Electronic records and signatures: understanding 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 at the site level
Provides the RC with a working understanding of 21 CFR Part 11 and ICH E6(R3) Section 4.3 -- what they require, where they overlap, and how the FDA's risk-based enforcement approach shapes practical compliance expectations.
The vendor email that provoked an unnecessary crisis
A site managing 11 active clinical trials receives an email from a vendor promoting an electronic document management system. The marketing materials are polished and confident. Midway through the brochure, a sentence appears in bold: "21 CFR Part 11 requires that all electronic records used in FDA-regulated activities meet specific requirements for validation, audit trails, and electronic signatures. Is your site compliant?"
The regulatory coordinator reads the sentence and feels a familiar knot of anxiety. The site uses a shared network drive to store scanned regulatory documents, a sponsor-provided portal for electronic submissions, and a locally maintained spreadsheet for version tracking. None of these systems, as far as the coordinator knows, have been formally validated. None produce the kind of audit trails the brochure describes. The coordinator drafts an email to the site director suggesting an emergency review of the site's electronic systems, attaching the vendor brochure as evidence of a compliance gap that requires immediate action.
But here is what the vendor brochure did not mention -- because vendor brochures rarely do. In August 2003, the FDA published a guidance document titled Scope and Application that fundamentally changed how Part 11 is enforced. The guidance announced that the FDA intended to exercise enforcement discretion -- meaning it would not enforce certain requirements of Part 11 -- and that it would apply a risk-based approach to determine which electronic records and signatures warranted the full weight of the regulation. The emergency the coordinator perceived was not, in fact, an emergency. It was a misunderstanding produced by encountering Part 11 without the context that shapes how the regulation actually operates in practice.
This lesson provides that context. It examines the two regulatory sources that govern electronic records at investigator sites -- 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 -- and explains what they require, where they converge, and how the FDA's risk-based enforcement approach determines what compliance actually looks like for a site-level regulatory coordinator.
What you will learn
By the end of this lesson, you will be able to:
1
Two regulatory sources, one compliance obligation
A regulatory coordinator managing electronic records at an investigator site must understand two distinct but overlapping sources of regulatory authority. Each source has a different origin, a different scope, and a different enforcement mechanism. Treating them as interchangeable -- or, worse, ignoring one while fixating on the other -- produces either overcompliance or undercompliance, and neither serves the site well.
21 CFR Part 11 is a United States federal regulation, finalized in March 1997, that establishes the criteria under which the FDA considers electronic records and electronic signatures to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures. Part 11 applies to any electronic record created, modified, maintained, archived, retrieved, or transmitted under any records requirement set forth in FDA regulations. It is a -- meaning it has the force of law for FDA-regulated activities conducted in the United States or submitted to the FDA.
Two sources, parallel application
21 CFR Part 11 is a U.S. federal regulation governing electronic records and signatures in FDA-regulated activities. ICH E6(R3) Section 4.3 is a harmonised guideline governing computerised systems in clinical trials globally. At a U.S. investigator site, both apply simultaneously. They are not in conflict -- they address overlapping but distinct aspects of electronic records management. Understanding each source independently, and then understanding where they converge, is essential for designing proportionate compliance.
21 CFR Part 11: what the regulation actually requires
Part 11 is organized into three subparts. Subpart A establishes general provisions, including the scope of the regulation. Subpart B sets requirements for electronic records. Subpart C sets requirements for electronic signatures. For a regulatory coordinator, the practical requirements fall into four categories.
Validation. Part 11 requires that persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and confidentiality of electronic records. The systems must be validated to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records (21 CFR 11.10(a)).
The regulation requires that systems used to create, modify, maintain, or transmit electronic records include computer-generated, time-stamped audit trails that independently record the date and time of operator entries and actions that create, modify, or delete electronic records. These audit trails must be retained for a period at least as long as the required retention period for the subject electronic records and must be available for agency review and copying (21 CFR 11.10(e)).
The 2003 guidance: risk-based enforcement that changed everything
In August 2003, the FDA issued a guidance document titled Guidance for Industry: Part 11, Electronic Records; Electronic Signatures -- Scope and Application. This document did not amend Part 11. The regulation remains exactly as it was enacted in 1997. What the guidance did was announce the FDA's intention to exercise enforcement discretion regarding certain Part 11 requirements, and to narrow the scope of records and signatures to which the agency would apply its enforcement efforts.
The 2003 guidance made three things clear.
First, the FDA stated it would apply a . Part 11 applies to records that are required to be maintained under any FDA predicate rule (the underlying regulation that creates the recordkeeping requirement) and that are maintained in electronic format. If a site creates a record voluntarily -- not because a regulation requires it -- Part 11 does not apply to that record merely because it is electronic. And if a regulation requires a record but the site maintains it on paper, Part 11 does not apply to the paper record even if an electronic copy also exists, provided the electronic copy is not relied upon as the regulatory record.
Key takeaway: Part 11 is enforced through a risk-based lens
The 2003 Scope and Application guidance did not repeal or weaken Part 11. The regulation stands as enacted. What the guidance established is that the FDA applies Part 11 proportionate to risk. For a regulatory coordinator, this means that not every electronic record at the site demands the same level of Part 11 compliance effort. Records critical to participant safety and data integrity warrant rigorous controls. Administrative records maintained electronically for convenience warrant proportionately less. The risk assessment -- not the vendor brochure -- determines the appropriate compliance posture.
ICH E6(R3) Section 4.3: the GCP framework for computerised systems
Section 4.3 of ICH E6(R3) Annex 1 establishes requirements for computerised systems used in clinical trials. Where Part 11 focuses specifically on electronic records and signatures as regulatory substitutes for paper, Section 4.3 takes a broader view: it addresses the full lifecycle of computerised systems in the trial context, from procedures and training through validation, security, and user management.
The section opens with an important framing statement. It notes that "the responsibilities of the sponsor, investigator and the activities of other parties with respect to a computerised system used in clinical trials should be clear and documented" (Section 4.3). This allocation of responsibility is fundamental -- and it is where the RC's role becomes concrete. Not every computerised system at the site is the investigator's responsibility. Sponsor-deployed systems are the sponsor's responsibility. But systems deployed by the investigator or institution -- and this includes locally managed document storage, site-maintained tracking tools, and any electronic system the site chooses to use for records management -- fall under the investigator's obligations as defined in Section 2.12.10.
Figure 1: The dual regulatory framework for electronic records at investigator sites -- convergent requirements with complementary enforcement approaches
Section 4.3 subsection by subsection: what each requires
I want to walk through the Section 4.3 subsections that matter most to the regulatory coordinator. Not all eight subsections carry equal weight for site-level records management, and understanding the relative significance prevents the trap of treating every requirement as equally urgent.
Section 4.3.1 -- Procedures. "Documented procedures should be in place to ensure the appropriate use of computerised systems in clinical trials for essential activities related to data collection, handling and management." For the RC, this means the site must have written procedures -- not just informal habits -- governing how electronic systems are used for records management. If the site uses a shared network drive for regulatory documents, the procedure documents who has access, how files are named, where they are stored, and how superseded versions are handled. The procedure need not be elaborate. It needs to be documented, followed, and available.
Section 4.3 subsections: summary of site-level requirements
1
4.3.1 Procedures: documented, not assumed
Where Part 11 and Section 4.3 converge -- and where they differ
Having examined each source independently, it is worth mapping the points of convergence and divergence. Understanding both prevents two common errors: applying Part 11 requirements where only Section 4.3 applies (overcompliance), and assuming Section 4.3 satisfies Part 11 when additional requirements exist (undercompliance).
The convergence is substantial. Both Part 11 and Section 4.3 require of systems, though Section 4.3.4(a) makes the risk-based proportionality principle more explicit than Part 11's text does alone (the FDA's 2003 guidance brings Part 11 enforcement into alignment with this principle). Both require -- Part 11 through 11.10(e) and Section 4.3 through the broader metadata and audit trail framework in Section 4.2.2. Both require limiting system use to authorized individuals -- Part 11 through 11.10(d) and (g), Section 4.3 through 4.3.8. And both require protecting data integrity -- Part 11 through its general system controls, Section 4.3.3 through its specific security framework.
Reference Table
Convergence and divergence: Part 11 and Section 4.3
Requirement domain
21 CFR Part 11
ICH E6(R3) Section 4.3
Practical implication for the RC
Validation
Systems must be validated to ensure accuracy, reliability, and consistent intended performance (11.10(a))
Validation approach based on risk assessment considering intended use, data importance, and potential impact (4.3.4(a))
Conduct a risk assessment per 4.3.4(a); the assessment determines the validation approach, which should also satisfy Part 11's validation requirement
Audit trails
Computer-generated, time-stamped audit trails recording creation, modification, and deletion (11.10(e))
Metadata and audit trail requirements in Section 4.2.2, including logs of user account creation, data changes with reason, and workflow actions
Section 4.2.2 requirements are substantively broader than Part 11's audit trail provision; compliance with 4.2.2 generally satisfies 11.10(e)
Access controls
Limit system access to authorized individuals (11.10(d), (g))
Role-based access, periodic review, and timely revocation (4.3.8(a)-(c))
Section 4.3.8 provides more operational detail than Part 11; implementing 4.3.8 satisfies the Part 11 access control requirement
Security
System controls ensuring authenticity, integrity, and confidentiality (11.10)
Security controls including user management, breach prevention and detection, backup, and disaster recovery (4.3.3)
Section 4.3.3 is more specific than Part 11's general security language; implementing 4.3.3 exceeds the Part 11 baseline
Electronic signatures
Detailed requirements for signature uniqueness, identity verification, and linking to signed records (11.100, 11.200)
Not specifically addressed as a separate topic in Section 4.3
Part 11 adds requirements beyond Section 4.3 for electronic signatures; sites using e-signatures must address Part 11 Subpart C directly
Geographic scope
U.S. FDA-regulated activities
Global (wherever ICH GCP is recognized)
International sites follow Section 4.3; U.S. sites follow both Part 11 and Section 4.3
Audit trails under Section 4.2.2: more than a transaction log
Section 4.2.2 deserves particular attention because it defines the audit trail requirements that the RC must ensure are met by any computerised system used for essential records. And Section 4.2.2 is more demanding -- and more useful -- than many practitioners realize.
The section requires that computerised systems maintain "logs of user account creation, changes to user roles and permissions and user access" (4.2.2(a)(i)). This is not just a record of who changed what data. It is a record of who was given access, when, and what permissions they were assigned. It transforms user management from an administrative function into an auditable process.
Section 4.2.2(a)(ii) requires that "systems are designed to permit data changes in such a way that the initial data entry and any subsequent changes or deletions are documented, including, where appropriate, the reason for the change." This is the classic audit trail requirement -- and the phrase "where appropriate, the reason for the change" is important. It means the system should be capable of capturing the rationale for a change, not merely the fact that a change occurred.
Audit trails are not optional -- and they must not be disableable
Section 4.2.2(b) explicitly requires that audit trails, reports, and logs not be disabled. This is a binary test: either the system produces audit trails that cannot be turned off by end users, or it does not. There is no proportionate middle ground on this specific point. When evaluating any electronic system for essential records management, the RC must verify that audit trail functionality is always active, that it cannot be circumvented by users, and that any exceptional modification to the audit trail is itself logged and justified. A system that allows end users to disable audit logging -- regardless of how sophisticated its other features may be -- fails this requirement.
Applying proportionality: not every system is equal
I have, in my years of working in this field, encountered two equally harmful misconceptions about electronic records compliance. The first is that Part 11 and Section 4.3 do not apply to investigator sites -- that these are "sponsor requirements" and the site need not worry about them. This is wrong. Section 2.12.10(c) explicitly places the obligation on the investigator for systems deployed by the investigator, and Part 11 applies to any entity creating electronic records under FDA regulations.
The second misconception is equally dangerous, though less obvious: the belief that every electronic system at the site must meet the same level of compliance rigor. A site that treats its shared network drive and a validated electronic data capture system as requiring identical compliance documentation is wasting resources -- resources that could be directed toward controls that actually reduce risk.
Proportionality is the antidote to both misconceptions. It acknowledges that compliance obligations exist while calibrating the response to the risk each system poses. Section 4.3.4(a) makes this explicit: the validation approach "should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results."
Practical recommendation: document the risk assessment, not just the conclusion
When applying proportionality, the most common mistake is reaching a reasonable conclusion -- "this system is low risk and does not require formal validation" -- without documenting the reasoning. During an inspection, the absence of formal validation for an electronic system is a potential observation. The presence of a documented risk assessment explaining why formal validation is not warranted -- identifying the system's intended use, the type of data it manages, and the controls in place -- transforms that potential observation into evidence of a thoughtful, risk-based compliance approach. The assessment need not be lengthy. It needs to be documented, dated, and defensible.
What this means for the regulatory coordinator
The regulatory framework for electronic records is more nuanced than vendor brochures or anxious corridor conversations suggest. Neither Part 11 nor Section 4.3 demands that investigator sites implement the same controls as pharmaceutical sponsors operating validated electronic trial master files across 200 sites. Both regulatory sources -- and the FDA's 2003 enforcement guidance -- recognize that compliance is proportionate to risk.
But proportionality does not mean inaction. The RC must ensure that the site's electronic records systems meet certain baseline requirements regardless of risk tier. Those baselines are non-negotiable.
Every system must have governing its use (Section 4.3.1). Every user must receive (Section 4.3.2). Every system must have limiting use to authorized individuals, with timely revocation when access is no longer needed (Section 4.3.8). Every system managing essential records must produce that cannot be disabled and that are interpretable and reviewable (Section 4.2.2). And every system must have including data backup and disaster recovery procedures (Section 4.3.3).
Key takeaway: the framework, not the fear
The regulatory coordinator's job is not to achieve perfect Part 11 compliance for every electronic system at the site. The job is to understand the regulatory framework, assess the risk each system poses, implement controls proportionate to that risk, and document the reasoning. This is exactly what both Part 11 (as interpreted through the 2003 guidance) and Section 4.3 require. Vendor marketing that suggests otherwise is selling a solution to a problem the vendor has defined on your behalf. Define the problem yourself. The regulatory framework gives you the tools to do so.
Check your understanding
1 of 3
A site is considering adopting an electronic regulatory binder platform to replace its paper regulatory files. The vendor's marketing materials state the platform provides "full 21 CFR Part 11 compliance." Before proceeding, the regulatory coordinator should evaluate the vendor's claim against specific regulatory requirements. Which of the following approaches best reflects the regulatory framework?
Enjoyed this preview?
Enroll to access all courses in the Regulatory Coordinator track.
Electronic records and signatures: understanding 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 at the site level
Provides the RC with a working understanding of 21 CFR Part 11 and ICH E6(R3) Section 4.3 -- what they require, where they overlap, and how the FDA's risk-based enforcement approach shapes practical compliance expectations.
The vendor email that provoked an unnecessary crisis
A site managing 11 active clinical trials receives an email from a vendor promoting an electronic document management system. The marketing materials are polished and confident. Midway through the brochure, a sentence appears in bold: "21 CFR Part 11 requires that all electronic records used in FDA-regulated activities meet specific requirements for validation, audit trails, and electronic signatures. Is your site compliant?"
The regulatory coordinator reads the sentence and feels a familiar knot of anxiety. The site uses a shared network drive to store scanned regulatory documents, a sponsor-provided portal for electronic submissions, and a locally maintained spreadsheet for version tracking. None of these systems, as far as the coordinator knows, have been formally validated. None produce the kind of audit trails the brochure describes. The coordinator drafts an email to the site director suggesting an emergency review of the site's electronic systems, attaching the vendor brochure as evidence of a compliance gap that requires immediate action.
But here is what the vendor brochure did not mention -- because vendor brochures rarely do. In August 2003, the FDA published a guidance document titled Scope and Application that fundamentally changed how Part 11 is enforced. The guidance announced that the FDA intended to exercise enforcement discretion -- meaning it would not enforce certain requirements of Part 11 -- and that it would apply a risk-based approach to determine which electronic records and signatures warranted the full weight of the regulation. The emergency the coordinator perceived was not, in fact, an emergency. It was a misunderstanding produced by encountering Part 11 without the context that shapes how the regulation actually operates in practice.
This lesson provides that context. It examines the two regulatory sources that govern electronic records at investigator sites -- 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 -- and explains what they require, where they converge, and how the FDA's risk-based enforcement approach determines what compliance actually looks like for a site-level regulatory coordinator.
What you will learn
By the end of this lesson, you will be able to:
1
Two regulatory sources, one compliance obligation
A regulatory coordinator managing electronic records at an investigator site must understand two distinct but overlapping sources of regulatory authority. Each source has a different origin, a different scope, and a different enforcement mechanism. Treating them as interchangeable -- or, worse, ignoring one while fixating on the other -- produces either overcompliance or undercompliance, and neither serves the site well.
21 CFR Part 11 is a United States federal regulation, finalized in March 1997, that establishes the criteria under which the FDA considers electronic records and electronic signatures to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures. Part 11 applies to any electronic record created, modified, maintained, archived, retrieved, or transmitted under any records requirement set forth in FDA regulations. It is a -- meaning it has the force of law for FDA-regulated activities conducted in the United States or submitted to the FDA.
Two sources, parallel application
21 CFR Part 11 is a U.S. federal regulation governing electronic records and signatures in FDA-regulated activities. ICH E6(R3) Section 4.3 is a harmonised guideline governing computerised systems in clinical trials globally. At a U.S. investigator site, both apply simultaneously. They are not in conflict -- they address overlapping but distinct aspects of electronic records management. Understanding each source independently, and then understanding where they converge, is essential for designing proportionate compliance.
21 CFR Part 11: what the regulation actually requires
Part 11 is organized into three subparts. Subpart A establishes general provisions, including the scope of the regulation. Subpart B sets requirements for electronic records. Subpart C sets requirements for electronic signatures. For a regulatory coordinator, the practical requirements fall into four categories.
Validation. Part 11 requires that persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and confidentiality of electronic records. The systems must be validated to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records (21 CFR 11.10(a)).
The regulation requires that systems used to create, modify, maintain, or transmit electronic records include computer-generated, time-stamped audit trails that independently record the date and time of operator entries and actions that create, modify, or delete electronic records. These audit trails must be retained for a period at least as long as the required retention period for the subject electronic records and must be available for agency review and copying (21 CFR 11.10(e)).
The 2003 guidance: risk-based enforcement that changed everything
In August 2003, the FDA issued a guidance document titled Guidance for Industry: Part 11, Electronic Records; Electronic Signatures -- Scope and Application. This document did not amend Part 11. The regulation remains exactly as it was enacted in 1997. What the guidance did was announce the FDA's intention to exercise enforcement discretion regarding certain Part 11 requirements, and to narrow the scope of records and signatures to which the agency would apply its enforcement efforts.
The 2003 guidance made three things clear.
First, the FDA stated it would apply a . Part 11 applies to records that are required to be maintained under any FDA predicate rule (the underlying regulation that creates the recordkeeping requirement) and that are maintained in electronic format. If a site creates a record voluntarily -- not because a regulation requires it -- Part 11 does not apply to that record merely because it is electronic. And if a regulation requires a record but the site maintains it on paper, Part 11 does not apply to the paper record even if an electronic copy also exists, provided the electronic copy is not relied upon as the regulatory record.
Key takeaway: Part 11 is enforced through a risk-based lens
The 2003 Scope and Application guidance did not repeal or weaken Part 11. The regulation stands as enacted. What the guidance established is that the FDA applies Part 11 proportionate to risk. For a regulatory coordinator, this means that not every electronic record at the site demands the same level of Part 11 compliance effort. Records critical to participant safety and data integrity warrant rigorous controls. Administrative records maintained electronically for convenience warrant proportionately less. The risk assessment -- not the vendor brochure -- determines the appropriate compliance posture.
ICH E6(R3) Section 4.3: the GCP framework for computerised systems
Section 4.3 of ICH E6(R3) Annex 1 establishes requirements for computerised systems used in clinical trials. Where Part 11 focuses specifically on electronic records and signatures as regulatory substitutes for paper, Section 4.3 takes a broader view: it addresses the full lifecycle of computerised systems in the trial context, from procedures and training through validation, security, and user management.
The section opens with an important framing statement. It notes that "the responsibilities of the sponsor, investigator and the activities of other parties with respect to a computerised system used in clinical trials should be clear and documented" (Section 4.3). This allocation of responsibility is fundamental -- and it is where the RC's role becomes concrete. Not every computerised system at the site is the investigator's responsibility. Sponsor-deployed systems are the sponsor's responsibility. But systems deployed by the investigator or institution -- and this includes locally managed document storage, site-maintained tracking tools, and any electronic system the site chooses to use for records management -- fall under the investigator's obligations as defined in Section 2.12.10.
Figure 1: The dual regulatory framework for electronic records at investigator sites -- convergent requirements with complementary enforcement approaches
Section 4.3 subsection by subsection: what each requires
I want to walk through the Section 4.3 subsections that matter most to the regulatory coordinator. Not all eight subsections carry equal weight for site-level records management, and understanding the relative significance prevents the trap of treating every requirement as equally urgent.
Section 4.3.1 -- Procedures. "Documented procedures should be in place to ensure the appropriate use of computerised systems in clinical trials for essential activities related to data collection, handling and management." For the RC, this means the site must have written procedures -- not just informal habits -- governing how electronic systems are used for records management. If the site uses a shared network drive for regulatory documents, the procedure documents who has access, how files are named, where they are stored, and how superseded versions are handled. The procedure need not be elaborate. It needs to be documented, followed, and available.
Section 4.3 subsections: summary of site-level requirements
1
4.3.1 Procedures: documented, not assumed
Where Part 11 and Section 4.3 converge -- and where they differ
Having examined each source independently, it is worth mapping the points of convergence and divergence. Understanding both prevents two common errors: applying Part 11 requirements where only Section 4.3 applies (overcompliance), and assuming Section 4.3 satisfies Part 11 when additional requirements exist (undercompliance).
The convergence is substantial. Both Part 11 and Section 4.3 require of systems, though Section 4.3.4(a) makes the risk-based proportionality principle more explicit than Part 11's text does alone (the FDA's 2003 guidance brings Part 11 enforcement into alignment with this principle). Both require -- Part 11 through 11.10(e) and Section 4.3 through the broader metadata and audit trail framework in Section 4.2.2. Both require limiting system use to authorized individuals -- Part 11 through 11.10(d) and (g), Section 4.3 through 4.3.8. And both require protecting data integrity -- Part 11 through its general system controls, Section 4.3.3 through its specific security framework.
Reference Table
Convergence and divergence: Part 11 and Section 4.3
Requirement domain
21 CFR Part 11
ICH E6(R3) Section 4.3
Practical implication for the RC
Validation
Systems must be validated to ensure accuracy, reliability, and consistent intended performance (11.10(a))
Validation approach based on risk assessment considering intended use, data importance, and potential impact (4.3.4(a))
Conduct a risk assessment per 4.3.4(a); the assessment determines the validation approach, which should also satisfy Part 11's validation requirement
Audit trails
Computer-generated, time-stamped audit trails recording creation, modification, and deletion (11.10(e))
Metadata and audit trail requirements in Section 4.2.2, including logs of user account creation, data changes with reason, and workflow actions
Section 4.2.2 requirements are substantively broader than Part 11's audit trail provision; compliance with 4.2.2 generally satisfies 11.10(e)
Access controls
Limit system access to authorized individuals (11.10(d), (g))
Role-based access, periodic review, and timely revocation (4.3.8(a)-(c))
Section 4.3.8 provides more operational detail than Part 11; implementing 4.3.8 satisfies the Part 11 access control requirement
Security
System controls ensuring authenticity, integrity, and confidentiality (11.10)
Security controls including user management, breach prevention and detection, backup, and disaster recovery (4.3.3)
Section 4.3.3 is more specific than Part 11's general security language; implementing 4.3.3 exceeds the Part 11 baseline
Electronic signatures
Detailed requirements for signature uniqueness, identity verification, and linking to signed records (11.100, 11.200)
Not specifically addressed as a separate topic in Section 4.3
Part 11 adds requirements beyond Section 4.3 for electronic signatures; sites using e-signatures must address Part 11 Subpart C directly
Geographic scope
U.S. FDA-regulated activities
Global (wherever ICH GCP is recognized)
International sites follow Section 4.3; U.S. sites follow both Part 11 and Section 4.3
Audit trails under Section 4.2.2: more than a transaction log
Section 4.2.2 deserves particular attention because it defines the audit trail requirements that the RC must ensure are met by any computerised system used for essential records. And Section 4.2.2 is more demanding -- and more useful -- than many practitioners realize.
The section requires that computerised systems maintain "logs of user account creation, changes to user roles and permissions and user access" (4.2.2(a)(i)). This is not just a record of who changed what data. It is a record of who was given access, when, and what permissions they were assigned. It transforms user management from an administrative function into an auditable process.
Section 4.2.2(a)(ii) requires that "systems are designed to permit data changes in such a way that the initial data entry and any subsequent changes or deletions are documented, including, where appropriate, the reason for the change." This is the classic audit trail requirement -- and the phrase "where appropriate, the reason for the change" is important. It means the system should be capable of capturing the rationale for a change, not merely the fact that a change occurred.
Audit trails are not optional -- and they must not be disableable
Section 4.2.2(b) explicitly requires that audit trails, reports, and logs not be disabled. This is a binary test: either the system produces audit trails that cannot be turned off by end users, or it does not. There is no proportionate middle ground on this specific point. When evaluating any electronic system for essential records management, the RC must verify that audit trail functionality is always active, that it cannot be circumvented by users, and that any exceptional modification to the audit trail is itself logged and justified. A system that allows end users to disable audit logging -- regardless of how sophisticated its other features may be -- fails this requirement.
Applying proportionality: not every system is equal
I have, in my years of working in this field, encountered two equally harmful misconceptions about electronic records compliance. The first is that Part 11 and Section 4.3 do not apply to investigator sites -- that these are "sponsor requirements" and the site need not worry about them. This is wrong. Section 2.12.10(c) explicitly places the obligation on the investigator for systems deployed by the investigator, and Part 11 applies to any entity creating electronic records under FDA regulations.
The second misconception is equally dangerous, though less obvious: the belief that every electronic system at the site must meet the same level of compliance rigor. A site that treats its shared network drive and a validated electronic data capture system as requiring identical compliance documentation is wasting resources -- resources that could be directed toward controls that actually reduce risk.
Proportionality is the antidote to both misconceptions. It acknowledges that compliance obligations exist while calibrating the response to the risk each system poses. Section 4.3.4(a) makes this explicit: the validation approach "should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results."
Practical recommendation: document the risk assessment, not just the conclusion
When applying proportionality, the most common mistake is reaching a reasonable conclusion -- "this system is low risk and does not require formal validation" -- without documenting the reasoning. During an inspection, the absence of formal validation for an electronic system is a potential observation. The presence of a documented risk assessment explaining why formal validation is not warranted -- identifying the system's intended use, the type of data it manages, and the controls in place -- transforms that potential observation into evidence of a thoughtful, risk-based compliance approach. The assessment need not be lengthy. It needs to be documented, dated, and defensible.
What this means for the regulatory coordinator
The regulatory framework for electronic records is more nuanced than vendor brochures or anxious corridor conversations suggest. Neither Part 11 nor Section 4.3 demands that investigator sites implement the same controls as pharmaceutical sponsors operating validated electronic trial master files across 200 sites. Both regulatory sources -- and the FDA's 2003 enforcement guidance -- recognize that compliance is proportionate to risk.
But proportionality does not mean inaction. The RC must ensure that the site's electronic records systems meet certain baseline requirements regardless of risk tier. Those baselines are non-negotiable.
Every system must have governing its use (Section 4.3.1). Every user must receive (Section 4.3.2). Every system must have limiting use to authorized individuals, with timely revocation when access is no longer needed (Section 4.3.8). Every system managing essential records must produce that cannot be disabled and that are interpretable and reviewable (Section 4.2.2). And every system must have including data backup and disaster recovery procedures (Section 4.3.3).
Key takeaway: the framework, not the fear
The regulatory coordinator's job is not to achieve perfect Part 11 compliance for every electronic system at the site. The job is to understand the regulatory framework, assess the risk each system poses, implement controls proportionate to that risk, and document the reasoning. This is exactly what both Part 11 (as interpreted through the 2003 guidance) and Section 4.3 require. Vendor marketing that suggests otherwise is selling a solution to a problem the vendor has defined on your behalf. Define the problem yourself. The regulatory framework gives you the tools to do so.
Check your understanding
1 of 3
A site is considering adopting an electronic regulatory binder platform to replace its paper regulatory files. The vendor's marketing materials state the platform provides "full 21 CFR Part 11 compliance." Before proceeding, the regulatory coordinator should evaluate the vendor's claim against specific regulatory requirements. Which of the following approaches best reflects the regulatory framework?
Enjoyed this preview?
Enroll to access all courses in the Regulatory Coordinator track.
Analyze the core requirements of 21 CFR Part 11 and ICH E6(R3) Section 4.3 as they apply to electronic document management at the investigator site level
2
Evaluate the FDA's risk-based enforcement approach, applying proportionality to determine appropriate compliance measures for different system categories
3
Apply Section 4.3.3 security and Section 4.2.2 audit trail requirements to electronic document management, designing governance without disproportionate burden
regulation
ICH E6(R3) Annex 1, Section 4.3 -- titled "Computerised Systems" -- establishes the requirements for computerised systems used in clinical trials under the ICH harmonised guideline for Good Clinical Practice. Section 4.3 is broader in geographic application than Part 11 (it applies wherever ICH GCP is recognized), but narrower in subject matter (it addresses computerised systems used in clinical trials specifically, not all FDA-regulated electronic records). The final guideline was adopted on 06 January 2025.
The relationship between these two sources is not hierarchical. Part 11 does not override Section 4.3, and Section 4.3 does not supersede Part 11. They operate in parallel. For a regulatory coordinator at a U.S.-based investigator site conducting clinical trials, both apply simultaneously -- and the practical compliance obligation is to satisfy whichever source imposes the more specific or more stringent requirement for a given activity.
Audit trails.
Access controls. Part 11 requires the use of appropriate controls over systems documentation, including revision and change control procedures, to maintain an audit trail that documents time-sequenced development and modification of systems documentation. It also requires limiting system access to authorized individuals (21 CFR 11.10(d), (g)).
Electronic signatures. Where electronic signatures are employed, Part 11 requires that each electronic signature be unique to one individual and not be reused by or reassigned to anyone else (21 CFR 11.100(a)). The regulation distinguishes between electronic signatures based on biometrics and those not based on biometrics, with different requirements for each.
These requirements, read in isolation, sound rigorous -- and they are. But reading Part 11 in isolation, without the 2003 guidance, is like reading a statute without knowing the case law that interprets it. The text tells you what the law says. The guidance tells you how it is applied.
narrow interpretation of scope
Second, the FDA announced it would exercise enforcement discretion regarding specific Part 11 requirements. The agency stated it did not intend to enforce requirements relating to: validation, audit trail, record retention, record copying, and legacy systems -- provided that predicate rule requirements were met and the records were accurate and complete. This did not mean these requirements were eliminated. It meant the FDA would focus its enforcement on whether the underlying predicate rules were satisfied, not on whether the technical requirements of Part 11 were perfectly implemented.
Third, the guidance established a risk-based approach. The FDA stated that it intended to interpret Part 11 in a manner that would be "narrow" and would apply enforcement proportionate to the risk associated with the records and signatures in question. Higher-risk records -- those critical to product quality, safety, or efficacy determinations -- would receive closer scrutiny. Lower-risk records would receive proportionately less.
Section 2.12.10 is specific. It requires the investigator or institution to: ensure appropriate individuals have secure and attributable access to systems deployed by the investigator (2.12.10(a)); notify the sponsor when access permissions need to change for sponsor-deployed systems (2.12.10(b)); and, critically, ensure that systems deployed by the investigator specifically for clinical trial purposes meet the requirements of Section 4 "proportionate to the risks to participants and to the importance of the data" (2.12.10(c)).
That word -- proportionate -- is doing an enormous amount of work. It is the same principle that underlies the FDA's risk-based enforcement of Part 11, and it appears explicitly in the ICH framework. Proportionality means that a site's locally maintained spreadsheet for tracking document versions does not require the same validation rigor as a sponsor's electronic data capture system collecting primary efficacy endpoints. Both are computerised systems. Both are used in clinical trials. But their risk profiles are different, and Section 4.3 recognizes this.
Section 4.3.2 -- Training. "The responsible party should ensure that those using computerised systems are appropriately trained in their use." For the RC, this means that every person who accesses the site's electronic records systems -- coordinators, investigators, regulatory staff -- must receive documented training on the system. This is not optional, and it is not satisfied by the assumption that everyone knows how to use a shared drive. Training must be documented, because undocumented training is, for regulatory purposes, no training at all.
Section 4.3.3 -- Security. This subsection requires that security controls be "implemented and maintained" for computerised systems, including "user management and ongoing measures to prevent, detect and/or mitigate security breaches" (4.3.3(b)). It also requires "adequate backup of the data" (4.3.3(c)) and procedures covering "system security measures, data backup and disaster recovery" (4.3.3(d)). For a site using network storage for regulatory documents, this translates into specific operational requirements: authenticated user access, regular data backups, and a documented plan for recovering data if the system fails. These are not theoretical concerns. Hard drives fail. Servers are compromised. The question is not whether a disruption will occur, but whether the site can recover its records when it does.
Section 4.3.4 -- Validation. This is the subsection that generates the most anxiety, and -- I will be direct -- the most unnecessary anxiety. Section 4.3.4(a) states that "the approach to validation of computerised systems should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results." Read that requirement carefully. It does not say that every system requires formal IQ/OQ/PQ validation. It says the approach to validation should be based on a risk assessment. A site's shared network drive used to store PDF copies of regulatory documents does not carry the same validation burden as an electronic data capture system collecting primary efficacy endpoints. The risk assessment determines the validation approach, and Section 4.3.4(a) explicitly authorizes proportionate effort.
Section 4.3.8 -- User management. This subsection requires that "access controls are integral to computerised systems used in clinical trials to limit system access to authorised users and to ensure attributability to an individual" (4.3.8(a)). It further requires that "user access permissions are appropriately assigned based on a user's duties and functions" and that "access permissions should be revoked when they are no longer needed" with periodic review (4.3.8(b)). For the RC, this means maintaining documented records of who has access to the site's electronic records systems, what their permissions are, and ensuring that access is removed when staff depart or change roles.
The site must maintain written procedures for the use of each computerised system involved in records management. For a shared network drive, the procedure specifies access protocols, naming conventions, filing structure, and version management. For an electronic document management system, the procedure covers system access, document upload workflows, and retrieval processes. The procedure must be current, accessible to all users, and followed in practice.
2
4.3.2 Training: documented, not informal
Every individual who accesses a computerised system used for clinical trial records must receive training appropriate to their role, and that training must be documented. For a regulatory coordinator adding a new CRC to the team, this means providing training on the site's electronic records systems and maintaining a record of the training date, content covered, and trainer identity. Annual refresher training or retraining after system changes should also be documented.
3
4.3.3 Security: protect, detect, recover
Security controls encompass three operational domains. Protection: authenticated access, password management, and role-based permissions prevent unauthorized access. Detection: monitoring and logging identify unauthorized access attempts or anomalous activity. Recovery: regular backups, disaster recovery procedures, and periodic testing of recovery processes ensure that records can be restored if the system fails. Section 4.3.3(d) specifically requires periodic testing of these measures.
4
4.3.4 Validation: proportionate to risk, not uniform
Validation effort is calibrated to risk. A sponsor's EDC system collecting primary endpoints requires rigorous validation. A site's shared network drive storing PDF copies of regulatory documents requires documented evidence that the system reliably stores and retrieves files, but not the same level of formal validation. The risk assessment considers intended use, data importance, and potential impact on participant safety and data reliability. The assessment itself must be documented.
5
4.3.5-4.3.7 System release, failure, and support
Section 4.3.5 specifies that trial-specific systems be released only after necessary approvals are received. Section 4.3.6 specifies contingency procedures for system failures that could affect participant safety, trial decisions, or outcomes. Section 4.3.7 specifies mechanisms for documenting, evaluating, and managing system issues, with periodic review of cumulative issues to identify systemic problems. For the RC, these translate into: do not deploy new systems mid-study without proper change control; have a plan for when systems go down; and track system problems rather than treating each as an isolated incident.
6
4.3.8 User management: access as a documented lifecycle
User access is not a one-time event. It is a lifecycle: granting access when a user is assigned a role, modifying access when roles change, revoking access upon departure, and periodically reviewing all access to confirm it remains appropriate. Section 4.3.8(c) requires that authorized users and access permissions be 'clearly documented, maintained and retained,' including updates to roles, permissions, and the time access was granted. This creates an audit trail of access management itself.
validation
audit trails
access controls
security measures
The divergences are also important. Part 11 addresses electronic signatures extensively (Subpart C), defining the conditions under which an electronic signature is legally equivalent to a handwritten signature. Section 4.3 does not address electronic signatures as a distinct topic -- it assumes signatures are addressed through the broader data integrity framework. Part 11 applies to all FDA-regulated electronic records, not just those in clinical trials. Section 4.3 applies only to computerised systems used in clinical trials but does so globally, not just in the United States. And Part 11 imposes specific technical requirements (such as time-stamped audit trails recording the date and time of entries) that are more prescriptive than Section 4.3's principles-based approach.
For a U.S. investigator site, the practical implication is this: compliance with Section 4.3 will satisfy most, but not all, Part 11 requirements. The areas where Part 11 adds obligations beyond Section 4.3 relate primarily to electronic signatures and to certain technical specifications for audit trails. The regulatory coordinator does not need to maintain two separate compliance programs. The coordinator needs one integrated approach that addresses the combined requirements of both sources.
Section 4.2.2(b) adds a protection that is often overlooked: "Ensuring that audit trails, reports and logs are not disabled." An audit trail that can be turned off is not an audit trail. It is a suggestion. The RC must confirm that the site's electronic systems produce audit trails that cannot be disabled by end users -- and that any modification to the audit trail itself is logged and justified.
And Section 4.2.2(c) requires that "audit trails and logs are interpretable and can support review." An audit trail that exists but is unintelligible to a reviewer -- buried in raw database logs that require specialized software to parse -- fails this requirement. Audit trails must be accessible and reviewable by the people who need to review them, which includes the RC, monitors, and inspectors.
In practical terms, the RC can categorize the site's electronic systems into risk tiers.
Higher-risk systems are those where data integrity failures could directly affect participant safety or primary trial outcomes. An electronic data capture system collecting primary efficacy endpoints. A randomization system assigning treatment. An electronic prescribing system for investigational product dosing. These systems require rigorous validation, comprehensive audit trails, and formal access control documentation.
Moderate-risk systems are those that manage important regulatory records but do not directly affect participant safety or primary endpoints. An electronic document management system storing essential records. A regulatory binder management platform. These systems require documented procedures, access controls, and audit trail capability, but the validation approach may be less formal than for higher-risk systems.
Lower-risk systems are those used for administrative convenience where paper or alternative records serve as the official regulatory record. A shared drive storing convenience copies of regulatory documents when the paper binder is the official record. A locally maintained tracking spreadsheet. These systems should have documented procedures and access controls, but the validation burden is minimal -- the risk assessment documents why the system poses low risk and what controls are in place.
documented procedures
documented training
access controls
audit trails
security measures
Above these baselines, the risk assessment determines what additional controls are required. The RC does not need to be a systems validation expert. The RC needs to understand the regulatory framework well enough to conduct a risk assessment, document it, and ensure the site's compliance measures are proportionate to the risk each system poses.
The remaining lessons in this module apply these principles to specific operational decisions. Lesson 2 provides a framework for evaluating electronic document management systems -- translating the regulatory requirements examined here into specific questions the RC should ask of vendors and of the site's own systems. Lesson 3 addresses the governance challenges of hybrid paper-electronic environments. And Lesson 4 covers the ongoing governance the RC must establish for system access, security, and audit trail review.
Analyze the core requirements of 21 CFR Part 11 and ICH E6(R3) Section 4.3 as they apply to electronic document management at the investigator site level
2
Evaluate the FDA's risk-based enforcement approach, applying proportionality to determine appropriate compliance measures for different system categories
3
Apply Section 4.3.3 security and Section 4.2.2 audit trail requirements to electronic document management, designing governance without disproportionate burden
regulation
ICH E6(R3) Annex 1, Section 4.3 -- titled "Computerised Systems" -- establishes the requirements for computerised systems used in clinical trials under the ICH harmonised guideline for Good Clinical Practice. Section 4.3 is broader in geographic application than Part 11 (it applies wherever ICH GCP is recognized), but narrower in subject matter (it addresses computerised systems used in clinical trials specifically, not all FDA-regulated electronic records). The final guideline was adopted on 06 January 2025.
The relationship between these two sources is not hierarchical. Part 11 does not override Section 4.3, and Section 4.3 does not supersede Part 11. They operate in parallel. For a regulatory coordinator at a U.S.-based investigator site conducting clinical trials, both apply simultaneously -- and the practical compliance obligation is to satisfy whichever source imposes the more specific or more stringent requirement for a given activity.
Audit trails.
Access controls. Part 11 requires the use of appropriate controls over systems documentation, including revision and change control procedures, to maintain an audit trail that documents time-sequenced development and modification of systems documentation. It also requires limiting system access to authorized individuals (21 CFR 11.10(d), (g)).
Electronic signatures. Where electronic signatures are employed, Part 11 requires that each electronic signature be unique to one individual and not be reused by or reassigned to anyone else (21 CFR 11.100(a)). The regulation distinguishes between electronic signatures based on biometrics and those not based on biometrics, with different requirements for each.
These requirements, read in isolation, sound rigorous -- and they are. But reading Part 11 in isolation, without the 2003 guidance, is like reading a statute without knowing the case law that interprets it. The text tells you what the law says. The guidance tells you how it is applied.
narrow interpretation of scope
Second, the FDA announced it would exercise enforcement discretion regarding specific Part 11 requirements. The agency stated it did not intend to enforce requirements relating to: validation, audit trail, record retention, record copying, and legacy systems -- provided that predicate rule requirements were met and the records were accurate and complete. This did not mean these requirements were eliminated. It meant the FDA would focus its enforcement on whether the underlying predicate rules were satisfied, not on whether the technical requirements of Part 11 were perfectly implemented.
Third, the guidance established a risk-based approach. The FDA stated that it intended to interpret Part 11 in a manner that would be "narrow" and would apply enforcement proportionate to the risk associated with the records and signatures in question. Higher-risk records -- those critical to product quality, safety, or efficacy determinations -- would receive closer scrutiny. Lower-risk records would receive proportionately less.
Section 2.12.10 is specific. It requires the investigator or institution to: ensure appropriate individuals have secure and attributable access to systems deployed by the investigator (2.12.10(a)); notify the sponsor when access permissions need to change for sponsor-deployed systems (2.12.10(b)); and, critically, ensure that systems deployed by the investigator specifically for clinical trial purposes meet the requirements of Section 4 "proportionate to the risks to participants and to the importance of the data" (2.12.10(c)).
That word -- proportionate -- is doing an enormous amount of work. It is the same principle that underlies the FDA's risk-based enforcement of Part 11, and it appears explicitly in the ICH framework. Proportionality means that a site's locally maintained spreadsheet for tracking document versions does not require the same validation rigor as a sponsor's electronic data capture system collecting primary efficacy endpoints. Both are computerised systems. Both are used in clinical trials. But their risk profiles are different, and Section 4.3 recognizes this.
Section 4.3.2 -- Training. "The responsible party should ensure that those using computerised systems are appropriately trained in their use." For the RC, this means that every person who accesses the site's electronic records systems -- coordinators, investigators, regulatory staff -- must receive documented training on the system. This is not optional, and it is not satisfied by the assumption that everyone knows how to use a shared drive. Training must be documented, because undocumented training is, for regulatory purposes, no training at all.
Section 4.3.3 -- Security. This subsection requires that security controls be "implemented and maintained" for computerised systems, including "user management and ongoing measures to prevent, detect and/or mitigate security breaches" (4.3.3(b)). It also requires "adequate backup of the data" (4.3.3(c)) and procedures covering "system security measures, data backup and disaster recovery" (4.3.3(d)). For a site using network storage for regulatory documents, this translates into specific operational requirements: authenticated user access, regular data backups, and a documented plan for recovering data if the system fails. These are not theoretical concerns. Hard drives fail. Servers are compromised. The question is not whether a disruption will occur, but whether the site can recover its records when it does.
Section 4.3.4 -- Validation. This is the subsection that generates the most anxiety, and -- I will be direct -- the most unnecessary anxiety. Section 4.3.4(a) states that "the approach to validation of computerised systems should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results." Read that requirement carefully. It does not say that every system requires formal IQ/OQ/PQ validation. It says the approach to validation should be based on a risk assessment. A site's shared network drive used to store PDF copies of regulatory documents does not carry the same validation burden as an electronic data capture system collecting primary efficacy endpoints. The risk assessment determines the validation approach, and Section 4.3.4(a) explicitly authorizes proportionate effort.
Section 4.3.8 -- User management. This subsection requires that "access controls are integral to computerised systems used in clinical trials to limit system access to authorised users and to ensure attributability to an individual" (4.3.8(a)). It further requires that "user access permissions are appropriately assigned based on a user's duties and functions" and that "access permissions should be revoked when they are no longer needed" with periodic review (4.3.8(b)). For the RC, this means maintaining documented records of who has access to the site's electronic records systems, what their permissions are, and ensuring that access is removed when staff depart or change roles.
The site must maintain written procedures for the use of each computerised system involved in records management. For a shared network drive, the procedure specifies access protocols, naming conventions, filing structure, and version management. For an electronic document management system, the procedure covers system access, document upload workflows, and retrieval processes. The procedure must be current, accessible to all users, and followed in practice.
2
4.3.2 Training: documented, not informal
Every individual who accesses a computerised system used for clinical trial records must receive training appropriate to their role, and that training must be documented. For a regulatory coordinator adding a new CRC to the team, this means providing training on the site's electronic records systems and maintaining a record of the training date, content covered, and trainer identity. Annual refresher training or retraining after system changes should also be documented.
3
4.3.3 Security: protect, detect, recover
Security controls encompass three operational domains. Protection: authenticated access, password management, and role-based permissions prevent unauthorized access. Detection: monitoring and logging identify unauthorized access attempts or anomalous activity. Recovery: regular backups, disaster recovery procedures, and periodic testing of recovery processes ensure that records can be restored if the system fails. Section 4.3.3(d) specifically requires periodic testing of these measures.
4
4.3.4 Validation: proportionate to risk, not uniform
Validation effort is calibrated to risk. A sponsor's EDC system collecting primary endpoints requires rigorous validation. A site's shared network drive storing PDF copies of regulatory documents requires documented evidence that the system reliably stores and retrieves files, but not the same level of formal validation. The risk assessment considers intended use, data importance, and potential impact on participant safety and data reliability. The assessment itself must be documented.
5
4.3.5-4.3.7 System release, failure, and support
Section 4.3.5 specifies that trial-specific systems be released only after necessary approvals are received. Section 4.3.6 specifies contingency procedures for system failures that could affect participant safety, trial decisions, or outcomes. Section 4.3.7 specifies mechanisms for documenting, evaluating, and managing system issues, with periodic review of cumulative issues to identify systemic problems. For the RC, these translate into: do not deploy new systems mid-study without proper change control; have a plan for when systems go down; and track system problems rather than treating each as an isolated incident.
6
4.3.8 User management: access as a documented lifecycle
User access is not a one-time event. It is a lifecycle: granting access when a user is assigned a role, modifying access when roles change, revoking access upon departure, and periodically reviewing all access to confirm it remains appropriate. Section 4.3.8(c) requires that authorized users and access permissions be 'clearly documented, maintained and retained,' including updates to roles, permissions, and the time access was granted. This creates an audit trail of access management itself.
validation
audit trails
access controls
security measures
The divergences are also important. Part 11 addresses electronic signatures extensively (Subpart C), defining the conditions under which an electronic signature is legally equivalent to a handwritten signature. Section 4.3 does not address electronic signatures as a distinct topic -- it assumes signatures are addressed through the broader data integrity framework. Part 11 applies to all FDA-regulated electronic records, not just those in clinical trials. Section 4.3 applies only to computerised systems used in clinical trials but does so globally, not just in the United States. And Part 11 imposes specific technical requirements (such as time-stamped audit trails recording the date and time of entries) that are more prescriptive than Section 4.3's principles-based approach.
For a U.S. investigator site, the practical implication is this: compliance with Section 4.3 will satisfy most, but not all, Part 11 requirements. The areas where Part 11 adds obligations beyond Section 4.3 relate primarily to electronic signatures and to certain technical specifications for audit trails. The regulatory coordinator does not need to maintain two separate compliance programs. The coordinator needs one integrated approach that addresses the combined requirements of both sources.
Section 4.2.2(b) adds a protection that is often overlooked: "Ensuring that audit trails, reports and logs are not disabled." An audit trail that can be turned off is not an audit trail. It is a suggestion. The RC must confirm that the site's electronic systems produce audit trails that cannot be disabled by end users -- and that any modification to the audit trail itself is logged and justified.
And Section 4.2.2(c) requires that "audit trails and logs are interpretable and can support review." An audit trail that exists but is unintelligible to a reviewer -- buried in raw database logs that require specialized software to parse -- fails this requirement. Audit trails must be accessible and reviewable by the people who need to review them, which includes the RC, monitors, and inspectors.
In practical terms, the RC can categorize the site's electronic systems into risk tiers.
Higher-risk systems are those where data integrity failures could directly affect participant safety or primary trial outcomes. An electronic data capture system collecting primary efficacy endpoints. A randomization system assigning treatment. An electronic prescribing system for investigational product dosing. These systems require rigorous validation, comprehensive audit trails, and formal access control documentation.
Moderate-risk systems are those that manage important regulatory records but do not directly affect participant safety or primary endpoints. An electronic document management system storing essential records. A regulatory binder management platform. These systems require documented procedures, access controls, and audit trail capability, but the validation approach may be less formal than for higher-risk systems.
Lower-risk systems are those used for administrative convenience where paper or alternative records serve as the official regulatory record. A shared drive storing convenience copies of regulatory documents when the paper binder is the official record. A locally maintained tracking spreadsheet. These systems should have documented procedures and access controls, but the validation burden is minimal -- the risk assessment documents why the system poses low risk and what controls are in place.
documented procedures
documented training
access controls
audit trails
security measures
Above these baselines, the risk assessment determines what additional controls are required. The RC does not need to be a systems validation expert. The RC needs to understand the regulatory framework well enough to conduct a risk assessment, document it, and ensure the site's compliance measures are proportionate to the risk each system poses.
The remaining lessons in this module apply these principles to specific operational decisions. Lesson 2 provides a framework for evaluating electronic document management systems -- translating the regulatory requirements examined here into specific questions the RC should ask of vendors and of the site's own systems. Lesson 3 addresses the governance challenges of hybrid paper-electronic environments. And Lesson 4 covers the ongoing governance the RC must establish for system access, security, and audit trail review.