, (5) too burdensome for FDA to manage logistically, (6) apparently intended only to simplify FDA litigation, (7) impossible to meet regarding ‘‘guarantees’’ of authenticity, and (8) an apparent substitute for FDA inspections. FDA agrees in part with these comments. This final rule reduces the scope and burden of certification to a statement of intent that electronic signatures are the legally binding equivalent of handwritten signatures. As noted previously, the agency believes it is important, within the context of its health protection activities, to ensure that persons who implement electronic signatures fully equate the legally binding nature of electronic signatures with the traditional handwritten paper-based signatures. The agency is concerned that individuals might disavow an electronic signature as something completely different from a traditional handwritten signature. Such contention could result in confusion and possibly extensive litigation. Moreover, a limited certification as provided in this final rule is consistent with other legal, regulatory, and commercial practices. For example, electronic data exchange trading partner agreements are often written on paper and signed with traditional handwritten signatures to establish that certain electronic identifiers are recognized as equivalent to traditional handwritten signatures. FDA does not expect electronic signature systems to be guaranteed foolproof. The agency does not intend, under § 11.100(c), to establish a requirement that is unattainable. Certification of an electronic signature system as the legally binding equivalent of a traditional handwritten signature is separate and distinct from system validation. This provision is not intended as a substitute for FDA inspection and such inspection alone may not be able to determine in a conclusive manner an organization’s intent regarding electronic signature equivalency. The agency has revised proposed § 11.100(c) to clarify its intent. The agency wishes to emphasize that the final rule dramatically curtails what FDA had proposed and is essential for the agency to be able to protect and promote the public health because FDA must be able to hold people to the commitments they make under their electronic signatures. The certification in the final rule is merely a statement of intent that electronic signatures are the legally binding equivalent of traditional handwritten signatures. 120. Several comments questioned the procedures necessary for submitting the certification to FDA, including: (1) The scheduling of the certification; (2) whether to submit certificates for each individual or for each electronic signature; (3) the meaning of ‘‘territory’’ in the context of wide area networks; (4) whether such certificates could be submitted electronically; and (5) whether organizations, after submitting a certificate, had to wait for a response from FDA before implementing their electronic signature systems. Two comments suggested revising proposed § 11.100(c) to require that all certifications be submitted to FDA only upon agency request. One comment suggested changing ‘‘should’’ to ‘‘shall’’ in the last sentence of § 11.100(c) if the agency’s intent is to require certificates to be submitted to the respective FDA district office. The agency intends that certificates be submitted once, in the form of a paper letter, bearing a traditional handwritten signature, at the time an organization first establishes an electronic signature system after the effective date of part 11, or, where such systems have been used before the effective date, upon continued use of the electronic signature system. A separate certification is not needed for each electronic signature, although certification of a particular electronic signature is to be submitted if the agency requests it. The agency does not intend to establish certification as a review and approval function. In addition, organizations need not await FDA’s response before putting electronic signature systems into effect, or before continuing to use an existing system. A single certification may be stated in broad terms that encompass electronic signatures of all current and future employees, thus obviating the need for subsequent certifications submitted on a preestablished schedule. To further simplify the process and to minimize the number of certifications that persons would have to provide, the agency has revised § 11.100(c) to permit submission of a single certification that covers all electronic signatures used by an organization. The revised rule also simplifies the process by providing a single agency receiving unit. The final rule instructs persons to send certifications to FDA’s Office of Regional Operations (HFC–100), 5600 Fishers Lane, Rockville, MD 20857. Persons outside the United States may send their certifications to the same office. The agency offers, as guidance, an example of an acceptable § 11.100(c) certification: Pursuant to Section 11.100 of Title 21 of the Code of Federal Regulations, this is to certify that [name of organization] intends that all electronic signatures executed by our employees, agents, or representatives, located anywhere in the world, are the legally binding equivalent of traditional handwritten signatures. 13457Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations The agency has revised § 11.100 to clarify where and when certificates are to be submitted. The agency does not agree that the initial certification be provided only upon agency request because FDA believes it is vital to have such certificates, as a matter of record, in advance of any possible litigation. This would clearly establish the intent of organizations to equate the legally binding nature of electronic signatures with traditional handwritten signatures. In addition, the agency believes that having the certification on file ahead of time will have the beneficial effect of reinforcing the gravity of electronic signatures by putting an organization’s employees on notice that the organization has gone on record with FDA as equating electronic signatures with handwritten signatures. 121. One comment suggested that proposed § 11.100(c) be revised to exclude from certification instances in which the purported signer claims that he or she did not create or authorize the signature. The agency declines to make this revision because a provision for nonrepudiation is already contained in § 11.10. As a result of the considerations discussed in comments 119 and 120 of this document, the agency has revised proposed § 11.100(c) to state that: (c) Persons using electronic signatures shall, prior to or at the time of such use, certify to the agency that the electronic signatures in their system, used on or after August 20, 1997, are intended to be the legally binding equivalent of traditional handwritten signatures. (1) The certification shall be submitted in paper form and signed with a traditional handwritten signature to the Office of Regional Operations (HFC–100), 5600 Fishers Lane, Rockville, MD 20857. (2) Persons using electronic signatures shall, upon agency request, provide additional certification or testimony that a specific electronic signature is the legally binding equivalent of the signer’s handwritten signature. XII. Electronic Signature Components and Controls (§ 11.200) 122. Proposed § 11.200 sets forth requirements for electronic signature identification mechanisms and controls. Two comments suggested that the term ‘‘identification code’’ should be defined. Several comments suggested that the term ‘‘identification mechanisms’’ should be changed to ‘‘identification components’’ because each component of an electronic signature need not be executed by a different mechanism. The agency believes that the term ‘‘identification code’’ is sufficiently broad and generally understood and does not need to be defined in these regulations. FDA agrees that the word ‘‘component’’ more accurately reflects the agency’s intent than the word ‘‘mechanism,’’ and has substituted ‘‘component’’ for ‘‘mechanism’’ in revised § 11.200. The agency has also revised the section heading to read ‘‘Electronic signature components and controls’’ to be consistent with the wording of the section. 123. Proposed § 11.200(a) states that electronic signatures not based upon biometric/behavioral links must: (1) Employ at least two distinct identification mechanisms (such as an identification code and password), each of which is contemporaneously executed at each signing; (2) be used only by their genuine owners; and (3) be administered and executed to ensure that attempted use of an individual’s electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals. Two comments said that proposed § 11.200(a) should acknowledge that passwords may be known not only to their genuine owners, but also to system administrators in case people forget their passwords. The agency does not believe that system administrators would routinely need to know an individual’s password because they would have sufficient privileges to assist those individuals who forget passwords. 124. Several comments argued that the agency should accept a single password alone as an electronic signature because: (1) Combining the password with an identification code adds little security, (2) administrative controls and passwords are sufficient, (3) authorized access is more difficult when two components are needed, (4) people would not want to gain unauthorized entry into a manufacturing environment, and (5) changing current systems that use only a password would be costly. The comments generally addressed the need for two components in electronic signatures within the context of the requirement that all components be used each time an electronic signature is executed. Several comments suggested that, for purposes of system access, individuals should enter both a user identification code and password, but that, for subsequent signings during one period of access, a single element (such as a password) known only to, and usable by, the individual should be sufficient. The agency believes that it is very important to distinguish between those (nonbiometric) electronic signatures that are executed repetitively during a single, continuous controlled period of time (access session or logged-on period) and those that are not. The agency is concerned, from statements made in comments, that people might use passwords that are not always unique and are frequently words that are easily associated with an individual. Accordingly, where nonbiometric electronic signatures are not executed repetitively during a single, continuous controlled period, it would be extremely bad practice to use a password alone as an electronic signature. The agency believes that using a password alone in such cases would clearly increase the likelihood that one individual, by chance or deduction, could enter a password that belonged to someone else and thereby easily and readily impersonate that individual. This action could falsify electronic records. The agency acknowledges that there are some situations involving repetitive signings in which it may not be necessary for an individual to execute each component of a nonbiometric electronic signature for every signing. The agency is persuaded by the comments that such situations generally involve certain conditions. For example, an individual performs an initial system access or ‘‘log on,’’ which is effectively the first signing, by executing all components of the electronic signature (typically both an identification code and a password). The individual then performs subsequent signings by executing at least one component of the electronic signature, under controlled conditions that prevent another person from impersonating the legitimate signer. The agency’s concern here is the possibility that, if the person leaves the workstation, someone else could access the workstation (or other computer device used to execute the signing) and impersonate the legitimate signer by entering an identification code or password. The agency believes that, in such situations, it is vital to have stringent controls in place to prevent the impersonation. Such controls include: (1) Requiring an individual to remain in close proximity to the workstation throughout the signing session; (2) use of automatic inactivity disconnect measures that would ‘‘de-log’’ the first individual if no entries or actions were taken within a fixed short timeframe; and (3) requiring that the single component needed for subsequent signings be known to, and usable only by, the authorized individual. The agency’s objective in accepting the execution of fewer than all the components of a nonbiometric 13458 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations electronic signature for repetitive signings is to make it impractical to falsify records. The agency believes that this would be attained by complying with all of the following procedures where nonbiometric electronic signatures are executed more than once during a single, continuous controlled session: (1) All electronic signature components are executed for the first signing; (2) at least one electronic signature component is executed at each subsequent signing; (3) the electronic signature component executed after the initial signing is only used by its genuine owner, and is designed to ensure it can only be used by its genuine owner; and (4) the electronic signatures are administered and executed to ensure that their attempted use by anyone other than their genuine owners requires collaboration of two or more individuals. Items 1 and 4 are already incorporated in proposed § 11.200(a). FDA has included items 2 and 3 in final § 11.200(a). The agency cautions, however, that if its experience with enforcement of part 11 demonstrates that these controls are insufficient to deter falsifications, FDA may propose more stringent controls. 125. One comment asserted that, if the agency intends the term ‘‘identification code’’ to mean the typical user identification, it should not characterize the term as a distinct mechanism because such codes do not necessarily exhibit security attributes. The comment also suggested that proposed § 11.200(a) address the appropriate application of each possible combination of a two- factor authentication method. The agency acknowledges that the identification code alone does not exhibit security attributes. Security derives from the totality of system controls used to prevent falsification. However, uniqueness of the identification code when combined with another electronic signature component, which may not be unique (such as a password), makes the combination unique and thereby enables a legitimate electronic signature. FDA does not now believe it necessary to address, in § 11.200(a), the application of all possible combinations of multifactored authentication methods. 126. One comment requested clarification of ‘‘each signing,’’ noting that a laboratory employee may enter a group of test results under one signing. The agency advises that each signing means each time an individual executes a signature. Particular requirements regarding what records need to be signed derive from other regulations, not part 11. For example, in the case of a laboratory employee who performs a number of analytical tests, within the context of drug CGMP regulations, it is permissible for one signature to indicate the performance of a group of tests (21 CFR 211.194(a)(7)). A separate signing is not required in this context for each separate test as long as the record clearly shows that the single signature means the signer performed all the tests. 127. One comment suggested that the proposed requirement, that collaboration of at least two individuals is needed to prevent attempts at electronic signature falsification, be deleted because a responsible person should be allowed to override the electronic signature of a subordinate. Several comments addressed the phrase ‘‘attempted use’’ and suggested that it be deleted or changed to ‘‘unauthorized use.’’ The comments said that willful breaking or circumvention of any security measure does not require two or more people to execute, and that the central question is whether collaboration is required to use the electronic signature. The agency advises that the intent of the collaboration provision is to require that the components of a nonbiometric electronic signature cannot be used by one individual without the prior knowledge of a second individual. One type of situation the agency seeks to prevent is the use of a component such as a card or token that a person may leave unattended. If an individual must collaborate with another individual by disclosing a password, the risks of betrayal and disclosure are greatly increased and this helps to deter such actions. Because the agency is not condoning such actions, § 11.200(a)(2) requires that electronic signatures be used only by the genuine owner. The agency disagrees with the comments that the term ‘‘attempted use’’ should be changed to ‘‘unauthorized uses,’’ because ‘‘unauthorized uses’’ could infer that use of someone else’s electronic signature is acceptable if it is authorized. Regarding electronic signature ‘‘overrides,’’ the agency would consider as falsification the act of substituting the signature of a supervisor for that of a subordinate. The electronic signature of the subordinate must remain inviolate for purposes of authentication and documentation. Although supervisors may overrule the actions of their staff, the electronic signatures of the subordinates must remain a permanent part of the record, and the supervisor’s own electronic signature must appear separately. The agency believes that such an approach is fully consistent with procedures for paper records. As a result of the revisions noted in comments 123 to 127 of this document, § 11.200(a) now reads as follows: (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i) When an individual executes a series of signings during a single, continuous period of controlled system access, the first signing shall be executed using all electronic signature components; subsequent signings shall be executed using at least one electronic signature component that is only executable by, and designed to be used only by, the individual. (ii) When an individual executes one or more signings not performed during a single, continuous period of controlled system access, each signing shall be executed using all of the electronic signature components. (2) Be used only by their genuine owners; and (3) Be administered and executed to ensure that attempted use of an individual’s electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals. 128. Proposed § 11.200(b) states that electronic signatures based upon biometric/behavioral links be designed to ensure that they could not be used by anyone other than their genuine owners. One comment suggested that the agency make available, by public workshop or other means, any information it has regarding existing biometric systems so that industry can provide proper input. Another comment asserted that proposed § 11.200(b) placed too great an emphasis on biometrics, did not establish particular levels of assurance for biometrics, and did not provide for systems using mixtures of biometric and nonbiometric electronic signatures. The comment recommended revising the phrase ‘‘designed to ensure they cannot be used’’ to read ‘‘provide assurances that prevent their execution.’’ The agency’s experience with biometric electronic signatures is contained in the administrative record for this rulemaking, under docket no. 92N–0251, and includes recommendations from public comments to the ANPRM and the proposed rule. The agency has also gathered, and continues to gather, additional information from literature reviews, general press reports, meetings, and the agency’s experience with this technology. Interested persons have had extensive opportunity for input and comment regarding biometrics in part 11. In addition, interested persons may continue to contact the agency at any time regarding biometrics or any other relevant technologies. The agency notes 13459Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations that the rule does not require the use of biometric-based electronic signatures. As the agency’s experience with biometric electronic signatures increases, FDA will consider holding or participating in public workshops if that approach would be helpful to those wishing to adopt such technologies to comply with part 11. The agency does not believe that proposed § 11.200(b) places too much emphasis on biometric electronic signatures. As discussed above, the regulation makes a clear distinction between electronic signatures that are and are not based on biometrics, but treats their acceptance equally. The agency recognizes the inherent security advantages of biometrics, however, in that record falsification is more difficult to perform. System controls needed to make biometric- based electronic signatures reliable and trustworthy are thus different in certain respects from controls needed to make nonbiometric electronic signatures reliable and trustworthy. The requirements in part 11 reflect those differences. The agency does not believe that it is necessary at this time to set numerical security assurance standards that any system would have to meet. The regulation does not prohibit individuals from using combinations of biometric and nonbiometric-based electronic signatures. However, when combinations are used, FDA advises that requirements for each element in the combination would also apply. For example, if passwords are used in combination with biometrics, then the benefits of using passwords would only be realized, in the agency’s view, by adhering to controls that ensure password integrity (see § 11.300). In addition, the agency believes that the phrase ‘‘designed to ensure that they cannot be used’’ more accurately reflects the agency’s intent than the suggested alternate wording, and is more consistent with the concept of systems validation. Under such validation, falsification preventive attributes would be designed into the biometric systems. To be consistent with the revised definition of biometrics in § 11.3(b)(3), the agency has revised § 11.200(b) to read, ‘‘Electronic signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than their genuine owners.’’ XIII. Electronic Signatures—Controls for Identification Codes/Passwords (§ 11.300) The introductory paragraph of proposed § 11.300 states that electronic signatures based upon use of identification codes in combination with passwords must employ controls to ensure their security and integrity. To clarify the intent of this provision, the agency has added the words ‘‘[p]ersons who use’’ to the first sentence of § 11.300. This change is consistent with §§ 11.10 and 11.30. The introductory paragraph now reads, ‘‘Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls shall include: * * *.’’ 129. One comment suggested deletion of the phrase ‘‘in combination with passwords’’ from the first sentence of this section. The agency disagrees with the suggested revision because the change is inconsistent with FDA’s intent to address controls for electronic signatures based on combinations of identification codes and passwords, and would, in effect, permit a single component nonbiometric-based electronic signature. 130. Proposed § 11.300(a) states that controls for identification codes/ passwords must include maintaining the uniqueness of each issuance of identification code and password. One comment alleged that most passwords are commonly used words, such as a child’s name, a State, city, street, month, holiday, or date, that are significant to the person who creates the password. Another stated that the rule should explain uniqueness and distinguish between issuance and use because identification code/password combinations generally do not change for each use. FDA does not intend to require that individuals use a completely different identification code/password combination each time they execute an electronic signature. For reasons explained in the response to comment 16, what is required to be unique is each combined password and identification code and FDA has revised the wording of § 11.300(a) to clarify this provision. The agency is aware, however, of identification devices that generate new passwords on a continuous basis in synchronization with a ‘‘host’’ computer. This results in unique passwords for each system access. Thus, it is possible in theory to generate a unique nonbiometric electronic signature for each signing. The agency cautions against using passwords that are common words easily associated with their originators because such a practice would make it relatively easy for someone to impersonate someone else by guessing the password and combining it with an unsecured (or even commonly known) identification code. 131. Proposed § 11.300(b) states that controls for identification codes/ passwords must ensure that code/ password issuances are periodically checked, recalled, or revised. Several comments objected to this proposed requirement because: (1) It is unnecessary, (2) it excessively prescribes ‘‘how to,’’ (3) it duplicates the requirements in § 11.300(c), and (4) it is administratively impractical for larger organizations. However, the comments said individuals should be encouraged to change their passwords periodically. Several comments suggested that proposed § 11.300(b) include a clarifying example such as ‘‘to cover events such as password aging.’’ One comment said that the section should indicate who is to perform the periodic checking, recalling, or revising. The agency disagrees with the objections to this provision. FDA does not view the provision as a ‘‘how to’’ because organizations have full flexibility in determining the frequency and methods of checking, recalling, or revising their code/password issuances. The agency does not believe that this paragraph duplicates the regulation in § 11.300(c) because paragraph (c) specifically addresses followup to losses of electronic signature issuances, whereas § 11.300(b) addresses periodic issuance changes to ensure against their having been unknowingly compromised. This provision would be met by ensuring that people change their passwords periodically. FDA disagrees that this system control is unnecessary or impractical in large organizations because the presence of more people may increase the opportunities for compromising identification codes/passwords. The agency is confident that larger organizations will be fully capable of handling periodic issuance checks, revisions, or recalls. FDA agrees with the comments that suggested a clarifying example and has revised § 11.300(b) to include password aging as such an example. The agency cautions, however, that the example should not be taken to mean that password expiration would be the only rationale for revising, recalling, and checking issuances. If, for example, identification codes and passwords have been copied or compromised, they should be changed. FDA does not believe it necessary at this time to specify who in an organization is to carry out this system control, although the agency expects 13460 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations that units that issue electronic signatures would likely have this duty. 132. Proposed § 11.300(c) states that controls for identification codes/ passwords must include the following of loss management procedures to electronically deauthorize lost tokens, cards, etc., and to issue temporary or permanent replacements using suitable, rigorous controls for substitutes. One comment suggested that this section be deleted because it excessively prescribes ‘‘how to.’’ Another comment argued that the proposal was not detailed enough and should distinguish among fundamental types of cards (e.g., magstripe, integrated circuit, and optical) and include separate sections that address their respective use. Two comments questioned why the proposal called for ‘‘rigorous controls’’ in this section as opposed to other sections. One of the comments recommended that this section should also apply to cards or devices that are stolen as well as lost. The agency believes that the requirement that organizations institute loss management procedures is neither too detailed nor too general. Organizations retain full flexibility in establishing the details of such procedures. The agency does not believe it necessary at this time to offer specific provisions relating to different types of cards or tokens. Organizations that use such devices retain full flexibility to establish appropriate controls for their operations. To clarify the agency’s broad intent to cover all types of devices that contain or generate identification code or password information, FDA has revised § 11.300(c) to replace ‘‘etc.’’ with ‘‘and other devices that bear or generate identification code or password information.’’ The agency agrees that § 11.300(c) should cover loss management procedures regardless of how devices become potentially compromised, and has revised this section by adding, after the word ‘‘lost,’’ the phrase ‘‘stolen, missing, or otherwise potentially compromised.’’ FDA uses the term ‘‘rigorous’’ because device disappearance may be the result of inadequate controls over the issuance and management of the original cards or devices, thus necessitating more stringent measures to prevent problem recurrence. For example, personnel training on device safekeeping may need to be strengthened. 133. Proposed § 11.300(d) states that controls for identification codes/ passwords must include the use of transaction safeguards to prevent unauthorized use of passwords and/or identification codes, and, detecting and reporting to the system security unit and organizational management in an emergent manner any attempts at their unauthorized use. Several comments suggested that the term ‘‘emergent’’ in proposed § 11.300(d) be replaced with ‘‘timely’’ to describe reports regarding attempted unauthorized use of identification codes/passwords because: (1) A timely report would be sufficient, (2) technology to report emergently is not available, and (3) timely is a more recognizable and common term. FDA agrees in part. The agency considers attempts at unauthorized use of identification codes and passwords to be extremely serious because such attempts signal potential electronic signature and electronic record falsification, data corruption, or worse— consequences that could also ultimately be very costly to organizations. In FDA’s view, the significance of such attempts requires the immediate and urgent attention of appropriate security personnel in the same manner that individuals would respond to a fire alarm. To clarify its intent with a more widely recognized term, the agency is replacing ‘‘emergent’’ with ‘‘immediate and urgent’’ in the final rule. The agency believes that the same technology that accepts or rejects an identification code and password can be used to relay to security personnel an appropriate message regarding attempted misuse. 134. One comment suggested that the word ‘‘any’’ be deleted from the phrase ‘‘any attempts’’ in proposed § 11.300(d) because it is excessive. Another comment, noting that the question of attempts to enter a system or access a file by unauthorized personnel is very serious, urged the agency to substitute ‘‘all’’ for ‘‘any.’’ This comment added that there are devices on the market that can be used by unauthorized individuals to locate personal identification codes and passwords. The agency believes the word ‘‘any’’ is sufficiently broad to cover all attempts at misuse of identification codes and passwords, and rejects the suggestion to delete the word. If the word ‘‘any’’ were deleted, laxity could result from any inference that persons are less likely to be caught in an essentially permissive, nonvigilant system. FDA is aware of the ‘‘sniffing’’ devices referred to by one comment and cautions persons to establish suitable countermeasures against them. 135. One comment suggested that proposed § 11.300(d) be deleted because it is impractical, especially when simple typing errors are made. Another suggested that this section pertain to access to electronic records, not just the system, on the basis that simple miskeys may be typed when accessing a system. As discussed in comments 133 and 134 of this document, the agency believes this provision is necessary and reasonable. The agency’s security concerns extend to system as well as record access. Once having gained unauthorized system access, an individual could conceivably alter passwords to mask further intrusion and misdeeds. If this section were removed, falsifications would be more probable to the extent that some establishments would not alert security personnel. However, the agency advises that a simple typing error may not indicate an unauthorized use attempt, although a pattern of such errors, especially in short succession, or such an apparent error executed when the individual who ‘‘owns’’ that identification code or password is deceased, absent, or otherwise known to be unavailable, could signal a security problem that should not be ignored. FDA notes that this section offers organizations maximum latitude in deciding what they perceive to be attempts at unauthorized use. 136. One comment suggested substituting the phrase ‘‘electronic signature’’ for ‘‘passwords and/or identification codes.’’ The agency disagrees with this comment because the net effect of the revision might be to ignore attempted misuse of important elements of an electronic signature such as a ‘‘password’’ attack on a system. 137. Several comments argued that: (1) It is not necessary to report misuse attempts simultaneously to management when reporting to the appropriate security unit, (2) security units would respond to management in accordance with their established procedures and lines of authority, and (3) management would not always be involved. The agency agrees that not every misuse attempt would have to be reported simultaneously to an organization’s management if the security unit that was alerted responded appropriately. FDA notes, however, that some apparent security breeches could be serious enough to warrant management’s immediate and urgent attention. The agency has revised proposed § 11.300(d) to give organizations maximum flexibility in establishing criteria for management notification. Accordingly, § 11.300(d) now states that controls for identification codes/passwords must include: Use of transaction safeguards to prevent unauthorized use of passwords and/or identification codes, and to detect and report 13461Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations in an immediate and urgent manner any attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational management. 138. Proposed § 11.300(e) states that controls for identification codes/ passwords must include initial and periodic testing of devices, such as tokens or cards, bearing identifying information, for proper function. Many comments objected to this proposed device testing requirement as unnecessary because it is part of system validation and because devices are access fail-safe in that nonworking devices would deny rather than permit system access. The comments suggested revising this section to require that failed devices deny user access. One comment stated that § 11.300(e) is unclear on the meaning of ‘‘identifying information’’ and that the phrase ‘‘tokens or cards’’ is redundant because cards are a form of tokens. FDA wishes to clarify the reason for this proposed requirement, and to emphasize that proper device functioning includes, in addition to system access, the correctness of the identifying information and security performance attributes. Testing for system access alone could fail to discern significant unauthorized device alterations. If, for example, a device has been modified to change the identifying information, system access may still be allowed, which would enable someone to assume the identity of another person. In addition, devices may have been changed to grant individuals additional system privileges and action authorizations beyond those granted by the organization. Of lesser significance would be simple wear and tear on such devices, which result in reduced performance. For instance, a bar code may not be read with the same consistent accuracy as intended if the code becomes marred, stained, or otherwise disfigured. Access may be granted, but only after many more scannings than desired. The agency expects that device testing would detect such defects. Because validation of electronic signature systems would not cover unauthorized device modifications, or subsequent wear and tear, validation would not obviate the need for periodic testing. The agency notes that § 11.300(e) does not limit the types of devices organizations may use. In addition, not all tokens may be cards, and identifying information is intended to include identification codes and passwords. Therefore, FDA has revised proposed § 11.300(e) to clarify the agency’s intent and to be consistent with § 11.300(c). Revised § 11.300(e) requires initial and periodic testing of devices, such as tokens or cards, that bear or generate identification code or password information to ensure that they function properly and have not been altered in an unauthorized manner. XIV. Paperwork Reduction Act of 1995 This final rule contains information collection provisions that are subject to review by the Office of Management and Budget (OMB) under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501– 3520). Therefore, in accordance with 5 CFR 1320, the title, description, and description of respondents of the collection of information requirements are shown below with an estimate of the annual reporting and recordkeeping burdens. Included in the estimate is the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Most of the burden created by the information collection provision of this final rule will be a one-time burden associated with the creation of standard operating procedures, validation, and certification. The agency anticipates the use of electronic media will substantially reduce the paperwork burden associated with maintaining FDA-required records. Title: Electronic records; Electronic signatures. Description: FDA is issuing regulations that provide criteria for acceptance of electronic records, electronic signatures, and handwritten signatures executed to electronic records as equivalent to paper records. Rules apply to any FDA records requirements unless specific restrictions are issued in the future. Records required to be submitted to FDA may be submitted electronically, provided the agency has stated its ability to accept the records electronically in an agency established public docket. Description of Respondents: Businesses and other for-profit organizations, state or local governments, Federal agencies, and nonprofit institutions. Although the August 31, 1994, proposed rule (59 FR 45160) provided a 90-day comment period under the Paperwork Reduction Act of 1980, FDA is providing an additional opportunity for public comment under the Paperwork Reduction Act of 1995, which was enacted after the expiration of the comment period and applies to this final rule. Therefore, FDA now invites comments on: (1) Whether the proposed collection of information is necessary for the proper performance of FDA’s functions, including whether the information will have practical utility; (2) the accuracy of FDA’s estimate of the burden of the proposed collection of information, including the validity of the methodology and assumptions used; (3) ways to enhance the quality, utility, and clarity of the information to be collected; and (4) ways to minimize the burden of the collection of information on respondents, including through the use of automated collection techniques, when appropriate, and other forms of information technology. Individuals and organizations may submit comments on the information collection provisions of this final rule by May 19, 1997. Comments should be directed to the Dockets Management Branch (address above). At the close of the 60-day comment period, FDA will review the comments received, revise the information collection provisions as necessary, and submit these provisions to OMB for review and approval. FDA will publish a notice in the Federal Register when the information collection provisions are submitted to OMB, and an opportunity for public comment to OMB will be provided at that time. Prior to the effective date of this final rule, FDA will publish a notice in the Federal Register of OMB’s decision to approve, modify, or disapprove the information collection provisions. An agency may not conduct or sponsor, and a person is not required to respond to, a collection of information unless it displays a currently valid OMB control number. TABLE 1.—ESTIMATED ANNUAL RECORDKEEPING BURDEN 21 CFR Section Annual No. ofRecordkeepers Hours per Recordkeeper Total Hours 11.10 50 40 2,000 11.30 50 40 2,000 11.50 50 40 2,000 13462 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations TABLE 1.—ESTIMATED ANNUAL RECORDKEEPING BURDEN—Continued 21 CFR Section Annual No. ofRecordkeepers Hours per Recordkeeper Total Hours 11.300 50 40 2,000 Total annual burden hours 8,000 TABLE 2.—ESTIMATED ANNUAL REPORTING BURDEN 21 CFR Section Annual No. ofRespondents Hours per Response Total Burden Hours 11.100 1,000 1 1,000 Total annual burden hours 1,000 XV. Environmental Impact The agency has determined under 21 CFR 25.24(a)(8) that this action is of a type that does not individually or cumulatively have a significant effect on the human environment. Therefore, neither an environmental assessment nor an environmental impact statement is required. XVI. Analysis of Impacts FDA has examined the impacts of the final rule under Executive Order 12866, under the Regulatory Flexibility Act (5 U.S.C. 601–612), and under the Unfunded Mandates Reform Act (Pub. L. 104–4). Executive Order 12866 directs agencies to assess all costs and benefits of available regulatory alternatives and, when regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety, and other advantages; and distributive impacts and equity). Unless an agency certifies that a rule will not have a significant economic impact on a substantial number of small entities, the Regulatory Flexibility Act requires an analysis of regulatory options that would minimize any significant impact of a rule on small entities. The Unfunded Mandates Reform Act requires that agencies prepare an assessment of anticipated costs and benefits before proposing any rule that may result in an annual expenditure by State, local and tribal governments, in the aggregate, or by the private sector, of $100 million (adjusted annually for inflation). The agency believes that this final rule is consistent with the regulatory philosophy and principles identified in the Executive Order. This rule permits persons to maintain any FDA required record or report in electronic format. It also permits FDA to accept electronic records, electronic signatures, and handwritten signatures executed to electronic records as equivalent to paper records and handwritten signatures executed on paper. The rule applies to any paper records required by statute or agency regulations. The rule was substantially influenced by comments to the ANPRM and the proposed rule. The provisions of this rule permit the use of electronic technology under conditions that the agency believes are necessary to ensure the integrity of electronic systems, records, and signatures, and the ability of the agency to protect and promote the public health. This rule is a significant regulatory action as defined by the Executive Order and is subject to review under the Executive Order. This rule does not impose any mandates on State, local, or tribal governments, nor is it a significant regulatory action under the Unfunded Mandates Reform Act. The activities regulated by this rule are voluntary; no entity is required by this rule to maintain or submit records electronically if it does not wish to do so. Presumably, no firm (or other regulated entity) will implement electronic recordkeeping unless the benefits to that firm are expected to exceed any costs (including capital and maintenance costs). Thus, the industry will incur no net costs as a result of this rule. Based on the fact that the activities regulated by this rule are entirely voluntary and will not have any net adverse effects on small entities, the Commissioner of Food and Drugs certifies that this rule will not have a significant economic impact on a substantial number of small entities. Therefore, under the Regulatory Flexibility Act, no further regulatory flexibility analysis is required. Although no further analysis is required, in developing this rule, FDA has considered the impact of the rule on small entities. The agency has also considered various regulatory options to maximize the net benefits of the rule to small entities without compromising the integrity of electronic systems, records, and signatures, or the agency’s ability to protect and promote the public health. The following analysis briefly examines the potential impact of this rule on small businesses and other small entities, and describes the measures that FDA incorporated in this final rule to reduce the costs of applying electronic record/signature systems consistent with the objectives of the rule. This analysis includes each of the elements required for a final regulatory flexibility analysis under 5 U.S.C. 604(a). A. Objectives The purpose of this rule is to permit the use of a technology that was not contemplated when most existing FDA regulations were written, without undermining in any way the integrity of records and reports or the ability of FDA to carry out its statutory health protection mandate. The rule will permit regulated industry and FDA to operate with greater flexibility, in ways that will improve both the efficiency and the speed of industry’s operations and the regulatory process. At the same time, it ensures that individuals will assign the same level of importance to affixing an electronic signature, and the records to which that signature attests, as they currently do to a handwritten signature. B. Small Entities Affected This rule potentially affects all large and small entities that are required by any statute administered by FDA, or any FDA regulation, to keep records or make reports or other submissions to FDA, including small businesses, nonprofit organizations, and small government entities. Because the rule affects such a broad range of industries, no data currently exist to estimate precisely the total number of small entities that will potentially benefit from the rule, but the number is substantial. For example, within the medical devices industry alone, the Small Business 13463Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations Administration (SBA) estimates that over 3,221 firms are small businesses (i.e., have fewer than 500 employees). SBA also estimates that 504 pharmaceutical firms are small businesses with fewer than 500 employees. Of the approximately 2,204 registered blood and plasma establishments that are neither government-owned nor part of the American Red Cross, most are nonprofit establishments that are not nationally dominant and thus may be small entities as defined by the Regulatory Flexibility Act. Not all submissions will immediately be acceptable electronically, even if the submission and the electronic record conform to the criteria set forth in this rule. A particular required submission will be acceptable in electronic form only after it has been identified to this effect in public docket 92S–0251. (The agency unit that can receive that electronic submission will also be identified in the docket.) Thus, although all small entities subject to FDA regulations are potentially affected by this rule, the rule will actually only benefit those that: (1) Are required to submit records or other documents that have been identified in the public docket as acceptable if submitted electronically, and (2) choose this method of submission, instead of traditional paper record submissions. The potential range of submissions includes such records as new drug applications, medical device premarket notifications, food additive petitions, and medicated feed applications. These, and all other required submissions, will be considered by FDA as candidates for optional electronic format. Although the benefits of making electronic submissions to FDA will be phased in over time, as the agency accepts more submissions in electronic form, firms can, upon the rule’s effective date, immediately benefit from using electronic records/signatures for records they are required to keep, but not submit to FDA. Such records include, but are not limited to: Pharmaceutical and medical device batch production records, complaint records, and food processing records. Some small entities will be affected by this rule even if they are not among the industries regulated by FDA. Because it will increase the market demand for certain types of software (e.g., document management, signature, and encryption software) and services (e.g., digital notaries and digital signature certification authorities), this rule will benefit some small firms engaged in developing and providing those products and services. C. Description of the Impact For any paper record that an entity is required to keep under existing statutes or FDA regulations, FDA will now accept an electronic record instead of a paper one, as long as the electronic record conforms to the requirements of this rule. FDA will also consider an electronic signature to be equivalent to a handwritten signature if it meets the requirements of this rule. Thus, entities regulated by FDA may, if they choose, submit required records and authorizations to the agency electronically once those records have been listed in the docket as acceptable in electronic form. This action is voluntary; paper records and handwritten signatures are still fully acceptable. No entity will be required to change the way it is currently allowed to submit paper records to the agency. 1. Benefits and costs For any firm choosing to convert to electronic recordkeeping, the direct benefits are expected to include: (1) Improved ability for the firm to analyze trends, problems, etc., enhancing internal evaluation and quality control; (2) Reduced data entry errors, due to automated checks; (3) Reduced costs of storage space; (4) Reduced shipping costs for data transmission to FDA; and (5) More efficient FDA reviews and approvals of FDA-regulated products. No small entity will be required to convert to electronic submissions. Furthermore, it is expected that no individual firm, or other entity, will choose the electronic option unless that firm finds that the benefits to the firm from conversion will exceed any conversion costs. There may be some small entities that currently submit records on paper, but archive records electronically. These entities will need to ensure that their existing electronic systems conform to the requirements for electronic recordkeeping described in this rule. Once they have done so, however, they may also take advantage of all the other benefits of electronic recordkeeping. Therefore, no individual small entity is expected to experience direct costs that exceed benefits as a result of this rule. Furthermore, because almost all of the rule’s provisions reflect contemporary security measures and controls that respondents to the ANPRM identified, most firms should have to make few, if any, modifications to their systems. For entities that do choose electronic recordkeeping, the magnitude of the costs associated with doing so will depend on several factors, such as the level of appropriate computer hardware and software already in place in a given firm, the types of conforming technologies selected, and the size and dispersion of the firm. For example, biometric signature technologies may be more expensive than nonbiometric technologies; firms that choose the former technology may encounter relatively higher costs. Large, geographically dispersed firms may need some institutional security procedures that smaller firms, with fewer persons in more geographically concentrated areas, may not need. Firms that require wholesale technology replacements in order to adopt electronic record/signature technology may face much higher costs than those that require only minor modifications (e.g., because they already have similar technology for internal security and quality control purposes). Among the firms that must undertake major changes to implement electronic recordkeeping, costs will be lower for those able to undertake these changes simultaneously with other planned computer and security upgrades. New firms entering the market may have a slight advantage in implementing technologies that conform with this rule, because the technologies and associated procedures can be put in place as part of the general startup. 2. Compliance requirements If a small entity chooses to keep electronic records and/or make electronic submissions, it must do so in ways that conform to the requirements for electronic records and electronic signatures set forth in this rule. These requirements, described previously in section II. of this document, involve measures designed to ensure the integrity of system operations, of information stored in the system, and of the authorized signatures affixed to electronic records. The requirements apply to all small (and large) entities in all industry sectors regulated by FDA. The agency believes that because the rule is flexible and reflects contemporary standards, firms should have no difficulty in putting in place the needed systems and controls. However, to assist firms in meeting the provisions of this rule, FDA may hold public meetings and publish more detailed guidance. Firms may contact FDA’s Industry and Small Business Liaison Staff, HF–50, at 5600 Fishers Lane, Rockville, MD 20857 (301–827–3430) for more information. 13464 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations 3. Professional skills required If a firm elects electronic recordkeeping and submissions, it must take steps to ensure that all persons involved in developing, maintaining, and using electronic records and electronic signature systems have the education, training, and experience to perform the tasks involved. The level of training and experience that will be required depends on the tasks that the person performs. For example, an individual whose sole involvement with electronic records is infrequent might only need sufficient training to understand and use the required procedures. On the other hand, an individual involved in developing an electronic record system for a firm wishing to convert from a paper recordkeeping system would probably need more education or training in computer systems and software design and implementation. In addition, FDA expects that such a person would also have specific on-the-job training and experience related to the particular type of records kept by that firm. The relevant education, training, and experience of each individual involved in developing, maintaining, or using electronic records/submissions must be documented. However, no specific examinations or credentials for these individuals are required by the rule. D. Minimizing the Burden on Small Entities This rule includes several conditions that an electronic record or signature must meet in order to be acceptable as an alternative to a paper record or handwritten signature. These conditions are necessary to permit the agency to protect and promote the public health. For example, FDA must retain the ability to audit records to detect unauthorized modifications, simple errors, and to deter falsification. Whereas there are many scientific techniques to show changes in paper records (e.g., analysis of the paper, signs of erasures, and handwriting analysis), these methods do not apply to electronic records. For electronic records and submissions to have the same integrity as paper records, they must be developed, maintained, and used under circumstances that make it difficult for them to be inappropriately modified. Without these assurances, FDA’s objective of enabling electronic records and signatures to have standing equal to paper records and handwritten signatures, and to satisfy the requirements of existing statutes and regulations, cannot be met. Within these constraints, FDA has attempted to select alternatives that provide as much flexibility as practicable without endangering the integrity of the electronic records. The agency decided not to make the required extent and stringency of controls dependent on the type of record or transactions, so that firms can decide for themselves what level of controls are worthwhile in each case. For example, FDA chose to give firms maximum flexibility in determining: (1) The circumstances under which management would have to be notified of security problems, (2) the means by which firms achieve the required link between an electronic signature and an electronic record, (3) the circumstances under which extra security and authentication measures are warranted in open systems, (4) when to use operational system checks to ensure proper event sequencing, and (5) when to use terminal checks to ensure that data and instructions originate from a valid source. Numerous other specific considerations were addressed in the public comments to the proposed rule. A summary of the issues raised by those comments, the agency’s assessment of these issues, and any changes made in the proposed rule as a result of these comments is presented earlier in this preamble. FDA rejected alternatives for limiting potentially acceptable electronic submissions to a particular category, and for issuing different electronic submissions standards for small and large entities. The former alternative would unnecessarily limit the potential benefits of this rule; whereas the latter alternative would threaten the integrity of electronic records and submissions from small entities. As discussed previously in this preamble, FDA rejected comments that suggested a total of 17 additional more stringent controls that might be more expensive to implement. These include: (1) Examination and certification of individuals who perform certain important tasks, (2) exclusive use of cryptographic methods to link electronic signatures to electronic records, (3) controls for each possible combination of a two factored authentication method, (4) controls for each different type of identification card, and (5) recording in audit trails the reason why records were changed. List of Subjects in 21 CFR Part 11 Administrative practice and procedure, Electronic records, Electronic signatures, Reporting and recordkeeping requirements. Therefore, under the Federal Food, Drug, and Cosmetic Act, the Public Health Service Act, and under authority delegated to the Commissioner of Food and Drugs, Title 21, Chapter I of the Code of Federal Regulations is amended by adding part 11 to read as follows: PART 11—ELECTRONIC RECORDS; ELECTRONIC SIGNATURES Subpart A—General Provisions Sec. 11.1 Scope. 11.2 Implementation. 11.3 Definitions. Subpart B—Electronic Records 11.10 Controls for closed systems. 11.30 Controls for open systems. 11.50 Signature manifestations. 11.70 Signature/record linking. Subpart C—Electronic Signatures 11.100 General requirements. 11.200 Electronic signature components and controls. 11.300 Controls for identification codes/ passwords. Authority: Secs. 201–903 of the Federal Food, Drug, and Cosmetic Act (21 U.S.C. 321–393); sec. 351 of the Public Health Service Act (42 U.S.C. 262). Subpart A—General Provisions § 11.1 Scope. (a) The regulations in this part set forth the criteria under which the agency considers electronic records, electronic signatures, and handwritten signatures executed to electronic records to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures executed on paper. (b) This part applies to records in electronic form that are created, modified, maintained, archived, retrieved, or transmitted, under any records requirements set forth in agency regulations. This part also applies to electronic records submitted to the agency under requirements of the Federal Food, Drug, and Cosmetic Act and the Public Health Service Act, even if such records are not specifically identified in agency regulations. However, this part does not apply to paper records that are, or have been, transmitted by electronic means. (c) Where electronic signatures and their associated electronic records meet the requirements of this part, the agency will consider the electronic signatures to be equivalent to full handwritten signatures, initials, and other general signings as required by agency regulations, unless specifically excepted by regulation(s) effective on or after 13465Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations August 20, 1997. (d) Electronic records that meet the requirements of this part may be used in lieu of paper records, in accordance with § 11.2, unless paper records are specifically required. (e) Computer systems (including hardware and software), controls, and attendant documentation maintained under this part shall be readily available for, and subject to, FDA inspection. § 11.2 Implementation. (a) For records required to be maintained but not submitted to the agency, persons may use electronic records in lieu of paper records or electronic signatures in lieu of traditional signatures, in whole or in part, provided that the requirements of this part are met. (b) For records submitted to the agency, persons may use electronic records in lieu of paper records or electronic signatures in lieu of traditional signatures, in whole or in part, provided that: (1) The requirements of this part are met; and (2) The document or parts of a document to be submitted have been identified in public docket No. 92S– 0251 as being the type of submission the agency accepts in electronic form. This docket will identify specifically what types of documents or parts of documents are acceptable for submission in electronic form without paper records and the agency receiving unit(s) (e.g., specific center, office, division, branch) to which such submissions may be made. Documents to agency receiving unit(s) not specified in the public docket will not be considered as official if they are submitted in electronic form; paper forms of such documents will be considered as official and must accompany any electronic records. Persons are expected to consult with the intended agency receiving unit for details on how (e.g., method of transmission, media, file formats, and technical protocols) and whether to proceed with the electronic submission. § 11.3 Definitions. (a) The definitions and interpretations of terms contained in section 201 of the act apply to those terms when used in this part. (b) The following definitions of terms also apply to this part: (1) Act means the Federal Food, Drug, and Cosmetic Act (secs. 201–903 (21 U.S.C. 321–393)). (2) Agency means the Food and Drug Administration. (3) Biometrics means a method of verifying an individual’s identity based on measurement of the individual’s physical feature(s) or repeatable action(s) where those features and/or actions are both unique to that individual and measurable. (4) Closed system means an environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system. (5) Digital signature means an electronic signature based upon cryptographic methods of originator authentication, computed by using a set of rules and a set of parameters such that the identity of the signer and the integrity of the data can be verified. (6) Electronic record means any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system. (7) Electronic signature means a computer data compilation of any symbol or series of symbols executed, adopted, or authorized by an individual to be the legally binding equivalent of the individual’s handwritten signature. (8) Handwritten signature means the scripted name or legal mark of an individual handwritten by that individual and executed or adopted with the present intention to authenticate a writing in a permanent form. The act of signing with a writing or marking instrument such as a pen or stylus is preserved. The scripted name or legal mark, while conventionally applied to paper, may also be applied to other devices that capture the name or mark. (9) Open system means an environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system. Subpart B—Electronic Records § 11.10 Controls for closed systems. Persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine. Such procedures and controls shall include the following: (a) Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records. (b) The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency. Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records. (c) Protection of records to enable their accurate and ready retrieval throughout the records retention period. (d) Limiting system access to authorized individuals. (e) Use of secure, computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record changes shall not obscure previously recorded information. Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying. (f) Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate. (g) Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand. (h) Use of device (e.g., terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction. (i) Determination that persons who develop, maintain, or use electronic record/electronic signature systems have the education, training, and experience to perform their assigned tasks. (j) The establishment of, and adherence to, written policies that hold individuals accountable and responsible for actions initiated under their electronic signatures, in order to deter record and signature falsification. (k) Use of appropriate controls over systems documentation including: (1) Adequate controls over the distribution of, access to, and use of documentation for system operation and maintenance. (2) Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation. § 11.30 Controls for open systems. Persons who use open systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to 13466 Federal Register / Vol. 62, No. 54 / Thursday, March 20, 1997 / Rules and Regulations ensure the authenticity, integrity, and, as appropriate, the confidentiality of electronic records from the point of their creation to the point of their receipt. Such procedures and controls shall include those identified in § 11.10, as appropriate, and additional measures such as document encryption and use of appropriate digital signature standards to ensure, as necessary under the circumstances, record authenticity, integrity, and confidentiality. § 11.50 Signature manifestations. (a) Signed electronic records shall contain information associated with the signing that clearly indicates all of the following: (1) The printed name of the signer; (2) The date and time when the signature was executed; and (3) The meaning (such as review, approval, responsibility, or authorship) associated with the signature. (b) The items identified in paragraphs (a)(1), (a)(2), and (a)(3) of this section shall be subject to the same controls as for electronic records and shall be included as part of any human readable form of the electronic record (such as electronic display or printout). § 11.70 Signature/record linking. Electronic signatures and handwritten signatures executed to electronic records shall be linked to their respective electronic records to ensure that the signatures cannot be excised, copied, or otherwise transferred to falsify an electronic record by ordinary means. Subpart C—Electronic Signatures § 11.100 General requirements. (a) Each electronic signature shall be unique to one individual and shall not be reused by, or reassigned to, anyone else. (b) Before an organization establishes, assigns, certifies, or otherwise sanctions an individual’s electronic signature, or any element of such electronic signature, the organization shall verify the identity of the individual. (c) Persons using electronic signatures shall, prior to or at the time of such use, certify to the agency that the electronic signatures in their system, used on or after August 20, 1997, are intended to be the legally binding equivalent of traditional handwritten signatures. (1) The certification shall be submitted in paper form and signed with a traditional handwritten signature, to the Office of Regional Operations (HFC–100), 5600 Fishers Lane, Rockville, MD 20857. (2) Persons using electronic signatures shall, upon agency request, provide additional certification or testimony that a specific electronic signature is the legally binding equivalent of the signer’s handwritten signature. § 11.200 Electronic signature components and controls. (a) Electronic signatures that are not based upon biometrics shall: (1) Employ at least two distinct identification components such as an identification code and password. (i) When an individual executes a series of signings during a single, continuous period of controlled system access, the first signing shall be executed using all electronic signature components; subsequent signings shall be executed using at least one electronic signature component that is only executable by, and designed to be used only by, the individual. (ii) When an individual executes one or more signings not performed during a single, continuous period of controlled system access, each signing shall be executed using all of the electronic signature components. (2) Be used only by their genuine owners; and (3) Be administered and executed to ensure that attempted use of an individual’s electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals. (b) Electronic signatures based upon biometrics shall be designed to ensure that they cannot be used by anyone other than their genuine owners. § 11.300 Controls for identification codes/ passwords. Persons who use electronic signatures based upon use of identification codes in combination with passwords shall employ controls to ensure their security and integrity. Such controls shall include: (a) Maintaining the uniqueness of each combined identification code and password, such that no two individuals have the same combination of identification code and password. (b) Ensuring that identification code and password issuances are periodically checked, recalled, or revised (e.g., to cover such events as password aging). (c) Following loss management procedures to electronically deauthorize lost, stolen, missing, or otherwise potentially compromised tokens, cards, and other devices that bear or generate identification code or password information, and to issue temporary or permanent replacements using suitable, rigorous controls. (d) Use of transaction safeguards to prevent unauthorized use of passwords and/or identification codes, and to detect and report in an immediate and urgent manner any attempts at their unauthorized use to the system security unit, and, as appropriate, to organizational management. (e) Initial and periodic testing of devices, such as tokens or cards, that bear or generate identification code or password information to ensure that they function properly and have not been altered in an unauthorized manner. Dated: March 11, 1997. William B. Schultz, Deputy Commissioner for Policy. [FR Doc. 97–6833 Filed 3–20–97; 8:45 am] BILLING CODE 4160–01–F