Sign inJoin Free
DashboardSign out
Regulatory Coordinator
Full course · Essential Records Infrastructure & Document Management
Regulatory Coordinator
Full course · Essential Records Infrastructure & Document Management
Free Lesson Preview
Module 1: Lesson 1

Provides the RC with a working understanding of 21 CFR Part 11 and ICH E6(R3) Section 4.3 -- what they require, where they overlap, and how the FDA's risk-based enforcement approach shapes practical compliance expectations.
A site managing 11 active clinical trials receives an email from a vendor promoting an electronic document management system. The marketing materials are polished and confident. Midway through the brochure, a sentence appears in bold: "21 CFR Part 11 requires that all electronic records used in FDA-regulated activities meet specific requirements for validation, audit trails, and electronic signatures. Is your site compliant?"
The regulatory coordinator reads the sentence and feels a familiar knot of anxiety. The site uses a shared network drive to store scanned regulatory documents, a sponsor-provided portal for electronic submissions, and a locally maintained spreadsheet for version tracking. None of these systems, as far as the coordinator knows, have been formally validated. None produce the kind of audit trails the brochure describes. The coordinator drafts an email to the site director suggesting an emergency review of the site's electronic systems, attaching the vendor brochure as evidence of a compliance gap that requires immediate action.
But here is what the vendor brochure did not mention -- because vendor brochures rarely do. In August 2003, the FDA published a guidance document titled Scope and Application that fundamentally changed how Part 11 is enforced. The guidance announced that the FDA intended to exercise enforcement discretion -- meaning it would not enforce certain requirements of Part 11 -- and that it would apply a risk-based approach to determine which electronic records and signatures warranted the full weight of the regulation. The emergency the coordinator perceived was not, in fact, an emergency. It was a misunderstanding produced by encountering Part 11 without the context that shapes how the regulation actually operates in practice.
This lesson provides that context. It examines the two regulatory sources that govern electronic records at investigator sites -- 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 -- and explains what they require, where they converge, and how the FDA's risk-based enforcement approach determines what compliance actually looks like for a site-level regulatory coordinator.
By the end of this lesson, you will be able to:
A regulatory coordinator managing electronic records at an investigator site must understand two distinct but overlapping sources of regulatory authority. Each source has a different origin, a different scope, and a different enforcement mechanism. Treating them as interchangeable -- or, worse, ignoring one while fixating on the other -- produces either overcompliance or undercompliance, and neither serves the site well.
21 CFR Part 11 is a United States federal regulation, finalized in March 1997, that establishes the criteria under which the FDA considers electronic records and electronic signatures to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures. Part 11 applies to any electronic record created, modified, maintained, archived, retrieved, or transmitted under any records requirement set forth in FDA regulations. It is a regulation -- meaning it has the force of law for FDA-regulated activities conducted in the United States or submitted to the FDA.
ICH E6(R3) Annex 1, Section 4.3 -- titled "Computerised Systems" -- establishes the requirements for computerised systems used in clinical trials under the ICH harmonised guideline for Good Clinical Practice. Section 4.3 is broader in geographic application than Part 11 (it applies wherever ICH GCP is recognized), but narrower in subject matter (it addresses computerised systems used in clinical trials specifically, not all FDA-regulated electronic records). The final guideline was adopted on 06 January 2025.
The relationship between these two sources is not hierarchical. Part 11 does not override Section 4.3, and Section 4.3 does not supersede Part 11. They operate in parallel. For a regulatory coordinator at a U.S.-based investigator site conducting clinical trials, both apply simultaneously -- and the practical compliance obligation is to satisfy whichever source imposes the more specific or more stringent requirement for a given activity.
Part 11 is organized into three subparts. Subpart A establishes general provisions, including the scope of the regulation. Subpart B sets requirements for electronic records. Subpart C sets requirements for electronic signatures. For a regulatory coordinator, the practical requirements fall into four categories.
Validation. Part 11 requires that persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and confidentiality of electronic records. The systems must be validated to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records (21 CFR 11.10(a)).
Audit trails. The regulation requires that systems used to create, modify, maintain, or transmit electronic records include computer-generated, time-stamped audit trails that independently record the date and time of operator entries and actions that create, modify, or delete electronic records. These audit trails must be retained for a period at least as long as the required retention period for the subject electronic records and must be available for agency review and copying (21 CFR 11.10(e)).
Access controls. Part 11 requires the use of appropriate controls over systems documentation, including revision and change control procedures, to maintain an audit trail that documents time-sequenced development and modification of systems documentation. It also requires limiting system access to authorized individuals (21 CFR 11.10(d), (g)).
Electronic signatures. Where electronic signatures are employed, Part 11 requires that each electronic signature be unique to one individual and not be reused by or reassigned to anyone else (21 CFR 11.100(a)). The regulation distinguishes between electronic signatures based on biometrics and those not based on biometrics, with different requirements for each.
These requirements, read in isolation, sound rigorous -- and they are. But reading Part 11 in isolation, without the 2003 guidance, is like reading a statute without knowing the case law that interprets it. The text tells you what the law says. The guidance tells you how it is applied.
In August 2003, the FDA issued a guidance document titled Guidance for Industry: Part 11, Electronic Records; Electronic Signatures -- Scope and Application. This document did not amend Part 11. The regulation remains exactly as it was enacted in 1997. What the guidance did was announce the FDA's intention to exercise enforcement discretion regarding certain Part 11 requirements, and to narrow the scope of records and signatures to which the agency would apply its enforcement efforts.
The 2003 guidance made three things clear.
First, the FDA stated it would apply a narrow interpretation of scope. Part 11 applies to records that are required to be maintained under any FDA predicate rule (the underlying regulation that creates the recordkeeping requirement) and that are maintained in electronic format. If a site creates a record voluntarily -- not because a regulation requires it -- Part 11 does not apply to that record merely because it is electronic. And if a regulation requires a record but the site maintains it on paper, Part 11 does not apply to the paper record even if an electronic copy also exists, provided the electronic copy is not relied upon as the regulatory record.
Second, the FDA announced it would exercise enforcement discretion regarding specific Part 11 requirements. The agency stated it did not intend to enforce requirements relating to: validation, audit trail, record retention, record copying, and legacy systems -- provided that predicate rule requirements were met and the records were accurate and complete. This did not mean these requirements were eliminated. It meant the FDA would focus its enforcement on whether the underlying predicate rules were satisfied, not on whether the technical requirements of Part 11 were perfectly implemented.
Third, the guidance established a risk-based approach. The FDA stated that it intended to interpret Part 11 in a manner that would be "narrow" and would apply enforcement proportionate to the risk associated with the records and signatures in question. Higher-risk records -- those critical to product quality, safety, or efficacy determinations -- would receive closer scrutiny. Lower-risk records would receive proportionately less.
Section 4.3 of ICH E6(R3) Annex 1 establishes requirements for computerised systems used in clinical trials. Where Part 11 focuses specifically on electronic records and signatures as regulatory substitutes for paper, Section 4.3 takes a broader view: it addresses the full lifecycle of computerised systems in the trial context, from procedures and training through validation, security, and user management.
The section opens with an important framing statement. It notes that "the responsibilities of the sponsor, investigator and the activities of other parties with respect to a computerised system used in clinical trials should be clear and documented" (Section 4.3). This allocation of responsibility is fundamental -- and it is where the RC's role becomes concrete. Not every computerised system at the site is the investigator's responsibility. Sponsor-deployed systems are the sponsor's responsibility. But systems deployed by the investigator or institution -- and this includes locally managed document storage, site-maintained tracking tools, and any electronic system the site chooses to use for records management -- fall under the investigator's obligations as defined in Section 2.12.10.
Section 2.12.10 is specific. It requires the investigator or institution to: ensure appropriate individuals have secure and attributable access to systems deployed by the investigator (2.12.10(a)); notify the sponsor when access permissions need to change for sponsor-deployed systems (2.12.10(b)); and, critically, ensure that systems deployed by the investigator specifically for clinical trial purposes meet the requirements of Section 4 "proportionate to the risks to participants and to the importance of the data" (2.12.10(c)).
That word -- proportionate -- is doing an enormous amount of work. It is the same principle that underlies the FDA's risk-based enforcement of Part 11, and it appears explicitly in the ICH framework. Proportionality means that a site's locally maintained spreadsheet for tracking document versions does not require the same validation rigor as a sponsor's electronic data capture system collecting primary efficacy endpoints. Both are computerised systems. Both are used in clinical trials. But their risk profiles are different, and Section 4.3 recognizes this.

Figure 1: The dual regulatory framework for electronic records at investigator sites -- convergent requirements with complementary enforcement approaches
I want to walk through the Section 4.3 subsections that matter most to the regulatory coordinator. Not all eight subsections carry equal weight for site-level records management, and understanding the relative significance prevents the trap of treating every requirement as equally urgent.
Section 4.3.1 -- Procedures. "Documented procedures should be in place to ensure the appropriate use of computerised systems in clinical trials for essential activities related to data collection, handling and management." For the RC, this means the site must have written procedures -- not just informal habits -- governing how electronic systems are used for records management. If the site uses a shared network drive for regulatory documents, the procedure documents who has access, how files are named, where they are stored, and how superseded versions are handled. The procedure need not be elaborate. It needs to be documented, followed, and available.
Section 4.3.2 -- Training. "The responsible party should ensure that those using computerised systems are appropriately trained in their use." For the RC, this means that every person who accesses the site's electronic records systems -- coordinators, investigators, regulatory staff -- must receive documented training on the system. This is not optional, and it is not satisfied by the assumption that everyone knows how to use a shared drive. Training must be documented, because undocumented training is, for regulatory purposes, no training at all.
Section 4.3.3 -- Security. This subsection requires that security controls be "implemented and maintained" for computerised systems, including "user management and ongoing measures to prevent, detect and/or mitigate security breaches" (4.3.3(b)). It also requires "adequate backup of the data" (4.3.3(c)) and procedures covering "system security measures, data backup and disaster recovery" (4.3.3(d)). For a site using network storage for regulatory documents, this translates into specific operational requirements: authenticated user access, regular data backups, and a documented plan for recovering data if the system fails. These are not theoretical concerns. Hard drives fail. Servers are compromised. The question is not whether a disruption will occur, but whether the site can recover its records when it does.
Section 4.3.4 -- Validation. This is the subsection that generates the most anxiety, and -- I will be direct -- the most unnecessary anxiety. Section 4.3.4(a) states that "the approach to validation of computerised systems should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results." Read that requirement carefully. It does not say that every system requires formal IQ/OQ/PQ validation. It says the approach to validation should be based on a risk assessment. A site's shared network drive used to store PDF copies of regulatory documents does not carry the same validation burden as an electronic data capture system collecting primary efficacy endpoints. The risk assessment determines the validation approach, and Section 4.3.4(a) explicitly authorizes proportionate effort.
Section 4.3.8 -- User management. This subsection requires that "access controls are integral to computerised systems used in clinical trials to limit system access to authorised users and to ensure attributability to an individual" (4.3.8(a)). It further requires that "user access permissions are appropriately assigned based on a user's duties and functions" and that "access permissions should be revoked when they are no longer needed" with periodic review (4.3.8(b)). For the RC, this means maintaining documented records of who has access to the site's electronic records systems, what their permissions are, and ensuring that access is removed when staff depart or change roles.
The site must maintain written procedures for the use of each computerised system involved in records management. For a shared network drive, the procedure specifies access protocols, naming conventions, filing structure, and version management. For an electronic document management system, the procedure covers system access, document upload workflows, and retrieval processes. The procedure must be current, accessible to all users, and followed in practice.
Every individual who accesses a computerised system used for clinical trial records must receive training appropriate to their role, and that training must be documented. For a regulatory coordinator adding a new CRC to the team, this means providing training on the site's electronic records systems and maintaining a record of the training date, content covered, and trainer identity. Annual refresher training or retraining after system changes should also be documented.
Security controls encompass three operational domains. Protection: authenticated access, password management, and role-based permissions prevent unauthorized access. Detection: monitoring and logging identify unauthorized access attempts or anomalous activity. Recovery: regular backups, disaster recovery procedures, and periodic testing of recovery processes ensure that records can be restored if the system fails. Section 4.3.3(d) specifically requires periodic testing of these measures.
Validation effort is calibrated to risk. A sponsor's EDC system collecting primary endpoints requires rigorous validation. A site's shared network drive storing PDF copies of regulatory documents requires documented evidence that the system reliably stores and retrieves files, but not the same level of formal validation. The risk assessment considers intended use, data importance, and potential impact on participant safety and data reliability. The assessment itself must be documented.
Section 4.3.5 specifies that trial-specific systems be released only after necessary approvals are received. Section 4.3.6 specifies contingency procedures for system failures that could affect participant safety, trial decisions, or outcomes. Section 4.3.7 specifies mechanisms for documenting, evaluating, and managing system issues, with periodic review of cumulative issues to identify systemic problems. For the RC, these translate into: do not deploy new systems mid-study without proper change control; have a plan for when systems go down; and track system problems rather than treating each as an isolated incident.
User access is not a one-time event. It is a lifecycle: granting access when a user is assigned a role, modifying access when roles change, revoking access upon departure, and periodically reviewing all access to confirm it remains appropriate. Section 4.3.8(c) requires that authorized users and access permissions be 'clearly documented, maintained and retained,' including updates to roles, permissions, and the time access was granted. This creates an audit trail of access management itself.
Having examined each source independently, it is worth mapping the points of convergence and divergence. Understanding both prevents two common errors: applying Part 11 requirements where only Section 4.3 applies (overcompliance), and assuming Section 4.3 satisfies Part 11 when additional requirements exist (undercompliance).
The convergence is substantial. Both Part 11 and Section 4.3 require validation of systems, though Section 4.3.4(a) makes the risk-based proportionality principle more explicit than Part 11's text does alone (the FDA's 2003 guidance brings Part 11 enforcement into alignment with this principle). Both require audit trails -- Part 11 through 11.10(e) and Section 4.3 through the broader metadata and audit trail framework in Section 4.2.2. Both require access controls limiting system use to authorized individuals -- Part 11 through 11.10(d) and (g), Section 4.3 through 4.3.8. And both require security measures protecting data integrity -- Part 11 through its general system controls, Section 4.3.3 through its specific security framework.
The divergences are also important. Part 11 addresses electronic signatures extensively (Subpart C), defining the conditions under which an electronic signature is legally equivalent to a handwritten signature. Section 4.3 does not address electronic signatures as a distinct topic -- it assumes signatures are addressed through the broader data integrity framework. Part 11 applies to all FDA-regulated electronic records, not just those in clinical trials. Section 4.3 applies only to computerised systems used in clinical trials but does so globally, not just in the United States. And Part 11 imposes specific technical requirements (such as time-stamped audit trails recording the date and time of entries) that are more prescriptive than Section 4.3's principles-based approach.
For a U.S. investigator site, the practical implication is this: compliance with Section 4.3 will satisfy most, but not all, Part 11 requirements. The areas where Part 11 adds obligations beyond Section 4.3 relate primarily to electronic signatures and to certain technical specifications for audit trails. The regulatory coordinator does not need to maintain two separate compliance programs. The coordinator needs one integrated approach that addresses the combined requirements of both sources.
Requirement domain | 21 CFR Part 11 | ICH E6(R3) Section 4.3 | Practical implication for the RC |
|---|---|---|---|
Validation | Systems must be validated to ensure accuracy, reliability, and consistent intended performance (11.10(a)) | Validation approach based on risk assessment considering intended use, data importance, and potential impact (4.3.4(a)) | Conduct a risk assessment per 4.3.4(a); the assessment determines the validation approach, which should also satisfy Part 11's validation requirement |
Audit trails | Computer-generated, time-stamped audit trails recording creation, modification, and deletion (11.10(e)) | Metadata and audit trail requirements in Section 4.2.2, including logs of user account creation, data changes with reason, and workflow actions | Section 4.2.2 requirements are substantively broader than Part 11's audit trail provision; compliance with 4.2.2 generally satisfies 11.10(e) |
Access controls | Limit system access to authorized individuals (11.10(d), (g)) | Role-based access, periodic review, and timely revocation (4.3.8(a)-(c)) | Section 4.3.8 provides more operational detail than Part 11; implementing 4.3.8 satisfies the Part 11 access control requirement |
Security | System controls ensuring authenticity, integrity, and confidentiality (11.10) | Security controls including user management, breach prevention and detection, backup, and disaster recovery (4.3.3) | Section 4.3.3 is more specific than Part 11's general security language; implementing 4.3.3 exceeds the Part 11 baseline |
Electronic signatures | Detailed requirements for signature uniqueness, identity verification, and linking to signed records (11.100, 11.200) | Not specifically addressed as a separate topic in Section 4.3 | Part 11 adds requirements beyond Section 4.3 for electronic signatures; sites using e-signatures must address Part 11 Subpart C directly |
Geographic scope | U.S. FDA-regulated activities | Global (wherever ICH GCP is recognized) | International sites follow Section 4.3; U.S. sites follow both Part 11 and Section 4.3 |
Section 4.2.2 deserves particular attention because it defines the audit trail requirements that the RC must ensure are met by any computerised system used for essential records. And Section 4.2.2 is more demanding -- and more useful -- than many practitioners realize.
The section requires that computerised systems maintain "logs of user account creation, changes to user roles and permissions and user access" (4.2.2(a)(i)). This is not just a record of who changed what data. It is a record of who was given access, when, and what permissions they were assigned. It transforms user management from an administrative function into an auditable process.
Section 4.2.2(a)(ii) requires that "systems are designed to permit data changes in such a way that the initial data entry and any subsequent changes or deletions are documented, including, where appropriate, the reason for the change." This is the classic audit trail requirement -- and the phrase "where appropriate, the reason for the change" is important. It means the system should be capable of capturing the rationale for a change, not merely the fact that a change occurred.
Section 4.2.2(b) adds a protection that is often overlooked: "Ensuring that audit trails, reports and logs are not disabled." An audit trail that can be turned off is not an audit trail. It is a suggestion. The RC must confirm that the site's electronic systems produce audit trails that cannot be disabled by end users -- and that any modification to the audit trail itself is logged and justified.
And Section 4.2.2(c) requires that "audit trails and logs are interpretable and can support review." An audit trail that exists but is unintelligible to a reviewer -- buried in raw database logs that require specialized software to parse -- fails this requirement. Audit trails must be accessible and reviewable by the people who need to review them, which includes the RC, monitors, and inspectors.
I have, in my years of working in this field, encountered two equally harmful misconceptions about electronic records compliance. The first is that Part 11 and Section 4.3 do not apply to investigator sites -- that these are "sponsor requirements" and the site need not worry about them. This is wrong. Section 2.12.10(c) explicitly places the obligation on the investigator for systems deployed by the investigator, and Part 11 applies to any entity creating electronic records under FDA regulations.
The second misconception is equally dangerous, though less obvious: the belief that every electronic system at the site must meet the same level of compliance rigor. A site that treats its shared network drive and a validated electronic data capture system as requiring identical compliance documentation is wasting resources -- resources that could be directed toward controls that actually reduce risk.
Proportionality is the antidote to both misconceptions. It acknowledges that compliance obligations exist while calibrating the response to the risk each system poses. Section 4.3.4(a) makes this explicit: the validation approach "should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results."
In practical terms, the RC can categorize the site's electronic systems into risk tiers.
Higher-risk systems are those where data integrity failures could directly affect participant safety or primary trial outcomes. An electronic data capture system collecting primary efficacy endpoints. A randomization system assigning treatment. An electronic prescribing system for investigational product dosing. These systems require rigorous validation, comprehensive audit trails, and formal access control documentation.
Moderate-risk systems are those that manage important regulatory records but do not directly affect participant safety or primary endpoints. An electronic document management system storing essential records. A regulatory binder management platform. These systems require documented procedures, access controls, and audit trail capability, but the validation approach may be less formal than for higher-risk systems.
Lower-risk systems are those used for administrative convenience where paper or alternative records serve as the official regulatory record. A shared drive storing convenience copies of regulatory documents when the paper binder is the official record. A locally maintained tracking spreadsheet. These systems should have documented procedures and access controls, but the validation burden is minimal -- the risk assessment documents why the system poses low risk and what controls are in place.
The regulatory framework for electronic records is more nuanced than vendor brochures or anxious corridor conversations suggest. Neither Part 11 nor Section 4.3 demands that investigator sites implement the same controls as pharmaceutical sponsors operating validated electronic trial master files across 200 sites. Both regulatory sources -- and the FDA's 2003 enforcement guidance -- recognize that compliance is proportionate to risk.
But proportionality does not mean inaction. The RC must ensure that the site's electronic records systems meet certain baseline requirements regardless of risk tier. Those baselines are non-negotiable.
Every system must have documented procedures governing its use (Section 4.3.1). Every user must receive documented training (Section 4.3.2). Every system must have access controls limiting use to authorized individuals, with timely revocation when access is no longer needed (Section 4.3.8). Every system managing essential records must produce audit trails that cannot be disabled and that are interpretable and reviewable (Section 4.2.2). And every system must have security measures including data backup and disaster recovery procedures (Section 4.3.3).
Above these baselines, the risk assessment determines what additional controls are required. The RC does not need to be a systems validation expert. The RC needs to understand the regulatory framework well enough to conduct a risk assessment, document it, and ensure the site's compliance measures are proportionate to the risk each system poses.
The remaining lessons in this module apply these principles to specific operational decisions. Lesson 2 provides a framework for evaluating electronic document management systems -- translating the regulatory requirements examined here into specific questions the RC should ask of vendors and of the site's own systems. Lesson 3 addresses the governance challenges of hybrid paper-electronic environments. And Lesson 4 covers the ongoing governance the RC must establish for system access, security, and audit trail review.
Enjoyed this preview?
Enroll to access all courses in the Regulatory Coordinator track.
Unlock the full courseFree Lesson Preview
Module 1: Lesson 1

Provides the RC with a working understanding of 21 CFR Part 11 and ICH E6(R3) Section 4.3 -- what they require, where they overlap, and how the FDA's risk-based enforcement approach shapes practical compliance expectations.
A site managing 11 active clinical trials receives an email from a vendor promoting an electronic document management system. The marketing materials are polished and confident. Midway through the brochure, a sentence appears in bold: "21 CFR Part 11 requires that all electronic records used in FDA-regulated activities meet specific requirements for validation, audit trails, and electronic signatures. Is your site compliant?"
The regulatory coordinator reads the sentence and feels a familiar knot of anxiety. The site uses a shared network drive to store scanned regulatory documents, a sponsor-provided portal for electronic submissions, and a locally maintained spreadsheet for version tracking. None of these systems, as far as the coordinator knows, have been formally validated. None produce the kind of audit trails the brochure describes. The coordinator drafts an email to the site director suggesting an emergency review of the site's electronic systems, attaching the vendor brochure as evidence of a compliance gap that requires immediate action.
But here is what the vendor brochure did not mention -- because vendor brochures rarely do. In August 2003, the FDA published a guidance document titled Scope and Application that fundamentally changed how Part 11 is enforced. The guidance announced that the FDA intended to exercise enforcement discretion -- meaning it would not enforce certain requirements of Part 11 -- and that it would apply a risk-based approach to determine which electronic records and signatures warranted the full weight of the regulation. The emergency the coordinator perceived was not, in fact, an emergency. It was a misunderstanding produced by encountering Part 11 without the context that shapes how the regulation actually operates in practice.
This lesson provides that context. It examines the two regulatory sources that govern electronic records at investigator sites -- 21 CFR Part 11 and ICH E6(R3) Annex 1, Section 4.3 -- and explains what they require, where they converge, and how the FDA's risk-based enforcement approach determines what compliance actually looks like for a site-level regulatory coordinator.
By the end of this lesson, you will be able to:
A regulatory coordinator managing electronic records at an investigator site must understand two distinct but overlapping sources of regulatory authority. Each source has a different origin, a different scope, and a different enforcement mechanism. Treating them as interchangeable -- or, worse, ignoring one while fixating on the other -- produces either overcompliance or undercompliance, and neither serves the site well.
21 CFR Part 11 is a United States federal regulation, finalized in March 1997, that establishes the criteria under which the FDA considers electronic records and electronic signatures to be trustworthy, reliable, and generally equivalent to paper records and handwritten signatures. Part 11 applies to any electronic record created, modified, maintained, archived, retrieved, or transmitted under any records requirement set forth in FDA regulations. It is a regulation -- meaning it has the force of law for FDA-regulated activities conducted in the United States or submitted to the FDA.
ICH E6(R3) Annex 1, Section 4.3 -- titled "Computerised Systems" -- establishes the requirements for computerised systems used in clinical trials under the ICH harmonised guideline for Good Clinical Practice. Section 4.3 is broader in geographic application than Part 11 (it applies wherever ICH GCP is recognized), but narrower in subject matter (it addresses computerised systems used in clinical trials specifically, not all FDA-regulated electronic records). The final guideline was adopted on 06 January 2025.
The relationship between these two sources is not hierarchical. Part 11 does not override Section 4.3, and Section 4.3 does not supersede Part 11. They operate in parallel. For a regulatory coordinator at a U.S.-based investigator site conducting clinical trials, both apply simultaneously -- and the practical compliance obligation is to satisfy whichever source imposes the more specific or more stringent requirement for a given activity.
Part 11 is organized into three subparts. Subpart A establishes general provisions, including the scope of the regulation. Subpart B sets requirements for electronic records. Subpart C sets requirements for electronic signatures. For a regulatory coordinator, the practical requirements fall into four categories.
Validation. Part 11 requires that persons who use closed systems to create, modify, maintain, or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and confidentiality of electronic records. The systems must be validated to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records (21 CFR 11.10(a)).
Audit trails. The regulation requires that systems used to create, modify, maintain, or transmit electronic records include computer-generated, time-stamped audit trails that independently record the date and time of operator entries and actions that create, modify, or delete electronic records. These audit trails must be retained for a period at least as long as the required retention period for the subject electronic records and must be available for agency review and copying (21 CFR 11.10(e)).
Access controls. Part 11 requires the use of appropriate controls over systems documentation, including revision and change control procedures, to maintain an audit trail that documents time-sequenced development and modification of systems documentation. It also requires limiting system access to authorized individuals (21 CFR 11.10(d), (g)).
Electronic signatures. Where electronic signatures are employed, Part 11 requires that each electronic signature be unique to one individual and not be reused by or reassigned to anyone else (21 CFR 11.100(a)). The regulation distinguishes between electronic signatures based on biometrics and those not based on biometrics, with different requirements for each.
These requirements, read in isolation, sound rigorous -- and they are. But reading Part 11 in isolation, without the 2003 guidance, is like reading a statute without knowing the case law that interprets it. The text tells you what the law says. The guidance tells you how it is applied.
In August 2003, the FDA issued a guidance document titled Guidance for Industry: Part 11, Electronic Records; Electronic Signatures -- Scope and Application. This document did not amend Part 11. The regulation remains exactly as it was enacted in 1997. What the guidance did was announce the FDA's intention to exercise enforcement discretion regarding certain Part 11 requirements, and to narrow the scope of records and signatures to which the agency would apply its enforcement efforts.
The 2003 guidance made three things clear.
First, the FDA stated it would apply a narrow interpretation of scope. Part 11 applies to records that are required to be maintained under any FDA predicate rule (the underlying regulation that creates the recordkeeping requirement) and that are maintained in electronic format. If a site creates a record voluntarily -- not because a regulation requires it -- Part 11 does not apply to that record merely because it is electronic. And if a regulation requires a record but the site maintains it on paper, Part 11 does not apply to the paper record even if an electronic copy also exists, provided the electronic copy is not relied upon as the regulatory record.
Second, the FDA announced it would exercise enforcement discretion regarding specific Part 11 requirements. The agency stated it did not intend to enforce requirements relating to: validation, audit trail, record retention, record copying, and legacy systems -- provided that predicate rule requirements were met and the records were accurate and complete. This did not mean these requirements were eliminated. It meant the FDA would focus its enforcement on whether the underlying predicate rules were satisfied, not on whether the technical requirements of Part 11 were perfectly implemented.
Third, the guidance established a risk-based approach. The FDA stated that it intended to interpret Part 11 in a manner that would be "narrow" and would apply enforcement proportionate to the risk associated with the records and signatures in question. Higher-risk records -- those critical to product quality, safety, or efficacy determinations -- would receive closer scrutiny. Lower-risk records would receive proportionately less.
Section 4.3 of ICH E6(R3) Annex 1 establishes requirements for computerised systems used in clinical trials. Where Part 11 focuses specifically on electronic records and signatures as regulatory substitutes for paper, Section 4.3 takes a broader view: it addresses the full lifecycle of computerised systems in the trial context, from procedures and training through validation, security, and user management.
The section opens with an important framing statement. It notes that "the responsibilities of the sponsor, investigator and the activities of other parties with respect to a computerised system used in clinical trials should be clear and documented" (Section 4.3). This allocation of responsibility is fundamental -- and it is where the RC's role becomes concrete. Not every computerised system at the site is the investigator's responsibility. Sponsor-deployed systems are the sponsor's responsibility. But systems deployed by the investigator or institution -- and this includes locally managed document storage, site-maintained tracking tools, and any electronic system the site chooses to use for records management -- fall under the investigator's obligations as defined in Section 2.12.10.
Section 2.12.10 is specific. It requires the investigator or institution to: ensure appropriate individuals have secure and attributable access to systems deployed by the investigator (2.12.10(a)); notify the sponsor when access permissions need to change for sponsor-deployed systems (2.12.10(b)); and, critically, ensure that systems deployed by the investigator specifically for clinical trial purposes meet the requirements of Section 4 "proportionate to the risks to participants and to the importance of the data" (2.12.10(c)).
That word -- proportionate -- is doing an enormous amount of work. It is the same principle that underlies the FDA's risk-based enforcement of Part 11, and it appears explicitly in the ICH framework. Proportionality means that a site's locally maintained spreadsheet for tracking document versions does not require the same validation rigor as a sponsor's electronic data capture system collecting primary efficacy endpoints. Both are computerised systems. Both are used in clinical trials. But their risk profiles are different, and Section 4.3 recognizes this.

Figure 1: The dual regulatory framework for electronic records at investigator sites -- convergent requirements with complementary enforcement approaches
I want to walk through the Section 4.3 subsections that matter most to the regulatory coordinator. Not all eight subsections carry equal weight for site-level records management, and understanding the relative significance prevents the trap of treating every requirement as equally urgent.
Section 4.3.1 -- Procedures. "Documented procedures should be in place to ensure the appropriate use of computerised systems in clinical trials for essential activities related to data collection, handling and management." For the RC, this means the site must have written procedures -- not just informal habits -- governing how electronic systems are used for records management. If the site uses a shared network drive for regulatory documents, the procedure documents who has access, how files are named, where they are stored, and how superseded versions are handled. The procedure need not be elaborate. It needs to be documented, followed, and available.
Section 4.3.2 -- Training. "The responsible party should ensure that those using computerised systems are appropriately trained in their use." For the RC, this means that every person who accesses the site's electronic records systems -- coordinators, investigators, regulatory staff -- must receive documented training on the system. This is not optional, and it is not satisfied by the assumption that everyone knows how to use a shared drive. Training must be documented, because undocumented training is, for regulatory purposes, no training at all.
Section 4.3.3 -- Security. This subsection requires that security controls be "implemented and maintained" for computerised systems, including "user management and ongoing measures to prevent, detect and/or mitigate security breaches" (4.3.3(b)). It also requires "adequate backup of the data" (4.3.3(c)) and procedures covering "system security measures, data backup and disaster recovery" (4.3.3(d)). For a site using network storage for regulatory documents, this translates into specific operational requirements: authenticated user access, regular data backups, and a documented plan for recovering data if the system fails. These are not theoretical concerns. Hard drives fail. Servers are compromised. The question is not whether a disruption will occur, but whether the site can recover its records when it does.
Section 4.3.4 -- Validation. This is the subsection that generates the most anxiety, and -- I will be direct -- the most unnecessary anxiety. Section 4.3.4(a) states that "the approach to validation of computerised systems should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results." Read that requirement carefully. It does not say that every system requires formal IQ/OQ/PQ validation. It says the approach to validation should be based on a risk assessment. A site's shared network drive used to store PDF copies of regulatory documents does not carry the same validation burden as an electronic data capture system collecting primary efficacy endpoints. The risk assessment determines the validation approach, and Section 4.3.4(a) explicitly authorizes proportionate effort.
Section 4.3.8 -- User management. This subsection requires that "access controls are integral to computerised systems used in clinical trials to limit system access to authorised users and to ensure attributability to an individual" (4.3.8(a)). It further requires that "user access permissions are appropriately assigned based on a user's duties and functions" and that "access permissions should be revoked when they are no longer needed" with periodic review (4.3.8(b)). For the RC, this means maintaining documented records of who has access to the site's electronic records systems, what their permissions are, and ensuring that access is removed when staff depart or change roles.
The site must maintain written procedures for the use of each computerised system involved in records management. For a shared network drive, the procedure specifies access protocols, naming conventions, filing structure, and version management. For an electronic document management system, the procedure covers system access, document upload workflows, and retrieval processes. The procedure must be current, accessible to all users, and followed in practice.
Every individual who accesses a computerised system used for clinical trial records must receive training appropriate to their role, and that training must be documented. For a regulatory coordinator adding a new CRC to the team, this means providing training on the site's electronic records systems and maintaining a record of the training date, content covered, and trainer identity. Annual refresher training or retraining after system changes should also be documented.
Security controls encompass three operational domains. Protection: authenticated access, password management, and role-based permissions prevent unauthorized access. Detection: monitoring and logging identify unauthorized access attempts or anomalous activity. Recovery: regular backups, disaster recovery procedures, and periodic testing of recovery processes ensure that records can be restored if the system fails. Section 4.3.3(d) specifically requires periodic testing of these measures.
Validation effort is calibrated to risk. A sponsor's EDC system collecting primary endpoints requires rigorous validation. A site's shared network drive storing PDF copies of regulatory documents requires documented evidence that the system reliably stores and retrieves files, but not the same level of formal validation. The risk assessment considers intended use, data importance, and potential impact on participant safety and data reliability. The assessment itself must be documented.
Section 4.3.5 specifies that trial-specific systems be released only after necessary approvals are received. Section 4.3.6 specifies contingency procedures for system failures that could affect participant safety, trial decisions, or outcomes. Section 4.3.7 specifies mechanisms for documenting, evaluating, and managing system issues, with periodic review of cumulative issues to identify systemic problems. For the RC, these translate into: do not deploy new systems mid-study without proper change control; have a plan for when systems go down; and track system problems rather than treating each as an isolated incident.
User access is not a one-time event. It is a lifecycle: granting access when a user is assigned a role, modifying access when roles change, revoking access upon departure, and periodically reviewing all access to confirm it remains appropriate. Section 4.3.8(c) requires that authorized users and access permissions be 'clearly documented, maintained and retained,' including updates to roles, permissions, and the time access was granted. This creates an audit trail of access management itself.
Having examined each source independently, it is worth mapping the points of convergence and divergence. Understanding both prevents two common errors: applying Part 11 requirements where only Section 4.3 applies (overcompliance), and assuming Section 4.3 satisfies Part 11 when additional requirements exist (undercompliance).
The convergence is substantial. Both Part 11 and Section 4.3 require validation of systems, though Section 4.3.4(a) makes the risk-based proportionality principle more explicit than Part 11's text does alone (the FDA's 2003 guidance brings Part 11 enforcement into alignment with this principle). Both require audit trails -- Part 11 through 11.10(e) and Section 4.3 through the broader metadata and audit trail framework in Section 4.2.2. Both require access controls limiting system use to authorized individuals -- Part 11 through 11.10(d) and (g), Section 4.3 through 4.3.8. And both require security measures protecting data integrity -- Part 11 through its general system controls, Section 4.3.3 through its specific security framework.
The divergences are also important. Part 11 addresses electronic signatures extensively (Subpart C), defining the conditions under which an electronic signature is legally equivalent to a handwritten signature. Section 4.3 does not address electronic signatures as a distinct topic -- it assumes signatures are addressed through the broader data integrity framework. Part 11 applies to all FDA-regulated electronic records, not just those in clinical trials. Section 4.3 applies only to computerised systems used in clinical trials but does so globally, not just in the United States. And Part 11 imposes specific technical requirements (such as time-stamped audit trails recording the date and time of entries) that are more prescriptive than Section 4.3's principles-based approach.
For a U.S. investigator site, the practical implication is this: compliance with Section 4.3 will satisfy most, but not all, Part 11 requirements. The areas where Part 11 adds obligations beyond Section 4.3 relate primarily to electronic signatures and to certain technical specifications for audit trails. The regulatory coordinator does not need to maintain two separate compliance programs. The coordinator needs one integrated approach that addresses the combined requirements of both sources.
Requirement domain | 21 CFR Part 11 | ICH E6(R3) Section 4.3 | Practical implication for the RC |
|---|---|---|---|
Validation | Systems must be validated to ensure accuracy, reliability, and consistent intended performance (11.10(a)) | Validation approach based on risk assessment considering intended use, data importance, and potential impact (4.3.4(a)) | Conduct a risk assessment per 4.3.4(a); the assessment determines the validation approach, which should also satisfy Part 11's validation requirement |
Audit trails | Computer-generated, time-stamped audit trails recording creation, modification, and deletion (11.10(e)) | Metadata and audit trail requirements in Section 4.2.2, including logs of user account creation, data changes with reason, and workflow actions | Section 4.2.2 requirements are substantively broader than Part 11's audit trail provision; compliance with 4.2.2 generally satisfies 11.10(e) |
Access controls | Limit system access to authorized individuals (11.10(d), (g)) | Role-based access, periodic review, and timely revocation (4.3.8(a)-(c)) | Section 4.3.8 provides more operational detail than Part 11; implementing 4.3.8 satisfies the Part 11 access control requirement |
Security | System controls ensuring authenticity, integrity, and confidentiality (11.10) | Security controls including user management, breach prevention and detection, backup, and disaster recovery (4.3.3) | Section 4.3.3 is more specific than Part 11's general security language; implementing 4.3.3 exceeds the Part 11 baseline |
Electronic signatures | Detailed requirements for signature uniqueness, identity verification, and linking to signed records (11.100, 11.200) | Not specifically addressed as a separate topic in Section 4.3 | Part 11 adds requirements beyond Section 4.3 for electronic signatures; sites using e-signatures must address Part 11 Subpart C directly |
Geographic scope | U.S. FDA-regulated activities | Global (wherever ICH GCP is recognized) | International sites follow Section 4.3; U.S. sites follow both Part 11 and Section 4.3 |
Section 4.2.2 deserves particular attention because it defines the audit trail requirements that the RC must ensure are met by any computerised system used for essential records. And Section 4.2.2 is more demanding -- and more useful -- than many practitioners realize.
The section requires that computerised systems maintain "logs of user account creation, changes to user roles and permissions and user access" (4.2.2(a)(i)). This is not just a record of who changed what data. It is a record of who was given access, when, and what permissions they were assigned. It transforms user management from an administrative function into an auditable process.
Section 4.2.2(a)(ii) requires that "systems are designed to permit data changes in such a way that the initial data entry and any subsequent changes or deletions are documented, including, where appropriate, the reason for the change." This is the classic audit trail requirement -- and the phrase "where appropriate, the reason for the change" is important. It means the system should be capable of capturing the rationale for a change, not merely the fact that a change occurred.
Section 4.2.2(b) adds a protection that is often overlooked: "Ensuring that audit trails, reports and logs are not disabled." An audit trail that can be turned off is not an audit trail. It is a suggestion. The RC must confirm that the site's electronic systems produce audit trails that cannot be disabled by end users -- and that any modification to the audit trail itself is logged and justified.
And Section 4.2.2(c) requires that "audit trails and logs are interpretable and can support review." An audit trail that exists but is unintelligible to a reviewer -- buried in raw database logs that require specialized software to parse -- fails this requirement. Audit trails must be accessible and reviewable by the people who need to review them, which includes the RC, monitors, and inspectors.
I have, in my years of working in this field, encountered two equally harmful misconceptions about electronic records compliance. The first is that Part 11 and Section 4.3 do not apply to investigator sites -- that these are "sponsor requirements" and the site need not worry about them. This is wrong. Section 2.12.10(c) explicitly places the obligation on the investigator for systems deployed by the investigator, and Part 11 applies to any entity creating electronic records under FDA regulations.
The second misconception is equally dangerous, though less obvious: the belief that every electronic system at the site must meet the same level of compliance rigor. A site that treats its shared network drive and a validated electronic data capture system as requiring identical compliance documentation is wasting resources -- resources that could be directed toward controls that actually reduce risk.
Proportionality is the antidote to both misconceptions. It acknowledges that compliance obligations exist while calibrating the response to the risk each system poses. Section 4.3.4(a) makes this explicit: the validation approach "should be based on a risk assessment that considers the intended use of the system; the purpose and importance of the data/record that are collected/generated, maintained and retained in the system; and the potential of the system to affect the well-being, rights and safety of trial participants and the reliability of trial results."
In practical terms, the RC can categorize the site's electronic systems into risk tiers.
Higher-risk systems are those where data integrity failures could directly affect participant safety or primary trial outcomes. An electronic data capture system collecting primary efficacy endpoints. A randomization system assigning treatment. An electronic prescribing system for investigational product dosing. These systems require rigorous validation, comprehensive audit trails, and formal access control documentation.
Moderate-risk systems are those that manage important regulatory records but do not directly affect participant safety or primary endpoints. An electronic document management system storing essential records. A regulatory binder management platform. These systems require documented procedures, access controls, and audit trail capability, but the validation approach may be less formal than for higher-risk systems.
Lower-risk systems are those used for administrative convenience where paper or alternative records serve as the official regulatory record. A shared drive storing convenience copies of regulatory documents when the paper binder is the official record. A locally maintained tracking spreadsheet. These systems should have documented procedures and access controls, but the validation burden is minimal -- the risk assessment documents why the system poses low risk and what controls are in place.
The regulatory framework for electronic records is more nuanced than vendor brochures or anxious corridor conversations suggest. Neither Part 11 nor Section 4.3 demands that investigator sites implement the same controls as pharmaceutical sponsors operating validated electronic trial master files across 200 sites. Both regulatory sources -- and the FDA's 2003 enforcement guidance -- recognize that compliance is proportionate to risk.
But proportionality does not mean inaction. The RC must ensure that the site's electronic records systems meet certain baseline requirements regardless of risk tier. Those baselines are non-negotiable.
Every system must have documented procedures governing its use (Section 4.3.1). Every user must receive documented training (Section 4.3.2). Every system must have access controls limiting use to authorized individuals, with timely revocation when access is no longer needed (Section 4.3.8). Every system managing essential records must produce audit trails that cannot be disabled and that are interpretable and reviewable (Section 4.2.2). And every system must have security measures including data backup and disaster recovery procedures (Section 4.3.3).
Above these baselines, the risk assessment determines what additional controls are required. The RC does not need to be a systems validation expert. The RC needs to understand the regulatory framework well enough to conduct a risk assessment, document it, and ensure the site's compliance measures are proportionate to the risk each system poses.
The remaining lessons in this module apply these principles to specific operational decisions. Lesson 2 provides a framework for evaluating electronic document management systems -- translating the regulatory requirements examined here into specific questions the RC should ask of vendors and of the site's own systems. Lesson 3 addresses the governance challenges of hybrid paper-electronic environments. And Lesson 4 covers the ongoing governance the RC must establish for system access, security, and audit trail review.
Enjoyed this preview?
Enroll to access all courses in the Regulatory Coordinator track.
Unlock the full course