Computerized techniques must have sufficient controls to avoid unauthorized obtain or adjustments to information. There needs to be controls to circumvent omissions in details (e.If equipment is devoted to manufacturing one intermediate or API, person tools records aren't essential if batches from the intermediate or API comply with in traceable se