SlideShare une entreprise Scribd logo
1  sur  62
Health apps: regulation and quality
control
Wednesday 19 November 2014, Academy of Medical Sciences
Developing the first CE-marked medical app:
Mersey Burns
Rowan Pritchard Jones
Department of Burns and Plastic Surgery, Whiston Hospital
Available from: https://prezi.com/boyb9fhskpno/academy-
med-sci/
1
Patented Clinical & Behavioral Engine *In earlier versions of BlueStar
*
2
Digital Health Landscape
Data Sharing
Care Delivery
Wellness
Chronic
Disease
Management
Regulated
Not Regulated
Minimal to Moderate
Regulation
Minimal to Moderate
Regulation
3
Managing Chronic Disease
Can Be Daunting
Self-Management
48 minutes a managing disease(s)
Healthcare
Four, 15-minute doctor visits a year
Therapeutics
Average of 9 prescriptions yearly
A Small Thing Called “Life”
8,766 hours a year balancing life
and a chronic disease
4
Raw Data Isn’t Necessarily the Answer
5
What if We Could Transform the Data?
To Deliver Actionable
Knowledge…
Diabetes Care,
Anytime Anywhere
24/7, automated, real-time
guidance and education.
Optimizing Clinical Decisions
Treatment and quality
recommendations based on
evidence-based guidelines
for healthcare providers.
7
Patients are trained
face-to-face or remotely.
Product support for
patients & providers.
Face-to-face physician detailing.
Provider In-Servicing Customer CarePatient Training
Seamless, End-to-end Deployment*
8
Nationwide
Pharmacy
Dispensing
NDC #89129-0100-01
9
ADA Recognized as New Type 2 Medication
Source: ADA www.diabetes.org
10
Potential Regulatory Framework for mHealth
Regulation and oversight for
developing embedded medical
software
Academy of Medical Sciences/Royal Academy of Engineering
Joint meeting on ‘Health apps: regulation and quality control’
Dr Chris Elliott FREng
Leman Micro Devices SA
Mobile devices that sense Vital Signs
Case study
Smartphone Vital Signs System:
• Hardware is small enough and cheap enough
to incorporate in a smartphone
• SVSS includes everything for medically
accurate measurements of all 5 physiological
“Vital Signs”
– Blood pressure
– Temperature
– Respiration rate
– Heart rate
– Blood oxygen
and also ECG
• System includes hardware, app and server
• We believe that our package of technological
solutions means that the Smartphone is not
a medical device
2
Module – Class IIA/Class II
medical device
App – Class
IIA/Class II medical
device
Smartphone –
medical device?
Remote Server
calibrations, analysis
– Class IIA/Class II
medical device
Issues for the app
• Classification
– Class IIA in Europe
– Class II in USA
• Safety
– IEC Class B: Non-serious injury is possible
– FDA “Moderate”: failure or latent design flaw could directly result in minor injury,
including through incorrect or delayed information
• Design and development
– risk-based
– good software practice – planned, through life, structured design, traceable (inc SOUP
and OS), verified, documented
– evolutionary development within that framework
• Usability
– key issue for consumer devices (and Regulators)
• Security
– confidential health data
3
Issues for the system including app
• Security
– how to avoid pirate app (key issue for Regulators)
– how to deal with rooted ‘phone
• Function
– Smartphone must deliver as spec through life
• software upgrades?
• other apps? (legitimate 3rd party, pirate, interfering)
• Vigilance
– fundamental requirement of medical device regulation - monitor performance in use and
deal with “adverse events” (“arisings” in aerospace language)
– easier with an internet-connected device and dedicated Remote Server
4
Some key relevant standards
• Safety
– IEC60601-3 Section 14 – Programmable Electrical Medical Systems
– IEC 62304
– FDA Guidance May 11, 2005
• Usability
– IEC 62366
– FDA Guidance June 22, 2011
• Security
– ISO 27001
– FDA Guidance June 14, 2013
• Risk Assessment
– ISO 14971
• Performance
– ISO81060, ISO 80601-2-61, ISO 80601-2-56/ASTM 1965 ….
All within a QMS framework of ISO13485
5
Conclusions
• It is possible to develop embedded software to satisfy medical device
regulations within a Smartphone environment
• At its heart, it’s just good software engineering
but
• Must take account of special circumstances:
– users are consumers not experts
– environment must be stable (pirates, hackers, upgrades …)
– objective evidence is needed to support claims for safety and efficacy to
satisfy Regulators before sale
Confidential 6
Exmouth House 3–11 Pine Street London EC1R 0JH
T +44 20 7832 5850 F +44 20 7832 5853 E office@adelard.com W www.adelard.com
Health apps: regulation and quality control
A nuclear perspective
Professor Robin E Bloomfield FREng
19th Nov 2014
© ADELARD
Background
•  Trustworthiness of computer based system
•  Safety, security and socio-technical perspective
•  Deep and broad experience in nuclear industry
•  Practitioner and researcher; Nusac
•  In medical sector
•  Health foundation projects
•  Assessing devices
–  Safety, investment
•  Training manufacturers
•  Research liaison with FDA
Slide 2
© ADELARD
Background
•  Review of 2005-09 Medical Device Reports (MDRs) found:
•  56,000 MDRs related to infusion pumps, 710 deaths, 87 recalls
•  Several design problems (e.g. software, user interface) seen
as “preventable”
•  FDA concluded that there are “numerous systemic problems
with device design, manufacturing, and adverse event
reporting”
•  FDA decided to proactively and systematically address the root
causes of infusion pump recalls
Slide 3
© ADELARD
Nuclear power plant
6 times the size of a Porsche 918, 8205 x power
© ADELARD
Overview
•  How critical are the systems
•  What are safety properties? hazards?
•  What is framework for assurance
•  Safety Assessment Principles
•  Claims, Argument Evidence
•  What is the approach
•  Understanding
•  Excellence of production
–  Compensation
•  Confidence Building
–  Statistical testing, static analysis
Slide 5
© ADELARD
Protection systems
Pressure
Temperature
plant damage boundary
protection envelope
normal operation
A B C D
Voting system
Voting system
Primary protection system
Secondary protection system
Tertiary
diverse signals A, B, C, D redundant channels Primary, Secondary, Tertiary - diverse systems
Reactor
segregation
Plant signals
communication between channels
Shut down
Shut down command
© ADELARD
The need for trust in computer-based systems.
Computer systems play a key role in all layers of defence in depth
•  Normal operation - control, control room information
•  Limitation and warning systems
•  Trip systems
•  Post trip shut down
•  Severe accident management
© ADELARD
Carrot diagram
© ADELARD
UK - Safety cases: regulatory obligation
•  Safety cases are required by licence conditions.
•  The Conditions are non-prescriptive and set
goals that the licensee is responsible for
meeting.
•  A "safety case" is defined as
•  the document or documents produced by the
licensee documentation to justify safety
during the design, construction, manufacture,
commissioning, operation and
decommissioning phases of the installation.
•  Safety Assessment Principles (SAPs) describe
the safety case process and principles to be
covered.
© ADELARD
Safety Assessment Principles for Nuclear Facilities - 2006
The prime responsibility for safety must rest with the person or organisation responsible for the facilities
and activities that give rise to radiation risks.
Fundamental principles Leadership and management for safety FP.2
Effective leadership and management for safety must be established and sustained in organisations
concerned with, and facilities and activities that give rise to, radiation risks.
Fundamental principles Optimisation of protection FP.3
Protection must be optimized to provide the highest level of safety that is reasonably practicable.
Fundamental principles Safety assessment FP.4
The dutyholder must demonstrate effective understanding of the hazards and their control for a nuclear site
or facility through a comprehensive and systematic process of safety assessment.
Fundamental principles Limitation of risks to individuals FP.5
Measures for controlling radiation risks must ensure that no individual bears an unacceptable risk of harm.
Fundamental principles Prevention of accidents FP.6
All reasonably practicable steps must be taken to prevent and mitigate nuclear or radiation accidents.
Fundamental principles Emergency preparedness and response FP.7
Arrangements must be made for emergency preparedness and response in case of nuclear or radiation
incidents.
© ADELARD
For software – ESS 27
UNCONTROLLED COPY IF NOT VIEWED ON HSE WEBSITE
2006 Edition, Revision 1 Page 64 of 140
Engineering principles: safety systems Maintenance and testing ESS.26
Maintenance and testing of a safety system should not initiate a fault sequence.
359 For a computer-based safety system the technology is not amenable to traditional methods of
reliability assessment. The following principle presents the elements of a procedure to demonstrate
the adequacy of a safety system using computer-based technology. The safety demonstration for
the hardware elements of such systems should include the items listed in paragraph 355.
Engineering principles: safety systems Computer-based safety systems ESS.27
Where the system reliability is significantly dependent upon the performance of computer software, the
establishment of and compliance with appropriate standards and practices throughout the software
development life-cycle should be made, commensurate with the level of reliability required, by a
demonstration of ‘production excellence’ and ‘confidence-building’ measures.
360 ‘Production excellence’ requires a demonstration of excellence in all aspects of production, covering
initial specification through to the finally commissioned system, comprising the following elements:
a) Thorough application of technical design practice consistent with current accepted standards for
the development of software for computer-based safety systems.
b) Implementation of an adequate quality assurance programme and plan in accordance with
appropriate quality assurance standards.
© ADELARD
Summary of principles
1.  Effective understanding of the hazards and their control should be
demonstrated
2.  Intended and unintended behaviour of the technology should be
understood
3.  Multiple and complex interactions between the technical and human
systems to create adverse consequences should be recognised.
4.  Active challenge should be part of decision making throughout the
organisation.
5.  Lessons learned from internal and external sources should be
incorporated
6.  Justification should be logical, coherent , traceable, accessible,
repeatable with a rigour commensurate with the degree of trust
required of the system
Derived from IAEA, UK Principles – EU Harmonics project
© ADELARD
Defence in depth Wenra guidance
DiD
level
Associated plant condition
categories
Objective Essential means
Level 1 Normal operation Prevention of abnormal operation
and failures
Conservative design and high
quality in construction and
operation, control of main plant
parameters inside defined limits
Level 2 Anticipated operational
occurrences
Control of abnormal operation and
failures
Control and limiting systems and
other surveillance features
Level 3.a Postulated single initiating
events
Control of accident to limit
radiological releases and prevent
escalation to core melt conditions
Reactor protection system, safety
systems, accident procedures
Level 3.b Postulated multiple failure
events
Additional safety features, accident
procedures
Level 4 Postulated core melt
accidents
(short and long term)
Control of accidents with core melt
to limit off-site releases
Complementary safety features to
mitigate core melt,
Management of accidents with core
melt (severe accidents)
Level 5 – Mitigation of radiological
consequences of significant
releases of radioactive material
Off-site emergency response
Intervention levels
© ADELARD
Product-based approaches
•  Focus on directly showing the desired behaviour, property or
reliability
•  They can be applied even when standards compliance cannot
be shown
•  Linked with specific claims about the product or system
•  May use claim-argument-evidence structure
© ADELARD
The role of CAE – communication and reasoning
•  A method for reasoning about dependability (safety, security,
reliability, resilience ...) properties of the system
•  Communication is an essential function of the case, from this we
can build confidence
–  boundary objects that record the shared understanding
between the different stakeholders
© ADELARD
Justification approaches – the strategy triangle
Slide 16
Property-based
approach
Standards
compliance
Vulnerability
assessment
Safety justification
© ADELARD
Slide 17
Techniques to address properties
PROPERTIES ANALYSIS TECHNIQUES TESTING TECHNIQUES
Functionality Code review / walkthrough
Traceability (requirements to code)
Regression testing
Statistical testing
Black box functional testing
Negative testing
Time response Design inspection
Worst-case execution time analysis
Black box functional testing
Accuracy Numerial analysis Black box functional testing
Reliability Analysis of field data Statistical testing
Robustness Negative testing
Fault injection testing
Stress testing
Failure integrity Failure integrity analysis Fault injection testing
Operability Usability testing
Security Security analysis Security testing
© ADELARD
Slide 18
Techniques to address vulnerabilites
VULNERABILITY ANALYSIS TECHNIQUES TESTING TECHNIQUES
Unintended inter-
component interaction
Resource usage analysis Black box functional testing
Incorrect inter-
component interaction
Concurrency analysis Black box functional testing
Application code
errors
Coding standards compliance
Control/data flow analysis
Resource usage analysis
Run-time exception analysis Abstract
interpretation
Black box functional testing
Unit testing
Integration testing
Random testing / fuzz testing
Unspecified functionality Traceability (requirements to code) Random testing / fuzz testing
Errors in embedded
components
Black box functional testing
© ADELARD
Conclusions
•  How critical are the systems
•  What are safety properties? hazards?
•  What is framework for assurance
•  Safety Assessment Principles
•  Claims, Argument Evidence
•  What is the approach
•  Understanding – hazards, interactions
•  Excellence of production
–  Compensation
•  Confidence Building
–  Statistical testing, static analysis
Slide 19
© ADELARD
Medical systems
•  Tempo
•  Heterogeneous systems
•  Patient s own devices
•  Accidental systems
•  Ad hoc Apps
•  Off label
•  Local and global
•  Multi-stakeholder
Health Foundation Report
G1USING SAFETY CASES IN INDUSTRY AND HEALTHCARE
This is one of a series of supplements to the report: Using safety cases in industry and healthcare:
a pragmatic review of the use of safety cases in safety-critical industries – lessons and prerequisites for
their application in healthcare
To access the report and the other supplements, please visit www.health.org.uk/safetycasesreport
Contents
1 Introduction G2
2 Medical devices G2
3 Assurance cases and infusion pumps G6
4 Other developments G13
5 Medical device standards G14
6 Summary G15
7 Glossary G16
8 References G17
Supplement G:
Safety case use
within the medical
devices industry
Robin Bloomfield, Nick Chozos, George Cleland
Adelard LLP
© ADELARD
Slide 21
Regulation and Oversight for
Developing Automotive Software
in Europe
Presented at Academy of Medical Sciences, Nov 2014
Dr Michael Ellims
Sybernetic Ltd.
Surprise!
There is some...
Type Approval
Production vehicles can be sold and driven if
Type Approved.
Type approval has three parts
Conformity of production
Approval of test facilities
Conformance to regulation
Type approval granted by vehicle certification
authority e.g. VCA
Conformity of production
Evidence that a manufacturer can produce
something that conforms every time.
Quality system – ISO 9001 or equivalent
Control plan
What, why, how, when and who,
Control plans require approval.
Regulation – a lots of it
UNECE (1958 agreement)
– 133 ...to date
– Numerous amendments and corrigendum
– Folded into regulations periodically...
UN GTR (1998 agreement)
– 15 ...to date
Regulation of Software
UNECE 13 Braking, categories M, N and O
UNECE 13-H Braking, passenger cars
UNECE 79 Steering Equipment
UNGTR 8 Electronic stability control
Note UNECE 13-H also covers ESC !!!
Software Annexes
Special Requirements to be applied to the
safety aspects of complex electronic vehicle
control systems
UNECE R13 Annex 18
UNECE R13H Annex 8
UNECE R79 Annex 6
UNGTR 8 clause 132 (almost)
The Annex...
Clause Regulation Covers
3.1 Documentation What is to be presented to certification authority
3.2 Description of functions A description…
all input and sensed data
all output
boundaries of functional operation
3.3 System layout Inventory of components
Functions of the units
Interconnections
Signal flow and priorities
3.4 Safety Concept safe operation under non-fault conditions
safe operation under fault conditions
Software
Safety Analysis
4.1.1 Verification of the system Under non-fault conditions
4.1.2 Verification of the Safety
Concept
Under fault conditions
IEC 61508
Under German law...
– IEC standards are automatically incorporated
• Implies 61508 should be used for assessing Annexes
– But 61508 doesn’t match automotive practice
• e.g. prototypes not considered
– IEC 61508 “allows” derived standards
So the automotive industry created ISO 26262
...and ISO 26262
Clause Regulation Covers Clause ISO 26262 Covers
3.1 Documentation
3.2 Description of functions 3: 5.5 Item Definition
3.3 System layout 3: 5.5 Item Definition
3.4 Safety Concept 3: 7.5.2
3: 8.5.1
Safety Goals
Functional Safety Concept
3.4.2 Software ----- Part 6
3.4.4 Analysis (FMEA, FTA etc.) 7.5.1 Hazard analysis
4.1.1 Verification of the system missing
4.1.2 Verification of the Safety
Concept
3: 8.5.2 Functional safety concept
Verification report
Software 3.1.1 Documentation
(a) The formal documentation package for the
approval, containing the material listed in
Section 3
(b) Additional material and analysis data of
paragraph 3.4.4., which shall be retained by
the manufacturer, but made open for
inspection at the time of type approval.
Software 3.4.2.
In respect of software employed in "The
System",
– the outline architecture…,
– the design methods and tools … identified.
The manufacturer shall be prepared, if required,
to show some evidence of … realisation of
the system logic, ....
Weaknesses
Type approval is in general “whole vehicle”
– tests of a vehicle on a test track
– tests as specified in the standard
Formally:
– regulations do not specify deep dives
– certifying authority does not always do deep-dives
The Annexes are to some extent “bolt-on”
Some Context...Data2013 Fortune 500 and World Bank data
Rank Entity GDP/Rev Rank Enity GDP/Rev
Norway $512 billion 26 Ford Motor $147
1 Wal-Mart $476 27 General Electric $146
2 Royal Dutch Shell $459 61 Nissan Motor $104
8 Volkswagen $261 63 Tesco $103
9 Toyota Motor $256 68 BMW Group $101
Portugal $220 68 Électricité de France $100
13 Samsung Electronics $208 90 Boeing $ 86
New Zealand $185 103 Airbus group $ 78
15 Apple $170 155 Robert Bosch $ 61
20 Daimler $156 Uruguay $ 55
21 General Electric $156 181 Caterpillar $ 55
Financial Motivation
Minimum recall cost $50 –
Ford Foci per year (approximate) - 1 million
Typical production run - 4-5 years
$50 * 1 million * 5 years
$250 million
Thank You!
Contact details:
Email: michael.ellims@tesco.net
Mobile: 075 44 68 58 94
Software for Dependable
Systems – Sufficient Evidence?
Martyn Thomas CBE FREng
Non-executive Director, Health and Safety Executive
Summary
Towards certifiably dependable software
The building blocks for a credible
dependability case
• Explicit Claims
• Evidence
• Expertise
Explicit Claims
No software can be equally dependable in all respects and under all
conditions of use.
The dependability case should therefore be explicit about the
properties that are being claimed, the assumptions that have been
made about the environment, and the level of dependability being
claimed.
Different properties may be assured to different levels of dependability
Evidence
Concrete and valid evidence should be provided that substantiates the
dependability claims.
Evidence + Assumptions ➾ Properties the dependability argument
Testing is essential, but can almost never provide adequate evidence
on its own.
Evidence from analysis will be required.
Evidence of the development process is also needed, e.g. to show that
the software in use is the same as that analysed and tested.
Expertise
To develop dependable software, engineers need expertise in software
development, in the application domain, and in the broader system
context.
Software is only part of the system. It must work dependably with
other software, hardware and the users.
Producing adequate evidence is highly demanding and stretches best
practice to the limit. Developers must know the best methods and tools
and only deviate from them with good reasons (clearly documented).
The full report can be downloaded, free, from
http://sites.nationalacademies.org/cstb/Comp
letedProjects/CSTB_042247

Contenu connexe

Tendances

THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannFrank Siepmann
 
Abbott overview medical device human factors standards
Abbott overview medical device human factors standardsAbbott overview medical device human factors standards
Abbott overview medical device human factors standardsJones Wu
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverThe Security of Things Forum
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device securityOWASP
 
Human factors and ergonomics society 20120311
Human factors and ergonomics society 20120311Human factors and ergonomics society 20120311
Human factors and ergonomics society 20120311Jones Wu
 
Computer System Validation is not mere testing
Computer System Validation is not mere testingComputer System Validation is not mere testing
Computer System Validation is not mere testingAnand Rao. C
 
The Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDThe Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDJanel Heilbrunn
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
Healthcare cyber powerpoint
Healthcare cyber powerpointHealthcare cyber powerpoint
Healthcare cyber powerpointsafecities
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Sterling Medical Devices
 
Solar PV Technology : Health & Safety
Solar PV Technology : Health & SafetySolar PV Technology : Health & Safety
Solar PV Technology : Health & SafetyVinod Jyothikumar
 
IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management MethodSense, Inc.
 
Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)HCL Technologies
 
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALM
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALMApplying IEC 62304 Risk Management in Aligned Elements - the medical device ALM
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALMAligned AG
 

Tendances (19)

THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
Abbott overview medical device human factors standards
Abbott overview medical device human factors standardsAbbott overview medical device human factors standards
Abbott overview medical device human factors standards
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security
 
Human factors and ergonomics society 20120311
Human factors and ergonomics society 20120311Human factors and ergonomics society 20120311
Human factors and ergonomics society 20120311
 
Computer System Validation is not mere testing
Computer System Validation is not mere testingComputer System Validation is not mere testing
Computer System Validation is not mere testing
 
The Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDThe Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMD
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
Medical Device Software
Medical Device SoftwareMedical Device Software
Medical Device Software
 
Healthcare cyber powerpoint
Healthcare cyber powerpointHealthcare cyber powerpoint
Healthcare cyber powerpoint
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...
 
Solar PV Technology : Health & Safety
Solar PV Technology : Health & SafetySolar PV Technology : Health & Safety
Solar PV Technology : Health & Safety
 
IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management
 
Medical Risk Management
Medical Risk ManagementMedical Risk Management
Medical Risk Management
 
Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)Security for Implantable Medical Devices (IMDs)
Security for Implantable Medical Devices (IMDs)
 
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALM
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALMApplying IEC 62304 Risk Management in Aligned Elements - the medical device ALM
Applying IEC 62304 Risk Management in Aligned Elements - the medical device ALM
 
Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 

Similaire à Health apps regulation and quality control case studies and session 2 presentations

Testing in the healthcare domain
Testing in the healthcare domainTesting in the healthcare domain
Testing in the healthcare domainQAI Global
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
Presentation: Conformity Assessment Evidence
Presentation: Conformity Assessment EvidencePresentation: Conformity Assessment Evidence
Presentation: Conformity Assessment EvidenceTGA Australia
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceGreenlight Guru
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxShandevinda
 
Design Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud ConnectivityDesign Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud ConnectivityGreenlight Guru
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Usability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUsability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUXPA Boston
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesTGA Australia
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Walt Maclay
 
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.pselonen
 
7 - ENISA Smart Hospitals Study.pptx
7 - ENISA Smart Hospitals Study.pptx7 - ENISA Smart Hospitals Study.pptx
7 - ENISA Smart Hospitals Study.pptxnichal3
 
Presentation: Cybersecurity considerations for medical devices - From the TGA...
Presentation: Cybersecurity considerations for medical devices - From the TGA...Presentation: Cybersecurity considerations for medical devices - From the TGA...
Presentation: Cybersecurity considerations for medical devices - From the TGA...TGA Australia
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesAli Youssef
 

Similaire à Health apps regulation and quality control case studies and session 2 presentations (20)

Testing in the healthcare domain
Testing in the healthcare domainTesting in the healthcare domain
Testing in the healthcare domain
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Presentation: Conformity Assessment Evidence
Presentation: Conformity Assessment EvidencePresentation: Conformity Assessment Evidence
Presentation: Conformity Assessment Evidence
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptx
 
Design Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud ConnectivityDesign Considerations to Maximize Medical Device Cloud Connectivity
Design Considerations to Maximize Medical Device Cloud Connectivity
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Usability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUsability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and Software
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devices
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
Understanding IEC 62304
Understanding IEC 62304Understanding IEC 62304
Understanding IEC 62304
 
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
Cloud Platform for Remote Patient Monitoring. Case: Stroke Remote Care.
 
7 - ENISA Smart Hospitals Study.pptx
7 - ENISA Smart Hospitals Study.pptx7 - ENISA Smart Hospitals Study.pptx
7 - ENISA Smart Hospitals Study.pptx
 
Presentation: Cybersecurity considerations for medical devices - From the TGA...
Presentation: Cybersecurity considerations for medical devices - From the TGA...Presentation: Cybersecurity considerations for medical devices - From the TGA...
Presentation: Cybersecurity considerations for medical devices - From the TGA...
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical DevicesIEC 80001 and Planning for Wi-Fi Capable Medical Devices
IEC 80001 and Planning for Wi-Fi Capable Medical Devices
 

Plus de 3GDR

HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 20223GDR
 
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...3GDR
 
How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.3GDR
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 20193GDR
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 20193GDR
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients3GDR
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients3GDR
 
The Future Role of the Doctor
The Future Role of the DoctorThe Future Role of the Doctor
The Future Role of the Doctor3GDR
 
How would the Born Mobile redesign Medicine
How would the Born Mobile redesign MedicineHow would the Born Mobile redesign Medicine
How would the Born Mobile redesign Medicine3GDR
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr3GDR
 
Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.43GDR
 
Alan Connor, eHealth Ireland
Alan Connor, eHealth IrelandAlan Connor, eHealth Ireland
Alan Connor, eHealth Ireland3GDR
 
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)3GDR
 
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)3GDR
 
Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...3GDR
 
5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 3GDR
 
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...3GDR
 
Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...3GDR
 
The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...3GDR
 
Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...3GDR
 

Plus de 3GDR (20)

HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022HorseTech Conference Cheltenham 15/16 March 2022
HorseTech Conference Cheltenham 15/16 March 2022
 
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
DOCTORS AND SOCIAL MEDIA webinar (delivered by Liz Price, MDDUS senior risk a...
 
How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.How would the Born Mobile redesign Medicine and the future role of the Doctor.
How would the Born Mobile redesign Medicine and the future role of the Doctor.
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
 
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
Royal Pharmaceutical Society UCL School of Pharmacy New Year Lecture 2019
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients
 
Mobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered PatientsMobile Health: the enable of Empowered Patients
Mobile Health: the enable of Empowered Patients
 
The Future Role of the Doctor
The Future Role of the DoctorThe Future Role of the Doctor
The Future Role of the Doctor
 
How would the Born Mobile redesign Medicine
How would the Born Mobile redesign MedicineHow would the Born Mobile redesign Medicine
How would the Born Mobile redesign Medicine
 
Introduction to gdpr
Introduction to gdprIntroduction to gdpr
Introduction to gdpr
 
Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4Irish HSE EHR strategic business case master briefing deck v1.4
Irish HSE EHR strategic business case master briefing deck v1.4
 
Alan Connor, eHealth Ireland
Alan Connor, eHealth IrelandAlan Connor, eHealth Ireland
Alan Connor, eHealth Ireland
 
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
Can mobiles save lives by Dr Line Kleinebreil (WHO Consultant)
 
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
Request for Expressions of Interest: The EU mHealth Hub (17 August 2017)
 
Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...Things you need to know about info governance to sell healthtech products int...
Things you need to know about info governance to sell healthtech products int...
 
5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare 5G World: Better Networks for Better Healthcare
5G World: Better Networks for Better Healthcare
 
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
Notes on a talk on “Pricing and evaluating Orphan Drugs – present and future”...
 
Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...Digital Health a call for Government Leadership and cooperation between ICT a...
Digital Health a call for Government Leadership and cooperation between ICT a...
 
The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...The importance of post-marketing registries for payers and regulators to mana...
The importance of post-marketing registries for payers and regulators to mana...
 
Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...Deriving more value from real world evidence to ensure timely access of medic...
Deriving more value from real world evidence to ensure timely access of medic...
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Health apps regulation and quality control case studies and session 2 presentations

  • 1. Health apps: regulation and quality control Wednesday 19 November 2014, Academy of Medical Sciences
  • 2. Developing the first CE-marked medical app: Mersey Burns Rowan Pritchard Jones Department of Burns and Plastic Surgery, Whiston Hospital Available from: https://prezi.com/boyb9fhskpno/academy- med-sci/
  • 3. 1 Patented Clinical & Behavioral Engine *In earlier versions of BlueStar *
  • 4. 2 Digital Health Landscape Data Sharing Care Delivery Wellness Chronic Disease Management Regulated Not Regulated Minimal to Moderate Regulation Minimal to Moderate Regulation
  • 5. 3 Managing Chronic Disease Can Be Daunting Self-Management 48 minutes a managing disease(s) Healthcare Four, 15-minute doctor visits a year Therapeutics Average of 9 prescriptions yearly A Small Thing Called “Life” 8,766 hours a year balancing life and a chronic disease
  • 6. 4 Raw Data Isn’t Necessarily the Answer
  • 7. 5 What if We Could Transform the Data? To Deliver Actionable Knowledge…
  • 8. Diabetes Care, Anytime Anywhere 24/7, automated, real-time guidance and education. Optimizing Clinical Decisions Treatment and quality recommendations based on evidence-based guidelines for healthcare providers.
  • 9. 7 Patients are trained face-to-face or remotely. Product support for patients & providers. Face-to-face physician detailing. Provider In-Servicing Customer CarePatient Training Seamless, End-to-end Deployment*
  • 11. 9 ADA Recognized as New Type 2 Medication Source: ADA www.diabetes.org
  • 13. Regulation and oversight for developing embedded medical software Academy of Medical Sciences/Royal Academy of Engineering Joint meeting on ‘Health apps: regulation and quality control’ Dr Chris Elliott FREng Leman Micro Devices SA Mobile devices that sense Vital Signs
  • 14. Case study Smartphone Vital Signs System: • Hardware is small enough and cheap enough to incorporate in a smartphone • SVSS includes everything for medically accurate measurements of all 5 physiological “Vital Signs” – Blood pressure – Temperature – Respiration rate – Heart rate – Blood oxygen and also ECG • System includes hardware, app and server • We believe that our package of technological solutions means that the Smartphone is not a medical device 2 Module – Class IIA/Class II medical device App – Class IIA/Class II medical device Smartphone – medical device? Remote Server calibrations, analysis – Class IIA/Class II medical device
  • 15. Issues for the app • Classification – Class IIA in Europe – Class II in USA • Safety – IEC Class B: Non-serious injury is possible – FDA “Moderate”: failure or latent design flaw could directly result in minor injury, including through incorrect or delayed information • Design and development – risk-based – good software practice – planned, through life, structured design, traceable (inc SOUP and OS), verified, documented – evolutionary development within that framework • Usability – key issue for consumer devices (and Regulators) • Security – confidential health data 3
  • 16. Issues for the system including app • Security – how to avoid pirate app (key issue for Regulators) – how to deal with rooted ‘phone • Function – Smartphone must deliver as spec through life • software upgrades? • other apps? (legitimate 3rd party, pirate, interfering) • Vigilance – fundamental requirement of medical device regulation - monitor performance in use and deal with “adverse events” (“arisings” in aerospace language) – easier with an internet-connected device and dedicated Remote Server 4
  • 17. Some key relevant standards • Safety – IEC60601-3 Section 14 – Programmable Electrical Medical Systems – IEC 62304 – FDA Guidance May 11, 2005 • Usability – IEC 62366 – FDA Guidance June 22, 2011 • Security – ISO 27001 – FDA Guidance June 14, 2013 • Risk Assessment – ISO 14971 • Performance – ISO81060, ISO 80601-2-61, ISO 80601-2-56/ASTM 1965 …. All within a QMS framework of ISO13485 5
  • 18. Conclusions • It is possible to develop embedded software to satisfy medical device regulations within a Smartphone environment • At its heart, it’s just good software engineering but • Must take account of special circumstances: – users are consumers not experts – environment must be stable (pirates, hackers, upgrades …) – objective evidence is needed to support claims for safety and efficacy to satisfy Regulators before sale Confidential 6
  • 19. Exmouth House 3–11 Pine Street London EC1R 0JH T +44 20 7832 5850 F +44 20 7832 5853 E office@adelard.com W www.adelard.com Health apps: regulation and quality control A nuclear perspective Professor Robin E Bloomfield FREng 19th Nov 2014
  • 20. © ADELARD Background •  Trustworthiness of computer based system •  Safety, security and socio-technical perspective •  Deep and broad experience in nuclear industry •  Practitioner and researcher; Nusac •  In medical sector •  Health foundation projects •  Assessing devices –  Safety, investment •  Training manufacturers •  Research liaison with FDA Slide 2
  • 21. © ADELARD Background •  Review of 2005-09 Medical Device Reports (MDRs) found: •  56,000 MDRs related to infusion pumps, 710 deaths, 87 recalls •  Several design problems (e.g. software, user interface) seen as “preventable” •  FDA concluded that there are “numerous systemic problems with device design, manufacturing, and adverse event reporting” •  FDA decided to proactively and systematically address the root causes of infusion pump recalls Slide 3
  • 22. © ADELARD Nuclear power plant 6 times the size of a Porsche 918, 8205 x power
  • 23. © ADELARD Overview •  How critical are the systems •  What are safety properties? hazards? •  What is framework for assurance •  Safety Assessment Principles •  Claims, Argument Evidence •  What is the approach •  Understanding •  Excellence of production –  Compensation •  Confidence Building –  Statistical testing, static analysis Slide 5
  • 24. © ADELARD Protection systems Pressure Temperature plant damage boundary protection envelope normal operation A B C D Voting system Voting system Primary protection system Secondary protection system Tertiary diverse signals A, B, C, D redundant channels Primary, Secondary, Tertiary - diverse systems Reactor segregation Plant signals communication between channels Shut down Shut down command
  • 25. © ADELARD The need for trust in computer-based systems. Computer systems play a key role in all layers of defence in depth •  Normal operation - control, control room information •  Limitation and warning systems •  Trip systems •  Post trip shut down •  Severe accident management
  • 27. © ADELARD UK - Safety cases: regulatory obligation •  Safety cases are required by licence conditions. •  The Conditions are non-prescriptive and set goals that the licensee is responsible for meeting. •  A "safety case" is defined as •  the document or documents produced by the licensee documentation to justify safety during the design, construction, manufacture, commissioning, operation and decommissioning phases of the installation. •  Safety Assessment Principles (SAPs) describe the safety case process and principles to be covered.
  • 28. © ADELARD Safety Assessment Principles for Nuclear Facilities - 2006 The prime responsibility for safety must rest with the person or organisation responsible for the facilities and activities that give rise to radiation risks. Fundamental principles Leadership and management for safety FP.2 Effective leadership and management for safety must be established and sustained in organisations concerned with, and facilities and activities that give rise to, radiation risks. Fundamental principles Optimisation of protection FP.3 Protection must be optimized to provide the highest level of safety that is reasonably practicable. Fundamental principles Safety assessment FP.4 The dutyholder must demonstrate effective understanding of the hazards and their control for a nuclear site or facility through a comprehensive and systematic process of safety assessment. Fundamental principles Limitation of risks to individuals FP.5 Measures for controlling radiation risks must ensure that no individual bears an unacceptable risk of harm. Fundamental principles Prevention of accidents FP.6 All reasonably practicable steps must be taken to prevent and mitigate nuclear or radiation accidents. Fundamental principles Emergency preparedness and response FP.7 Arrangements must be made for emergency preparedness and response in case of nuclear or radiation incidents.
  • 29. © ADELARD For software – ESS 27 UNCONTROLLED COPY IF NOT VIEWED ON HSE WEBSITE 2006 Edition, Revision 1 Page 64 of 140 Engineering principles: safety systems Maintenance and testing ESS.26 Maintenance and testing of a safety system should not initiate a fault sequence. 359 For a computer-based safety system the technology is not amenable to traditional methods of reliability assessment. The following principle presents the elements of a procedure to demonstrate the adequacy of a safety system using computer-based technology. The safety demonstration for the hardware elements of such systems should include the items listed in paragraph 355. Engineering principles: safety systems Computer-based safety systems ESS.27 Where the system reliability is significantly dependent upon the performance of computer software, the establishment of and compliance with appropriate standards and practices throughout the software development life-cycle should be made, commensurate with the level of reliability required, by a demonstration of ‘production excellence’ and ‘confidence-building’ measures. 360 ‘Production excellence’ requires a demonstration of excellence in all aspects of production, covering initial specification through to the finally commissioned system, comprising the following elements: a) Thorough application of technical design practice consistent with current accepted standards for the development of software for computer-based safety systems. b) Implementation of an adequate quality assurance programme and plan in accordance with appropriate quality assurance standards.
  • 30. © ADELARD Summary of principles 1.  Effective understanding of the hazards and their control should be demonstrated 2.  Intended and unintended behaviour of the technology should be understood 3.  Multiple and complex interactions between the technical and human systems to create adverse consequences should be recognised. 4.  Active challenge should be part of decision making throughout the organisation. 5.  Lessons learned from internal and external sources should be incorporated 6.  Justification should be logical, coherent , traceable, accessible, repeatable with a rigour commensurate with the degree of trust required of the system Derived from IAEA, UK Principles – EU Harmonics project
  • 31. © ADELARD Defence in depth Wenra guidance DiD level Associated plant condition categories Objective Essential means Level 1 Normal operation Prevention of abnormal operation and failures Conservative design and high quality in construction and operation, control of main plant parameters inside defined limits Level 2 Anticipated operational occurrences Control of abnormal operation and failures Control and limiting systems and other surveillance features Level 3.a Postulated single initiating events Control of accident to limit radiological releases and prevent escalation to core melt conditions Reactor protection system, safety systems, accident procedures Level 3.b Postulated multiple failure events Additional safety features, accident procedures Level 4 Postulated core melt accidents (short and long term) Control of accidents with core melt to limit off-site releases Complementary safety features to mitigate core melt, Management of accidents with core melt (severe accidents) Level 5 – Mitigation of radiological consequences of significant releases of radioactive material Off-site emergency response Intervention levels
  • 32. © ADELARD Product-based approaches •  Focus on directly showing the desired behaviour, property or reliability •  They can be applied even when standards compliance cannot be shown •  Linked with specific claims about the product or system •  May use claim-argument-evidence structure
  • 33. © ADELARD The role of CAE – communication and reasoning •  A method for reasoning about dependability (safety, security, reliability, resilience ...) properties of the system •  Communication is an essential function of the case, from this we can build confidence –  boundary objects that record the shared understanding between the different stakeholders
  • 34. © ADELARD Justification approaches – the strategy triangle Slide 16 Property-based approach Standards compliance Vulnerability assessment Safety justification
  • 35. © ADELARD Slide 17 Techniques to address properties PROPERTIES ANALYSIS TECHNIQUES TESTING TECHNIQUES Functionality Code review / walkthrough Traceability (requirements to code) Regression testing Statistical testing Black box functional testing Negative testing Time response Design inspection Worst-case execution time analysis Black box functional testing Accuracy Numerial analysis Black box functional testing Reliability Analysis of field data Statistical testing Robustness Negative testing Fault injection testing Stress testing Failure integrity Failure integrity analysis Fault injection testing Operability Usability testing Security Security analysis Security testing
  • 36. © ADELARD Slide 18 Techniques to address vulnerabilites VULNERABILITY ANALYSIS TECHNIQUES TESTING TECHNIQUES Unintended inter- component interaction Resource usage analysis Black box functional testing Incorrect inter- component interaction Concurrency analysis Black box functional testing Application code errors Coding standards compliance Control/data flow analysis Resource usage analysis Run-time exception analysis Abstract interpretation Black box functional testing Unit testing Integration testing Random testing / fuzz testing Unspecified functionality Traceability (requirements to code) Random testing / fuzz testing Errors in embedded components Black box functional testing
  • 37. © ADELARD Conclusions •  How critical are the systems •  What are safety properties? hazards? •  What is framework for assurance •  Safety Assessment Principles •  Claims, Argument Evidence •  What is the approach •  Understanding – hazards, interactions •  Excellence of production –  Compensation •  Confidence Building –  Statistical testing, static analysis Slide 19
  • 38. © ADELARD Medical systems •  Tempo •  Heterogeneous systems •  Patient s own devices •  Accidental systems •  Ad hoc Apps •  Off label •  Local and global •  Multi-stakeholder Health Foundation Report G1USING SAFETY CASES IN INDUSTRY AND HEALTHCARE This is one of a series of supplements to the report: Using safety cases in industry and healthcare: a pragmatic review of the use of safety cases in safety-critical industries – lessons and prerequisites for their application in healthcare To access the report and the other supplements, please visit www.health.org.uk/safetycasesreport Contents 1 Introduction G2 2 Medical devices G2 3 Assurance cases and infusion pumps G6 4 Other developments G13 5 Medical device standards G14 6 Summary G15 7 Glossary G16 8 References G17 Supplement G: Safety case use within the medical devices industry Robin Bloomfield, Nick Chozos, George Cleland Adelard LLP
  • 40. Regulation and Oversight for Developing Automotive Software in Europe Presented at Academy of Medical Sciences, Nov 2014 Dr Michael Ellims Sybernetic Ltd.
  • 42. Type Approval Production vehicles can be sold and driven if Type Approved. Type approval has three parts Conformity of production Approval of test facilities Conformance to regulation Type approval granted by vehicle certification authority e.g. VCA
  • 43. Conformity of production Evidence that a manufacturer can produce something that conforms every time. Quality system – ISO 9001 or equivalent Control plan What, why, how, when and who, Control plans require approval.
  • 44. Regulation – a lots of it UNECE (1958 agreement) – 133 ...to date – Numerous amendments and corrigendum – Folded into regulations periodically... UN GTR (1998 agreement) – 15 ...to date
  • 45. Regulation of Software UNECE 13 Braking, categories M, N and O UNECE 13-H Braking, passenger cars UNECE 79 Steering Equipment UNGTR 8 Electronic stability control Note UNECE 13-H also covers ESC !!!
  • 46. Software Annexes Special Requirements to be applied to the safety aspects of complex electronic vehicle control systems UNECE R13 Annex 18 UNECE R13H Annex 8 UNECE R79 Annex 6 UNGTR 8 clause 132 (almost)
  • 47. The Annex... Clause Regulation Covers 3.1 Documentation What is to be presented to certification authority 3.2 Description of functions A description… all input and sensed data all output boundaries of functional operation 3.3 System layout Inventory of components Functions of the units Interconnections Signal flow and priorities 3.4 Safety Concept safe operation under non-fault conditions safe operation under fault conditions Software Safety Analysis 4.1.1 Verification of the system Under non-fault conditions 4.1.2 Verification of the Safety Concept Under fault conditions
  • 48. IEC 61508 Under German law... – IEC standards are automatically incorporated • Implies 61508 should be used for assessing Annexes – But 61508 doesn’t match automotive practice • e.g. prototypes not considered – IEC 61508 “allows” derived standards So the automotive industry created ISO 26262
  • 49. ...and ISO 26262 Clause Regulation Covers Clause ISO 26262 Covers 3.1 Documentation 3.2 Description of functions 3: 5.5 Item Definition 3.3 System layout 3: 5.5 Item Definition 3.4 Safety Concept 3: 7.5.2 3: 8.5.1 Safety Goals Functional Safety Concept 3.4.2 Software ----- Part 6 3.4.4 Analysis (FMEA, FTA etc.) 7.5.1 Hazard analysis 4.1.1 Verification of the system missing 4.1.2 Verification of the Safety Concept 3: 8.5.2 Functional safety concept Verification report
  • 50. Software 3.1.1 Documentation (a) The formal documentation package for the approval, containing the material listed in Section 3 (b) Additional material and analysis data of paragraph 3.4.4., which shall be retained by the manufacturer, but made open for inspection at the time of type approval.
  • 51. Software 3.4.2. In respect of software employed in "The System", – the outline architecture…, – the design methods and tools … identified. The manufacturer shall be prepared, if required, to show some evidence of … realisation of the system logic, ....
  • 52. Weaknesses Type approval is in general “whole vehicle” – tests of a vehicle on a test track – tests as specified in the standard Formally: – regulations do not specify deep dives – certifying authority does not always do deep-dives The Annexes are to some extent “bolt-on”
  • 53. Some Context...Data2013 Fortune 500 and World Bank data Rank Entity GDP/Rev Rank Enity GDP/Rev Norway $512 billion 26 Ford Motor $147 1 Wal-Mart $476 27 General Electric $146 2 Royal Dutch Shell $459 61 Nissan Motor $104 8 Volkswagen $261 63 Tesco $103 9 Toyota Motor $256 68 BMW Group $101 Portugal $220 68 Électricité de France $100 13 Samsung Electronics $208 90 Boeing $ 86 New Zealand $185 103 Airbus group $ 78 15 Apple $170 155 Robert Bosch $ 61 20 Daimler $156 Uruguay $ 55 21 General Electric $156 181 Caterpillar $ 55
  • 54. Financial Motivation Minimum recall cost $50 – Ford Foci per year (approximate) - 1 million Typical production run - 4-5 years $50 * 1 million * 5 years $250 million
  • 55. Thank You! Contact details: Email: michael.ellims@tesco.net Mobile: 075 44 68 58 94
  • 56.
  • 57. Software for Dependable Systems – Sufficient Evidence? Martyn Thomas CBE FREng Non-executive Director, Health and Safety Executive
  • 58. Summary Towards certifiably dependable software The building blocks for a credible dependability case • Explicit Claims • Evidence • Expertise
  • 59. Explicit Claims No software can be equally dependable in all respects and under all conditions of use. The dependability case should therefore be explicit about the properties that are being claimed, the assumptions that have been made about the environment, and the level of dependability being claimed. Different properties may be assured to different levels of dependability
  • 60. Evidence Concrete and valid evidence should be provided that substantiates the dependability claims. Evidence + Assumptions ➾ Properties the dependability argument Testing is essential, but can almost never provide adequate evidence on its own. Evidence from analysis will be required. Evidence of the development process is also needed, e.g. to show that the software in use is the same as that analysed and tested.
  • 61. Expertise To develop dependable software, engineers need expertise in software development, in the application domain, and in the broader system context. Software is only part of the system. It must work dependably with other software, hardware and the users. Producing adequate evidence is highly demanding and stretches best practice to the limit. Developers must know the best methods and tools and only deviate from them with good reasons (clearly documented).
  • 62. The full report can be downloaded, free, from http://sites.nationalacademies.org/cstb/Comp letedProjects/CSTB_042247